SlideShare ist ein Scribd-Unternehmen logo
1 von 56
•
•
•

•
•
•
TEXT           TEXT             TEXT           TEXT




    Virtualization      Unified           Cloud Computing           Managed
                     Communications                                 Services

•   Server, App,     •   Call Manager     •   Office 365      •   Monitoring
    Desktop
                     •   Network          •   Backup          •   Remediation
•   Storage              Infrastructure
                                          •   Co-Locations
•   DR               •   Wireless
•   Backup
Flexible and                   Anywhere                Protection and
     Reliable                      Access                  Compliance
• Continuous Availability    • Manage Inbox Overload     • Email Archiving
• Simplify Administration    • Enhance Voicemail         • Protect Communications
• Deployment Flexibility     • Collaborate Effectively   • Advanced Security




                               Optimize for
                            Software + Services
•   Single platform for availability, backup, and
    recovery
•   Online mailbox moves keep users connected



•   Role-based administration and user self-service
•   Web-based management and remote PowerShell



•   Choice of storage from SAN to low-cost DAS
•   Modular server roles ease deployment
San Jose    New York



                    DB1    DB1     DB1   Replicate databases
Recover quickly     DB2    DB2     DB2   to remote
from disk and       DB3    DB3     DB3   datacenter
database failures   DB4    DB4     DB4
                    DB5    DB5     DB5




 •
 •
 •
 •
•
                                    Email Client




                                                           − Sending messages
                                                           − Receiving messages
                                                           − Accessing entire mailbox
                                                       •
             Client Access Server




Mailbox Server 1                    Mailbox Server 2
Track the Status of
                      Sent Messages




Create and Manage
Distribution Groups
Storage Area      Direct Attached    Direct Attached         JBOD SATA
    Network (SAN)       w/ SAS Disks      w/ SATA Disks           (RAID-less)




•   Continual platform innovation yields over 70% reduction in disk I/O
•   Disk I/O patterns optimized for better hardware utilization
•   Resilience against corruption through automated page-level repairs
Enterprise Network                 Phone system
                                                                        (PBX or VOIP)

                    Edge Transport               Hub Transport
                      Routing and               Routing and policy
                        AV/AS
   External
    SMTP
   servers
                                                    Mailbox           Unified Messaging
                                                   Storage of           Voicemail and
                                                  mailbox items          voice access
     Mobile phone


                                                   Client Access
Web browser                                     Client connectivity
                                                   Web services


     Outlook
  (remote user)                                                       Line of business
                                                                         application
                                     Outlook (local user)
•   Enhanced conversation view eases Inbox navigation
•   MailTips help avoid undelivered/misdirected email



•   Text preview of voicemail messages for faster triage
•   Customizable call handling rules and menu options



•   Full featured experience across all “three screens”
•   Federation of Free/Busy details with partners
Conversation View


Instant Messaging

                    Ignore Conversation
MailTips in
                  Outlook 2010




   MailTips in
Outlook Web App
Audio playback




                                Contextual Contact
                                     Actions
Text Preview
of Voicemail
Defining a Custom
Managing Call    Voicemail Menu
Answer Rules
External Contact
Free/Busy Information
•   Integrated archiving, retention, and discovery
•   Granular retention and legal hold policies



•   Array of Informational Protection and Control tools
•   Automate Rights Management policies in Transport



•   Multiple antivirus scanning engines with Forefront
•   Choice of service or on-premises protection
• Secondary mailbox    • Automated and          • Capture deleted       • Web-based UI
 with separate quota    time-based criteria      and edited email       • Search primary,
• Appears in Outlook   • Set policies at item    messages                archive, and
 and OWA                or folder level         • Offers single item     recoverable items
• Managed through      • Expiry date shown       restore                • Delegate through
 EMC or PowerShell      in email message        • Notify user on hold    roles-based admin
Apply Move and Delete Policies
                          to Individual Messages




Policies Applied to All
Email Within a Folder



                                   Retention Policy
                                   and Expiry Details
Delegate Access
                        to Specialists




Rich Search Criteria
and Targeting Options

                                 Results Stored in
                                 Specialized Mailbox
•   Mailboxes can be moved together or separately
                                                •   Allows for different storage hardware, DAGs, RPOs, RTOs, etc.
                                                •   Exchange 2010 SP1 supports:
                                                     •   Primary and Archive On-Premises (Same DB)
                                                     •   Primary and Archive On-Premises (Different DBs)
                                                     •   Primary and Archive in the Cloud
                                                     •   Primary On-Premises and Archive in the Cloud
*Requires Exchange Server 2010 Service Pack 1
Alert        Modify   Protect      Redirect

              LESS RESTRICTIVE            MORE RESTRICTIVE


                    Classify     Append        Review        Block




•   Apply the right level of control based on the sensitivity of the data
•   Maximize control and minimize unnecessary user disruptions
•   Transport Rule action to apply
                                Rights Management template
                                to email or voicemail messages
                            •   Support for scanning of
                                attachments and searching of
                                protected email
Transport Protection Rule
                            •   “Do Not Forward” policies
                                available by default
                            •   Information protection across
                                PC, Web, and mobile device
Hosted Service                              On-Premises Software


    Internet   SMTP

                                Hub Transport Server   Mailbox Server     Client Access Server


                                                          Antivirus and anti-spam protection for
                                                          Exchange Server 2010 Server Roles




•    Multiple scan engines throughout the corporate infrastructure
•    Tight integration with Exchange maximizes availability and performance
•    Easy-to-use admin console for central configuration and operation
•
     •
     •
     •
     •
     •

30
Exchange Control Panel   Microsoft Online Portal
         •                        •
                                  •



     •                        •




     •


31
External Mail

                     Hub Transport   Mailbox




•
•
•
•
32
Migration Options




                                                Cutover migration
                                                                    Staged migration
                               IMAP migration




                                                                                       Hybrid
               Exchange 5.5         X
               Exchange 2000        X
               Exchange 2003        X                 X                   X              X
               Exchange 2007        X                 X                   X              X
               Exchange 2010        X                 X                                  X
               Notes/Domino         X
               GroupWise            X
               Other                X
•
•
•

34
•

     •

     •


     •




35
•

•

•

•




     Exchange 2010 is not required     Exchange 2003,
     for simple coexistence features    2007 or 2010




36
•

    •

    •
    •
•
    •


    •
    •
    •
39
40
41
42
•   •
•   •
    •
    •
•
•
    •
    •
    •
•


    •
    •
•
•
•
•
Internet Access and Performance Considerations

                    •
   Identify Data
                        •
  Center Used for
                        •
      Hosting
                        •




                    •
      Access
   Considerations   •




                    •
   Identify Data    •
  Center Used for
      Hosting       •
•   What certifications and
                                    capabilities does Office
                                    365 hold?
    Is cloud computing              How does Office 365

    Security
•                               •
    secure?                         support customer
•   Is Office 365 secure?           compliance needs?
                                •   Do I have the right to
                                    audit Microsoft?

•   Does Microsoft have a
    formalized continuity
    program in place for
    Office 365?
•   Does Office 365 have the
    ability to recover from a       •   What does privacy at
    disastrous event?                   Microsoft mean?
•   Are recovery plans in           •   Where’s my data?
    place and tested
    regularly?
At Microsoft we follow a process we call the Security Development Lifecycle.
We take services from the design, through the build and implementation and
release phases of its lifecycle, and consider security from all aspects
At Microsoft, our strategy is to consistently set a “high bar” around privacy
    practices that support global standards for data handling and transfer




•                                         •

•                                         •

•
                                          •
•
•   •
•   •
•   •
•   •
•   •
•                                 •




    This saves customers time and money, and allows Microsoft
         online to provide assurances to customers at scale.
•                                       •

•
                                        •
•
                                            •
    •
    •
    •




        Self-Deployment       Recommended Partner       Microsoft Premier Deployment
•                         •                         •
•
                          •                         •
•

                          •
On prem vs cloud exchange

Weitere ähnliche Inhalte

Was ist angesagt?

Television news search and analysis with lucene solr
Television news search and analysis with lucene solrTelevision news search and analysis with lucene solr
Television news search and analysis with lucene solr
lucenerevolution
 
Summerschool unified communications
Summerschool unified communicationsSummerschool unified communications
Summerschool unified communications
e-office bv
 
Microsoft India – Unified Communications Exchange Server 2010 Outlook Web App...
Microsoft India – Unified Communications Exchange Server 2010 Outlook Web App...Microsoft India – Unified Communications Exchange Server 2010 Outlook Web App...
Microsoft India – Unified Communications Exchange Server 2010 Outlook Web App...
Microsoft Private Cloud
 

Was ist angesagt? (18)

Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows EnvironmentsUgly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
Ugly Storage Made Sexy in Novell Open Enterprise Server and Windows Environments
 
Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on Cloud
 
Domain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityDomain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows Interoperability
 
Novell filr customer slides richard lindstedt
Novell filr customer slides richard lindstedtNovell filr customer slides richard lindstedt
Novell filr customer slides richard lindstedt
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
 
10135 b 13
10135 b 1310135 b 13
10135 b 13
 
Novell Filr Overview
Novell Filr OverviewNovell Filr Overview
Novell Filr Overview
 
Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8
 
Novell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and WorkflowsNovell Teaming: Automating Business Processes with Forms and Workflows
Novell Teaming: Automating Business Processes with Forms and Workflows
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
 
Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell Technologies
 
Lync Server Notes from the Field: Options for Deployment
Lync Server Notes from the Field: Options for DeploymentLync Server Notes from the Field: Options for Deployment
Lync Server Notes from the Field: Options for Deployment
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 
Television news search and analysis with lucene solr
Television news search and analysis with lucene solrTelevision news search and analysis with lucene solr
Television news search and analysis with lucene solr
 
Novell Success Stories: Collaboration in Travel and Hospitality
Novell Success Stories: Collaboration in Travel and HospitalityNovell Success Stories: Collaboration in Travel and Hospitality
Novell Success Stories: Collaboration in Travel and Hospitality
 
Using Novell Sentinel Log Manager to Monitor Novell Applications
Using Novell Sentinel Log Manager to Monitor Novell ApplicationsUsing Novell Sentinel Log Manager to Monitor Novell Applications
Using Novell Sentinel Log Manager to Monitor Novell Applications
 
Summerschool unified communications
Summerschool unified communicationsSummerschool unified communications
Summerschool unified communications
 
Microsoft India – Unified Communications Exchange Server 2010 Outlook Web App...
Microsoft India – Unified Communications Exchange Server 2010 Outlook Web App...Microsoft India – Unified Communications Exchange Server 2010 Outlook Web App...
Microsoft India – Unified Communications Exchange Server 2010 Outlook Web App...
 

Andere mochten auch

Reforma laboral: Flexibilidad Interna por Avelino Alvarez de Garrigues
Reforma laboral: Flexibilidad Interna por Avelino Alvarez de GarriguesReforma laboral: Flexibilidad Interna por Avelino Alvarez de Garrigues
Reforma laboral: Flexibilidad Interna por Avelino Alvarez de Garrigues
AntiguosUPV
 
Libro blanco de la coordinación sociosanitaria en españa
Libro blanco de la coordinación sociosanitaria en españaLibro blanco de la coordinación sociosanitaria en españa
Libro blanco de la coordinación sociosanitaria en españa
SociosaniTec
 
Moreiras alberto linea de sombra - el no sujeto de lo politico
Moreiras alberto   linea de sombra - el no sujeto de lo politicoMoreiras alberto   linea de sombra - el no sujeto de lo politico
Moreiras alberto linea de sombra - el no sujeto de lo politico
Agenciamientos
 
Ideapad u310 u410_hmm_1st_edition_mar_2012_english
Ideapad u310 u410_hmm_1st_edition_mar_2012_englishIdeapad u310 u410_hmm_1st_edition_mar_2012_english
Ideapad u310 u410_hmm_1st_edition_mar_2012_english
Hardik Shah
 
Sexo DéBil
Sexo DéBilSexo DéBil
Sexo DéBil
BbMmCc
 
2012 06-04 slideshow-producers_fairtrade-updated_es
2012 06-04 slideshow-producers_fairtrade-updated_es2012 06-04 slideshow-producers_fairtrade-updated_es
2012 06-04 slideshow-producers_fairtrade-updated_es
Alfredozabarain2012
 
Escuela municipal de buceo
Escuela municipal de buceoEscuela municipal de buceo
Escuela municipal de buceo
faincama
 

Andere mochten auch (20)

Reforma laboral: Flexibilidad Interna por Avelino Alvarez de Garrigues
Reforma laboral: Flexibilidad Interna por Avelino Alvarez de GarriguesReforma laboral: Flexibilidad Interna por Avelino Alvarez de Garrigues
Reforma laboral: Flexibilidad Interna por Avelino Alvarez de Garrigues
 
Libro blanco de la coordinación sociosanitaria en españa
Libro blanco de la coordinación sociosanitaria en españaLibro blanco de la coordinación sociosanitaria en españa
Libro blanco de la coordinación sociosanitaria en españa
 
Oar 2009
Oar 2009Oar 2009
Oar 2009
 
Moreiras alberto linea de sombra - el no sujeto de lo politico
Moreiras alberto   linea de sombra - el no sujeto de lo politicoMoreiras alberto   linea de sombra - el no sujeto de lo politico
Moreiras alberto linea de sombra - el no sujeto de lo politico
 
Ideapad u310 u410_hmm_1st_edition_mar_2012_english
Ideapad u310 u410_hmm_1st_edition_mar_2012_englishIdeapad u310 u410_hmm_1st_edition_mar_2012_english
Ideapad u310 u410_hmm_1st_edition_mar_2012_english
 
Sexo DéBil
Sexo DéBilSexo DéBil
Sexo DéBil
 
Programas 3d
Programas 3dProgramas 3d
Programas 3d
 
2012 06-04 slideshow-producers_fairtrade-updated_es
2012 06-04 slideshow-producers_fairtrade-updated_es2012 06-04 slideshow-producers_fairtrade-updated_es
2012 06-04 slideshow-producers_fairtrade-updated_es
 
My Web2
My Web2My Web2
My Web2
 
SECRETARIA DE ESTADO DE EDUCAÇÃO PUBLICA LISTA COM MAIS DE 17 MIL PROMOÇÕES D...
SECRETARIA DE ESTADO DE EDUCAÇÃO PUBLICA LISTA COM MAIS DE 17 MIL PROMOÇÕES D...SECRETARIA DE ESTADO DE EDUCAÇÃO PUBLICA LISTA COM MAIS DE 17 MIL PROMOÇÕES D...
SECRETARIA DE ESTADO DE EDUCAÇÃO PUBLICA LISTA COM MAIS DE 17 MIL PROMOÇÕES D...
 
estaciones
estacionesestaciones
estaciones
 
Tema 4 subnetting
Tema 4   subnettingTema 4   subnetting
Tema 4 subnetting
 
Pharma Market 54
Pharma Market 54Pharma Market 54
Pharma Market 54
 
Avance del semestre i diapositivas
Avance del semestre i diapositivasAvance del semestre i diapositivas
Avance del semestre i diapositivas
 
Desarrollo de interfaces humanas con Xbox Kinect y Visual Studio 2010
Desarrollo de interfaces humanas con Xbox Kinect y Visual Studio 2010Desarrollo de interfaces humanas con Xbox Kinect y Visual Studio 2010
Desarrollo de interfaces humanas con Xbox Kinect y Visual Studio 2010
 
Escuela municipal de buceo
Escuela municipal de buceoEscuela municipal de buceo
Escuela municipal de buceo
 
Observar una toma
Observar una tomaObservar una toma
Observar una toma
 
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the FutureNATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
NATO Workshop on Pre-Detection of Lone Wolf Terrorists of the Future
 
catalogo del Global Logistics & Manufacturing 2013
catalogo del Global Logistics & Manufacturing 2013catalogo del Global Logistics & Manufacturing 2013
catalogo del Global Logistics & Manufacturing 2013
 
Charisma & Its Components
Charisma & Its ComponentsCharisma & Its Components
Charisma & Its Components
 

Ähnlich wie On prem vs cloud exchange

Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft Private Cloud
 
Microsoft Unified Communication - Exchange Server 2010 Outlook Web App Presen...
Microsoft Unified Communication - Exchange Server 2010 Outlook Web App Presen...Microsoft Unified Communication - Exchange Server 2010 Outlook Web App Presen...
Microsoft Unified Communication - Exchange Server 2010 Outlook Web App Presen...
Microsoft Private Cloud
 
Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overview
rsnarayanan
 
Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010
Jason Powless
 
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Private Cloud
 
Exchange server 2010
Exchange server 2010Exchange server 2010
Exchange server 2010
Joel Ticse
 
Viestinnän seminaari 8.11.2012 / Exchange
Viestinnän seminaari 8.11.2012 / ExchangeViestinnän seminaari 8.11.2012 / Exchange
Viestinnän seminaari 8.11.2012 / Exchange
Salcom Group
 
Business Email Hosting Solution: the Power of Hosted Email
Business Email Hosting Solution: the Power of Hosted EmailBusiness Email Hosting Solution: the Power of Hosted Email
Business Email Hosting Solution: the Power of Hosted Email
webhostingguy
 
Atmos Cloud -levytilaa pilvipalveluna, Antti Mäkinen
Atmos Cloud -levytilaa pilvipalveluna, Antti MäkinenAtmos Cloud -levytilaa pilvipalveluna, Antti Mäkinen
Atmos Cloud -levytilaa pilvipalveluna, Antti Mäkinen
Proact Finland
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2
 

Ähnlich wie On prem vs cloud exchange (20)

Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
Microsoft India - Unified Communications Exchange Server 2010 Competitive Adv...
 
Microsoft Unified Communication - Exchange Server 2010 Outlook Web App Presen...
Microsoft Unified Communication - Exchange Server 2010 Outlook Web App Presen...Microsoft Unified Communication - Exchange Server 2010 Outlook Web App Presen...
Microsoft Unified Communication - Exchange Server 2010 Outlook Web App Presen...
 
Exchange 2010 Overview
Exchange 2010 OverviewExchange 2010 Overview
Exchange 2010 Overview
 
Top 5 Reasons people are moving to Exchange 2010
Top 5 Reasons people are moving to Exchange 2010Top 5 Reasons people are moving to Exchange 2010
Top 5 Reasons people are moving to Exchange 2010
 
Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010
 
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
Microsoft Unified Communications - Exchange 2010 Advanced Security with Foref...
 
Microsoft Exchange 2010 Upgrade Seminar March 2010
Microsoft Exchange 2010 Upgrade   Seminar March 2010Microsoft Exchange 2010 Upgrade   Seminar March 2010
Microsoft Exchange 2010 Upgrade Seminar March 2010
 
Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...
Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...
Today's Unified Communications: To upgrade, coexist, or go 'all in' with the ...
 
Microsoft India – Unified Communications Exchange Server 2010 Archiving, Rete...
Microsoft India – Unified Communications Exchange Server 2010 Archiving, Rete...Microsoft India – Unified Communications Exchange Server 2010 Archiving, Rete...
Microsoft India – Unified Communications Exchange Server 2010 Archiving, Rete...
 
Win2KServer Active Directory
Win2KServer Active DirectoryWin2KServer Active Directory
Win2KServer Active Directory
 
Is Office 365 Right For You? Aptera Software presentation
Is Office 365 Right For You? Aptera Software presentationIs Office 365 Right For You? Aptera Software presentation
Is Office 365 Right For You? Aptera Software presentation
 
OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009OMG Data-Distribution Service (DDS) Tutorial - 2009
OMG Data-Distribution Service (DDS) Tutorial - 2009
 
Exchange server 2010
Exchange server 2010Exchange server 2010
Exchange server 2010
 
Viestinnän seminaari 8.11.2012 / Exchange
Viestinnän seminaari 8.11.2012 / ExchangeViestinnän seminaari 8.11.2012 / Exchange
Viestinnän seminaari 8.11.2012 / Exchange
 
Business Email Hosting Solution: the Power of Hosted Email
Business Email Hosting Solution: the Power of Hosted EmailBusiness Email Hosting Solution: the Power of Hosted Email
Business Email Hosting Solution: the Power of Hosted Email
 
Atmos Cloud -levytilaa pilvipalveluna, Antti Mäkinen
Atmos Cloud -levytilaa pilvipalveluna, Antti MäkinenAtmos Cloud -levytilaa pilvipalveluna, Antti Mäkinen
Atmos Cloud -levytilaa pilvipalveluna, Antti Mäkinen
 
MVTS PRO
MVTS PROMVTS PRO
MVTS PRO
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
 
Don't Architect a Real-Time System that Can't Scale
Don't Architect a Real-Time System that Can't ScaleDon't Architect a Real-Time System that Can't Scale
Don't Architect a Real-Time System that Can't Scale
 

On prem vs cloud exchange

  • 1.
  • 3.
  • 4. TEXT TEXT TEXT TEXT Virtualization Unified Cloud Computing Managed Communications Services • Server, App, • Call Manager • Office 365 • Monitoring Desktop • Network • Backup • Remediation • Storage Infrastructure • Co-Locations • DR • Wireless • Backup
  • 5.
  • 6. Flexible and Anywhere Protection and Reliable Access Compliance • Continuous Availability • Manage Inbox Overload • Email Archiving • Simplify Administration • Enhance Voicemail • Protect Communications • Deployment Flexibility • Collaborate Effectively • Advanced Security Optimize for Software + Services
  • 7. Single platform for availability, backup, and recovery • Online mailbox moves keep users connected • Role-based administration and user self-service • Web-based management and remote PowerShell • Choice of storage from SAN to low-cost DAS • Modular server roles ease deployment
  • 8. San Jose New York DB1 DB1 DB1 Replicate databases Recover quickly DB2 DB2 DB2 to remote from disk and DB3 DB3 DB3 datacenter database failures DB4 DB4 DB4 DB5 DB5 DB5 • • • •
  • 9. Email Client − Sending messages − Receiving messages − Accessing entire mailbox • Client Access Server Mailbox Server 1 Mailbox Server 2
  • 10.
  • 11. Track the Status of Sent Messages Create and Manage Distribution Groups
  • 12. Storage Area Direct Attached Direct Attached JBOD SATA Network (SAN) w/ SAS Disks w/ SATA Disks (RAID-less) • Continual platform innovation yields over 70% reduction in disk I/O • Disk I/O patterns optimized for better hardware utilization • Resilience against corruption through automated page-level repairs
  • 13. Enterprise Network Phone system (PBX or VOIP) Edge Transport Hub Transport Routing and Routing and policy AV/AS External SMTP servers Mailbox Unified Messaging Storage of Voicemail and mailbox items voice access Mobile phone Client Access Web browser Client connectivity Web services Outlook (remote user) Line of business application Outlook (local user)
  • 14. Enhanced conversation view eases Inbox navigation • MailTips help avoid undelivered/misdirected email • Text preview of voicemail messages for faster triage • Customizable call handling rules and menu options • Full featured experience across all “three screens” • Federation of Free/Busy details with partners
  • 15. Conversation View Instant Messaging Ignore Conversation
  • 16. MailTips in Outlook 2010 MailTips in Outlook Web App
  • 17. Audio playback Contextual Contact Actions Text Preview of Voicemail
  • 18. Defining a Custom Managing Call Voicemail Menu Answer Rules
  • 19.
  • 21. Integrated archiving, retention, and discovery • Granular retention and legal hold policies • Array of Informational Protection and Control tools • Automate Rights Management policies in Transport • Multiple antivirus scanning engines with Forefront • Choice of service or on-premises protection
  • 22. • Secondary mailbox • Automated and • Capture deleted • Web-based UI with separate quota time-based criteria and edited email • Search primary, • Appears in Outlook • Set policies at item messages archive, and and OWA or folder level • Offers single item recoverable items • Managed through • Expiry date shown restore • Delegate through EMC or PowerShell in email message • Notify user on hold roles-based admin
  • 23. Apply Move and Delete Policies to Individual Messages Policies Applied to All Email Within a Folder Retention Policy and Expiry Details
  • 24. Delegate Access to Specialists Rich Search Criteria and Targeting Options Results Stored in Specialized Mailbox
  • 25. Mailboxes can be moved together or separately • Allows for different storage hardware, DAGs, RPOs, RTOs, etc. • Exchange 2010 SP1 supports: • Primary and Archive On-Premises (Same DB) • Primary and Archive On-Premises (Different DBs) • Primary and Archive in the Cloud • Primary On-Premises and Archive in the Cloud *Requires Exchange Server 2010 Service Pack 1
  • 26. Alert Modify Protect Redirect LESS RESTRICTIVE MORE RESTRICTIVE Classify Append Review Block • Apply the right level of control based on the sensitivity of the data • Maximize control and minimize unnecessary user disruptions
  • 27. Transport Rule action to apply Rights Management template to email or voicemail messages • Support for scanning of attachments and searching of protected email Transport Protection Rule • “Do Not Forward” policies available by default • Information protection across PC, Web, and mobile device
  • 28. Hosted Service On-Premises Software Internet SMTP Hub Transport Server Mailbox Server Client Access Server Antivirus and anti-spam protection for Exchange Server 2010 Server Roles • Multiple scan engines throughout the corporate infrastructure • Tight integration with Exchange maximizes availability and performance • Easy-to-use admin console for central configuration and operation
  • 29.
  • 30. • • • • • 30
  • 31. Exchange Control Panel Microsoft Online Portal • • • • • • 31
  • 32. External Mail Hub Transport Mailbox • • • • 32
  • 33. Migration Options Cutover migration Staged migration IMAP migration Hybrid Exchange 5.5 X Exchange 2000 X Exchange 2003 X X X X Exchange 2007 X X X X Exchange 2010 X X X Notes/Domino X GroupWise X Other X
  • 35. • • • 35
  • 36. • • • • Exchange 2010 is not required Exchange 2003, for simple coexistence features 2007 or 2010 36
  • 37. • • • • • • • •
  • 38. 39
  • 39. 40
  • 40. 41
  • 41. 42
  • 42. • • • • • • • • • • • • • • • • •
  • 43. Internet Access and Performance Considerations • Identify Data • Center Used for • Hosting • • Access Considerations • • Identify Data • Center Used for Hosting •
  • 44. What certifications and capabilities does Office 365 hold? Is cloud computing How does Office 365 Security • • secure? support customer • Is Office 365 secure? compliance needs? • Do I have the right to audit Microsoft? • Does Microsoft have a formalized continuity program in place for Office 365? • Does Office 365 have the ability to recover from a • What does privacy at disastrous event? Microsoft mean? • Are recovery plans in • Where’s my data? place and tested regularly?
  • 45.
  • 46.
  • 47. At Microsoft we follow a process we call the Security Development Lifecycle. We take services from the design, through the build and implementation and release phases of its lifecycle, and consider security from all aspects
  • 48. At Microsoft, our strategy is to consistently set a “high bar” around privacy practices that support global standards for data handling and transfer • • • • • • •
  • 49. • • • • • • • • •
  • 50.
  • 51. • This saves customers time and money, and allows Microsoft online to provide assurances to customers at scale.
  • 52.
  • 53.
  • 54.
  • 55. • • • • • • • • Self-Deployment Recommended Partner Microsoft Premier Deployment • • • • • • • •

Hinweis der Redaktion

  1. SituationIT and business needs have evolved and Exchange has evolved with them.Slide objectiveGive users a high-level overview of Exchange 2010 benefits.Talking pointsExchange Server 2010 helps you achieve new levels of reliability and performance by delivering features that help simplify your administration, protect your communications, and delight your users withgreater business mobility.Flexible and Reliable Tailor your deployment based on your needs.Keep email continuously available for your users more easily.Anywhere Access Give users the freedom to securely access business communications—email,voicemail, and instant messaging—and collaborate effectively from virtually any platform, web-browser, or device.Protection and ComplianceSimplifyand automate the process of protecting your company’s communications and meeting regulatory requirements.It’s also worth noting thatExchange 2010 was designed,developed,and tested from the ground upwith a keen focus on our software plus services strategy. Let’s take a closer look at these areas.
  2. Situation:Email is business-critical and continuous availability is a must. Additionally, businesses need the flexibility to deploy email in ways that meet specific and ever-changing needs.Slide Objective:Show how Exchange 2010 meets customer needs for flexible, reliable messaging solution.Talking Points:Flexible and ReliableFlexibility to tailor your deployment based on your unique needsand easily keep email continuously available for your users.Core Exchange platform innovations include a new unified approach to high availability and disaster recovery. Through such features as Database Availability Groupsand online mailbox moves,you can more easilyand confidently implement mailbox. resiliency with database-level replication,maintenance,andfailover,all within familiar Exchange management tools. With online mailbox moves, users canremain connectedand productive during mailbox moves between Exchange servers.Role based security model allows you to delegate commonor specialized tasksto userswithout giving them full admin rights. For example, users can createand maintain their own email distribution groupswithout having to call the helpdesk. ~90% reduction in disk IO overheadcompared to Exchange 2003 enables more storage hardware options, from traditional storage area networks (SANs) to desktop-classdirect attached storage,enabling you to select the storage solution that offers you the best return on investmentand cost savings.
  3. Situation: As the importance of email communications in today’s workplace continues to grow, companies count on their IT staff to prevent email outages and data loss. Traditionally, customers have been required to deploy expensive shared-storage clustering and purchase 3rd party data replication products to provide full redundancy of Exchange Server services and data. Exchange Server 2007 introduced a built-in data replication technology called Continuous Replication, which significantly reduced the cost of deploying a highly available Exchange infrastructure.Running a highly available Exchange infrastructure still requires a great deal of time and expertise, because integration between Exchange Server and Windows Clustering is not seamless. Companies want an easier way to replicate their email data to a remote location, in order protect their Exchange environment against site-level disasters.Slide Objective:Position the new HA model as the evolution of previous HA methods, with significantly less cost and complexity.Talking Points: Exchange Server 2010 uses the same Continuous Replication technology found in Exchange 2007, combining on-site data replication (CCR) and off-site data replication (SCR) into a single framework called a “Database Availability Group.”Exchange Server Database Availability Groups handle all aspects of clustering internally. There is no need to manage failover clustering separately in Windows Server. Administrators can add replicated database copies incrementally (up to 16 total), and Exchange switches between these copies automatically as needed to maintain availability. Mailbox servers involved in clustering can host other Exchange roles (Client Access, Hub Transport, etc), so full redundancy of Exchange services and data can be achieved with just two servers. Legacy Exchange clustering (Single copy clustering, which was the only clustering option in Exchange 2000 and Exchange 2003) is being retired in favor of Exchange 2007-style clustering. 3rd party replication products will still be supported. The new high availability architecture provides simplified recovery from a variety of failures (disk-level, server-level, and datacenter-level), and can be deployed on a variety of storage types (as described in the previous slide).
  4. Situation: Administrators commonly move mailboxes between servers and databases as part of maintenance activities or when migrating between Exchange versions. Currently, when an administrator moves a mailbox, this takes the user offline for the duration of the move, leaving them no access to email. As mailbox sizes have grown, mailboxes take longer to move, so administrators have been forced to perform mailbox moves at night and on weekends to minimize disruptions for end users.Slide Objective:Describe how give administrators can use the new online move mailbox process to perform Exchange maintenance and migrations without sacrificing their evenings and weekends. Talking Points: In Exchange 2010 mailbox moves can be done in online mode: users remain can send, receive, and read mail while the contents of their mailboxes are moved to a new location. Maintenance activities can now be performed during the day, rather than a nighttime or weekend maintenance window. Migration to Exchange 2010 (whether Exchange 2010 is deployed on-premise or online) can be accomplished faster and with less end user disruption.
  5. Situation: Delegated administration has greatly improved with each release of Exchange Server, but Exchange 2007 still required modification of ACL’s to create specialized administrative roles (i.e. Compliance Officer role). In Exchange 2003, managing permissions required customization of ACL’s (about 560 ACE’s in total). A whole whitepaper dedicated to ACL modification. In Exchange 2007, property sets made it easier, but doing split permissions was still complicated and required ACL modification. A lengthy E2k7 whitepaper was written how to do this for Unified Messaging. Permissions were focused on AD objects, and didn’t map 1:1 with tasks.Slide Objective:Exchange 2010 Role-Base Access Control (RBAC) capabilities allow Exchange administrators to easily create specialized administrative roles. This delegated administration. Talking Points: Roles-Based Access Control (RBAC), in Exchange 2010, simplifies the administrators ability to create specialized roles with specialized actions. For example: Creating a helpdesk administrator role who only has the ability to create new mailboxes or change mailbox quota or message size limits. Creating a specialized Telephony Specialist role, who’s permissions are limited to managing UM dial plans. Creating a specialized compliance officer role, who’s permissions are limited to performing cross-mailbox searches for legal discovery. Creating a human resources role, where individuals assigned to this role are only able to update employee contact information. Creating a branch office administrator role, where they only have permissions to modify details for mailboxes within the specific branch (Organizational Unit or OU). Roles-Based Access Control is simple to manage. Administrators will use the Exchange Management Shell to: Create Roles to define/grant the set of operations for a specific user (i.e. ability to create a new mailbox, or set mailbox quota limit). Define Scope of where the operations can be run (i.e. a specific organizational unit, like North America OU or Finance Dept).Assign the roles and scope to a set of users (i.e. Unified Messaging Admin, Helpdesk Admin, Compliance Officer, etc…). What required an entire whitepaper (in E2k7) to create a specialized Unified Messaging role, can now be done in Exchange 2010 with a single cmdlet in the Exchange Management Shell.
  6. Situation: The largest percentage of helpdesk calls incurred by an organization using Exchange include: Distribution Group management, message tracking, changes to personal information in address book, and other similar tasks. The annual cost of helpdesk support staff for email systems with 7,500 mailboxes is approximately $20/mailbox. This cost goes up the smaller the organization. (“Email Support Staff Requirements and Costs: A Survey of 136 Organizations”, Ferris Research, June 2008). Slide Objective:Exchange 2010 Role-Base Access Control (RBAC) capabilities allow Exchange administrators to give selective self-management capabilities to end-users. By moving self-service tasks to end-users, organizations can reduce the costs for helpdesk support, and allow IT staff to focus on more important tasks.Talking Points: Roles-Based Access Control (RBAC), in Exchange 2010, allows IT administrators to move specific self-service tasks to end-users. Distribution Group management – End-users can create new DG’s, manage memberships and ownership, as well as delete DG’s. Message tracking – End-users can track delivery receipt information of all messages sent Editing personal information in address book – End-users can modify select user information, such as mobile phone number. End-user self-service management is performed through a web-based management interface (aka. Exchange Control Panel). Other typical end-user tasks/options will be moved from to this web-based management interface, such as: Out of Office, Inbox Rules, Mobile device management, etc…
  7. Situation: Employees wonder why they can’t get large (multi-gigabyte) storage limits for their work email like they can for their personal email accounts (Hotmail, Yahoo, Google, etc.). Exchange Server 2007 enabled organizations to deploy new storage configurations (Direct Attached storage) and offer larger mailboxes to their employees. Storage costs still remain a major expense in most Exchange environments. Slide Objective:Emphasize that Exchange 2010 provides administrators unprecedented flexibility in choosing a storage architecture.Talking Points: WithExchange Server 2003, if you wanted to deploy a highly available (clustered) infrastructure, the only storage option available was a Storage Area Network (SAN). Exchange Server 2007 added the ability to use Direct Attached Storage in a clustered Exchange deployment, and reductions in disk input/output (IO) allowed greater freedom in disk choice.Exchange 2010 includes additional improvements to performance, reliability, and high availability that enable an even wider range of storage options:Exchange 2010 delivers a 70% reduction in disk IO from Exchange 2007 levels. This means that more disks meet the minimum performance required to run Exchange.IO patterns are optimized so that disk writes do not come in bursts. This removes a barrier that had previously limited the use of SATA (desktop class) disks.Exchange 2010is more resilient to storage problems. When corruption is caused by minor disk faults, Exchange automatically repairs the affected database pages using one of the database copies configured for high availability. When Exchange 2010 is deployed with advanced high availability (3+ replicated database copies), RAIDless architectures can be used, resulting in dramatic cost savings. This flexibility of storage a choice gives administrators the freedom to deploy large (multi-gigabyte) mailboxes without breaking their hardware budgets.
  8. Situation:Customers are looking for a way to stage an Exchange deployment as well as make the right decisions around securing the platform and reducing surface area for critical, Internet facing capabilities.Slide Objective:Highlight the flexibility and control a role based deployment model helps reduce installation time and ease rolloutTalking Points:Like Exchange 2007, Exchange Server 2010 is a modular system of five server roles–Edge Transport, Hub Transport, Mailbox, Client Access, and Unified Messaging – that reduces the time required for installation; minimizes manual, post-install configuration by the administrator; and limits the surface area available for attack to increase security. Administrators also gain the flexibility to deploy only the features and services necessary on a given server and manage accordingly. All server roles, with the exception of Edge Transport, can be deployed on a single server, and only the Hub Transport and Mailbox server roles are required for Exchange Server installation.
  9. Situation:Users are demanding the freedom to connect from wherever they areSlide Objective:Exchange 2010 expands on the investments we made in Exchange 2007...through innovations that help enable greater workforce productivityby giving users the freedom to securely access their business communications....including email…voicemail…and…instant messaging…as well as collaborate effectively...from virtually any platform...web-browser...or device. Talking Points:Next…is Anywhere Access. Exchange Server 2010 offers enhancements that can help your users…get more done…by giving them the freedom to securely access their communications…email…voicemail…instant messaging…and more…from virtually any platform…web-browser…or device. Exchange continues to be a leader…in empowering mobile workers…by delivering the best…three screen user experience available…through Outlook on the desktop…Outlook Web App via web-browsers…and Exchange ActiveSync for mobile devices.Your users can realize numerous productivity gains thanks to new features which help them…more easily organize and prioritize the communications in their inboxes...like the enhanced conversation view powered by Exchange 2010.  Transform your traditional voicemail experience with Exchange 2010…which can replace your aging…and costly voicemail systems…as well as offer new innovations…like speech-to-text previews of received voice messages…and the flexibility for your users to create customized voicemail menus and call handing rules to ensure important calls are given top priority.Lastly…Exchange 2010 adds a full featured…rich web-based email experience on a range of browsers…including Internet Explorer….Mozilla Firefox…and Apple Safari. We continue to offer native support for virtually every mobile device...including a premium experience with Windows Mobile...through Exchange ActiveSync. With the mobile device policy advancements found in Exchange 2010...you have a great…out-of-the-box option for delivering mobile email to your workforce without being locked into a specific device or service platform.
  10. Situation:People are getting more and more email. Inbox overload is now a frequent issue for information workers. Statistics show that over 10% of IWs feel their email is totally out of control. Volumes of email are increasing and people need new tools to manage this information or risk “drinking from the fire hose”. Conversation view is designed to specifically address this growing problem of massive amounts of information by allowing users to more directly control their email and put it into context.Slide Objective:The audience should walk away understanding that we provide powerful new ways to filter, view, organize and manage their email. We provide systems to make them more efficient to handle the larger amount of information they are receiving and set them up to effectively handle and interact with that information.Talking Points: Filters help you find what you’re looking for in a mailbox; and in search results. Conversation view is a whole new paradigm for how you read your mail that will greatly enhance your productivity. Conversation view helps you put messages in context knowing both how they fit into the conversation thread as well as if they are a branch of the main conversation. Conversation view enables you to manage a conversation as a single item in your inbox; including moving or “ignoring” all current and future messages within the conversation.
  11. Situation:People send embarrassing emails (or worse) to the wrong recipients (think MS email of reporters dossier to that reporter, RNC lobbying efforts though White House accounts, or pharmaceutical email sent out with all recipients names visible); MailTips is designed to make sure your communications are right the first time and to avoid such embarrassing mistakes.Slide Objective:The audience should walk away from this slide seeing that Exchange helps users send more effective messages the first time. It helps them not send messages to which they will get an OOF response and avoid sending mail to external recipients or large lists of people that might create an embarrassing mistake. Talking Points:Know someone is OOF before you send a message (look at the oof and send to the right person from the start).Be alerted to important issues like external recipients or large lists of people this will be sent to.Know internal rules that will block your message from being sent before you send it (too many attachments, too big of an attachment, recipient can’t receive the message, and other custom rules defined by the system administrator).
  12. Situation:Unified Messaging in Exchange 2007 took a major step towards providing a universal inbox by helping users manage their voicemail and email in the same place. Triaging voicemail remained a task separate from that of email as users had to have speakers available and find themselves a private location to listen to potentially confidential or private voicemails. Providing a simple text based transcription of voicemail provides users a quick and easy way to identify the importance of a voicemail and how to prioritize a response without having to necessarily play the audio over a phone or PC. This becomes particularly valuable when checking in with email and voicemail while on a mobile device or while in a setting, such as a meeting, where listening to a voicemail is not possible.Slide Objective:The audience should walk away understanding that we are taking our past investments in Unified Messaging even further in the next release of Exchange. With further enhancement of UM to include text-based transcription of voicemail, we provide users more choice when consuming voicemail message and further integrate voicemail into the universal inbox.Talking Points:Text transcription of voicemail within the body of the voicemail message in the inbox.Embedded media player side-by-side with text transcription to enable users to play voicemail as necessary.Inbox rules which trigger on key words and phrases can now apply to voicemail as well as email.Confidence level of transcription reflected visually in the text.
  13. Situation:As information overload becomes more commonplace, individuals take more advantage of features of Exchange and Outlook such as Inbox Rules to manage how inbound communication is directed to make them most efficient in their daily work. The integration of voicemail into the Inbox with Unified Messaging brings with it the opportunity to use similar tools to manage how inbound phone calls are processed to further enhance communications with personal auto attendant.Slide Objective:The audience should understand that they have a powerful new way to manage incoming phone calls in a UI and paradigm which is familiar and easy-to-use. They should feel that they can tailor their voice communication in similar ways to which they have been tailoring email communication over the years with Outlook and Outlook Web Access Inbox Rules.Talking Points:Create rules which present customized menus to individuals or groups (or everyone) allowing you to direct their calls based on tailored options that relate to your business.Ensure that top priority communication is routed directly to you via “find me” functionality which can be configured to ring all contact phone numbers sequentially.Modify auto attendant simply and easily via Outlook or Outlook Web Access whenever required; like setting a custom menu when you are out of the office.
  14. Situation:People use many different platforms to communicate these days. From getting a message on the go on your cell phone to sending out a contract proposal at a desktop; users are looking for ways to keep in better touch as their mobility increases. Access though Macs, PCs, Web Browsers and Cell phones all are a critical part of the connected infrastructure that allows businesses to increase their productivity and decrease decision making time. Slide Objective:The Audience should walk away understanding that Exchange is providing the one stop for their communications needs. Exchange inboxes will be accessible from a wide variety of platforms and technologies. This broad access to rich Exchange data experiences allows them to be more flexible in their organizations while still having a consistent management story on the administrative side. This means lower costs with greater support for the platforms their organizations chooses to use; lower cost, greater choice.Talking Points :Rich desktop clients are available for both PCs and Macs though Outlook and Entourage.Rich web browser access to OWA premium is now available for 99% of the browser market. Users can use IE for the premium experience they have come to expect, or use Safari and Firefox for very similar premium experiences. OWA Lite is still available for those with restricted bandwidth or accessibility needs.Exchange ActiveSync (EAS) is fast becoming the standard for Push email to smartphones. For almost any smartphone that an organization has decided to support, there is an Exchange ActiveSync enabled client available.
  15. Situation: Having a view of not only your calendar, but others calendars is critical to being productivity. From a parent who needs to see a spouse’s calendar to know who’s night it is to pick up the kids, to the ability for team’s to share a calendar of critical events for all of the team members. Shared calendars are necessary to raise the level of productivity for the group. Likewise, coordinating with people outside your organization ahs been a manual process that now can be accomplished with the ease that we allow people to share calendars internally. This makes scheduling meetings with external partners fast, efficient and effective.Slide Objective:The audience should walk away form this slide understanding that we’ve really gone from just holding your calendar to allowing you to flexibly use your calendar and interact with others, internal and external, though your calendar.Talking Points :Customers can now share their calendar externally the way they currently share them internally.Customers can now view multiple calendars in OWA.
  16. Situation:Tighter regulatory requirements and growing email volumes require greater vigilance to prevent data breaches.Slide Objective:Give a high-level overview of IPC benefits in Exchange 2010.Talking Points:Protection and ComplianceExchange Server 2010 adds integrated information protection,control,and compliance toolsto help simplifyand automatethe process of protecting your company’s communications and meeting regulatory requirements.New,integrated email archiving capabilities support preserving and discovering email datawithout changingthe user or IT Pro experience. For example,users can easily “drag and drop” emails from their .PST files into a new Exchange 2010 personal archive,which can be managed throughmore flexible retention policies,including a new legal hold feature that can preserve any emails a user deletes or editsfor future e-Discovery purposesor other compliance related needs. Users can easily access archived email in both Outlook 2010 and Outlook Web App,helping you eliminate the proliferation of .PST files on your network.New,web-based multi-mailbox searchcan be delegated to specialized users such as compliance officers to conduct discovery searches across both the primary and archive email data.New Transport Protection Rules help safeguard sensitive business informationby enabling you to automatically apply Information Rights Management policies to both email and voicemails,after a message is sent,based on a range of message content criteria. Users can easily readand author IRM-protected messages natively through Outlook Web App without plug-ins or extra steps.
  17. SituationBecause of growing and changing regulatory environments, organizations need custom, easy-to-implement email archiving capabilities that do not interfere excessively with user workflows.Slide objectiveAudience should understand how they can get robust email archiving and discovery tools without burdening the IT department or users.Talking pointsExchange Server 2010offers you new,integrated email archiving toolsthat can help you preserveand discover email data,without having to change the way your usersor IT adminswork with and manage Exchange.Introduced in this latest releaseare such features as: A personal archive that seamlessly surfaces in both Outlook and Outlook Web App. This secondary mailboxappears a set of foldersin your users’ email clients,allowing them to use familiar tools and actions to manage both live and archived email data. For administrators,the very same admin tools used to manage other aspects of Exchange,such as the Exchange Management Consoleor PowerShell,can be used to configureand enable this personal archive. Retention policiesthat allow IT staff to define,deploy,and automate the expiryand archiving of email data. These new policiesare both granularand flexible,and can be set at either the folderor item level. New to Exchange 2010 is a legal hold policythat,when enabled on a user’s mailbox,retains any editsor deletions made by the user under hold. This new feature also addsa single item restore capabilityto help undo accidental user deletions,without having to restore from apoint in time backup. The new,easy to use, web-based multi-mailbox searchthat can be delegated to specialist users—such as a compliance officeror human resources personnel—to conduct e-discovery tasks,without having to generate additional overhead for the IT department.Together,these integrated email archiving,retention,and discovery capabilities form just one aspect of our large mailbox strategywhich includes all of the great Exchange Server 2010 mailbox resiliencyand storage performance innovations,as well as choice in storage hardware we’ve already discussed.
  18. Situation:The explosive growth of regulatory compliance and corporate governance requirements has made it challenging for email administrators and compliance officers to provide end users with simple tools for managing retention policies of the high volume of email messages being sent and received daily. It is impractical for a small group of people to police email to this end directly, so tools which enable end users to apply retention policies which are defined by the organization and tools which automatically apply such policies without IT intervention are required to effectively mitigate the risk associated with compliance and governance.Slide Objective: The audience should walk away understanding that Exchange increases flexibility and functionality allowing retention policies to be applied to emails individually or at the folder level. IT administrators and compliance officers can define policies and distribute them to select groups of users ensuring that users choose from only policies which are appropriate for their role in the company.Talking Points:Retention policies can now be applied to any individual email or folder rather than just a restricted set of managed folders.Policies are defined centrally and pushed to the client, exposed directly to users in the UI for selection or notification.Transport rules can be designed to automatically apply default policies for select groups of users or based on select attributes of email.
  19. Situation:Traditional email systems require complex access control policies and provide hard to use tools in order to meet the growing needs of eDiscovery and requirements of Human Resources departments relative to searching corporate communication throughout the email infrastructure. Those responsible for these tasks are non-IT users who are unfamiliar with email administration tools and do not have access to the email servers. These compliance officers and HR representatives are having to follow complex processes and use complex tools, aided by IT, to handle what is already a complex problem due to legal and corporate governance. Solutions are required which empower these individuals to go about their business without IT intervention and which ensure that only those assigned by the organization to perform such tasks are able to.Slide Objective:The audience should see that Exchange goes beyond traditional administration models to empower delegation of tasks associated with compliance away from the email administrator and put these tasks into the hands of those responsible with easy-to-use tools.Talking Points:Cross-mailbox search user interface enables compliance officers and HR to perform searches based on select email attributes across the entire mail infrastructure.Roles based administration allows for easy delegated access to this tool with no complex Access Control Requirements.eDiscovery processes may be followed without IT intervention and only by those authorized.Compliance officers and HR representatives use familiar and easy-to-use tools within the existing UI of Outlook Web App (compared to Get Mailbox PowerShell commands in E2007).
  20. Situation:One of the common concerns around information protection and control (or data loss prevention) systems is that the system will generate false positives and restrict mail that didn’t need to be restricted. Slide Objective:Audience learning: with Exchange 2010, administrators can better control sensitive data while minimizing disruptions and maintaining everyday workflow. Talking Points:With the addition of so many new controls to Exchange 2010, administrators can now fine tune their policies so that the right level of control is applied to the right email. We define it here as the application of soft and hard controls.  For example, an administrator may want to provide an automated alert to users whenever they are sending to an external audience without necessarily blocking that mail. This is where MailTips can be useful. Further down the continuum, an administrator could create a Transport Rule that applies enterprise rights management encryption automatically based on specific content within the email.  There is always the option of blocking or re-routing an email altogether. Even in these cases, detailed transport rules can be developed that only work on very specific scenarios, whether it be a particular user or group of users, message types, regular expressions (such as a social security number) – even keywords within Microsoft Office system file attachments, such as a Microsoft Excel® spreadsheet. 
  21. Situation:Electronic communications is ubiquitous today. The ease of transmitting email and information attached to email also increases the risk of unauthorized viewing and distribution. Leaks of confidential information can result in lost revenue, compromised ability to compete, unfairness in purchasing and hiring decisions, diminished customer confidence, and more. This risk demands solutions which are not only secure but easy to apply, whether its to messages sent inside an organization, outside the organization to partners or, as is increasingly the case, to a hosted archive service. While users can already apply RMS manually to an email, Information Leakage Protection (ILP) becomes even more effective when this protection can be applied automatically, based on rules defined by the administrator. This not only eases the burden on the user to protect company IP within email but ensures better, more consistent compliance with corporate policies. Slide Objective: The audience should understand that RMS can now be applied through Transport which, in turn, paves the way for broader, more granular ILP as well as protection of voicemail. Talking Points:Protect voicemail messages with the same core technology as you protect email, documents, spreadsheets, and presentations.Apply RMS automatically in Outlook or through Transport rules.Leverage the same rich Information Rights Managements experience in OWA as you have become familiar with in Outlook.Encrypt message in transport without the complex requirements of PKI and S/MIME.Ensure governance and compliance requirements are met by archiving protected messages in the clear alongside the encrypted message if required.Automatic RMS protection of email and attachments can be done through: An Outlook add-in. RMS is activated based on the sender’s department, the identity of the recipient (user or DL), and whether all recipients are internal or not.Two RMS templates are offered by default: Do Not Forward or Internet Confidential (mail is protected but user has rights to forward, copy, etc.). Others can be added. The activation can be overridden by user. Transport rules which key off of email attributes (e.g. sender, keywords, subject line)
  22. Situation:Most customers already have some form of anti-malware engine in place. But viruses continue to be a problem. That’s because when new threats are discovered, the time it takes for scan engine vendors to release antivirus signatures to detect them varies greatly—in some cases by days or weeks!Slide Objective:The audience should learn how Forefront products provide superior spam and virus filtering through multi-engine architecture, automatic updating, and streamlined management.Talking Points:The Forefront Protection for Exchange Server (FPE) engine set is proven to promote faster detection rates of new threats than single-engine solutions (AV-Test.org). Administrators can run up to five scan engines simultaneously and in different combinations at Edge, Hub, and Mailbox servers. An AV-Test of consumer antivirus products revealed that, on average, Forefront engine sets provided a response in 3.1 hours or less, while single-engine vendors provided responses in 5 days, 4 days,and 6 days respectively. The diversity of antivirus engines protects against a single point of failure. Forefront Protection for Exchange Server manages these engines so that if one engine fails or goes offline to update, other engines continue to protect the IT environment without slowing mail delivery. Forefront also manages all updates, consolidating from al 5 engines and pushing them out customers, automatically. This automatic – and continuous – updating services also applies to Forefront's new anti-spam content filter, which is licensed from Cloudmark. Recent independent test revealed a 99% spam detection rate with Cloudmark, ranking it among the top content filters ion the market today. Now another advantage of Forefront is the option to offload your security management to the cloud for lower TCO, with Forefront Online Protection for Exchange. Forefront Online Security for Exchange includes comprehensive Service Level Agreements (SLAs) that include:5-9s network uptime100% protection against all known email virusesA spam Capture of at least 98% and a False positive commitment of less than 1 in 250,000 emails Customers also have the advantage of combining with an on premises installation with cloud services for hybrid protection. With Forefront’s new unified management functionality, you can manage security settings for all three products from one console.
  23. Office Professional PlusWith Microsoft® Office Professional Plus, you get the latest version of the Office applications, seamlessly connected and delivered with cloud services, so you can access your documents, email, and calendars from virtually any device. Office Professional Plus includes the new Office Web Apps, online companions to Word, Excel, PowerPoint, and OneNote, which let you review and make light edits to documents directly from a browser.Features:The flexible pay-as-you-go, per-user licensing of Office Professional Plus provides your organization with purchasing flexibility, and robust management and deployment tools give you the IT control to adapt to evolving business needs.Master your inbox and calendar with Conversation View and other advanced management tools in OutlookLeverage the power of business and social networking right within Outlook with the Outlook Social ConnectorCollaborate with control and confidence with co-authoringInstantly share slideshows, across town or around the world with PowerPoint Broadcast Slide ShowCreate presentations that are as brilliant to watch as they are easy to create with new video and photo editing tools in PowerPoint Quickly work with hundreds of millions of rows of data in Excel. Transform enormous quantities of data into meaningful information Work from virtually any place and any device with the Office Web Apps 1SharePoint OnlineMicrosoft® SharePoint Online brings together the familiar SharePoint Server technology now delivered as an online service making the power of the cloud work for your business. SharePoint Online provides a central place where people can create sites to connect colleagues, partners and customers. Features:Access to a personal site for individuals to store documents, share interests and quickly access their content from anywhereDesigned to work with the Microsoft Office applications individuals having been using for decadesBusiness units or workgroups can create team sites to share documents, task lists, and schedules to keep everyone in syncCreate project sites using SharePoint Online to automatically track documents, monitor project tasks, and milestonesCreate sites to communicate business priorities and information to the entire organization Build vibrant and engaged communities inside and outside your organizationCreate sites to manage and share information securely with partners and customers Social Networking capabilities such as activity feeds, blogs and wikis to help build community Financially-backed, guaranteed 99.9% uptime Service Level AgreementPlatform FeaturesSingle Sign OnToday in Microsoft Online Services, users have an Online services identity that is separate from their domain login and password. A sign in application runs in the system tray of each user’s machine, which stores their Online password, so they don’t have to type it in every time. It’s a workable solution that achieves a single-sign-like experience. When the 2010 server products come to Microsoft Online, you will be able to use Active Directory Federation Services, an enterprise-class tool for federating your Active Directory with Microsoft Services. Your employees will be able to access services with their domain credentials, the same way they access the on-premises applications they use today, and there will no longer be a need for a sign-in tool.With ADFS you can also customize the login page used for authenticating OWA users (the same page is used for other federated web-based applications)Let’s look closer at how ADFS 2.0 (also known by its code name, “Geneva”) works. Geneva is a web download for Windows Server 2008. To enable federation with Online Services, you first set up a Windows 2008 server and install ADFS as a server role. Then you use a “Federate with Online” tool/wizard to set up a trust between on-premises AD and Online Services. Once that is in place, when users accesses Exchange Online, they are redirected to the local Geneva server for authentication first, and then a SAML token is passed to the cloud service to log the user in. Passwords are not synchronized to the cloud, or stored there. User benefits: Overall benefit for end users is improved productivity No usability issues with remembering two identities and passwords – lower confusion and frustration Common experience across Online Services (Sharepoint Online, OC Online, etc) in Wave 14Administrator benefits: Overall benefit for IT is better manageability and lower TCO Since it is a server-side solution, they don’t have to spend time deploying and maintaining a client-side application Passwords are not synchronized to the cloud. Microsoft never sees credentials or password Enterprises retain security control over user accounts and password expiry Low touch, easy to set up and manage -- no change to AD code or alteration of enterprise deployment of AD is required Decreased helpdesk calls from end users forgetting their passwordsOther benefits: With ADFS, you can deploy multi-factor authentication. This includes soft certificate and smartcard authentication out of the box (not RSA or Swivel)You can customize the login page for Exchange Online and your other federated Web applications (keep in mind it’s the same page as used for all federated web apps, not just OWA.Richer Admi InterfacesThe way to manage your Exchange Online environment today is using the Microsoft Online Administration Center (MOAC). The web-based interface is easy to use but currently it is fairly limited in terms of administrative power. Exchange 2010 gives you a much richer set of tools to manage and customize your Exchange Online environment.Microsoft Online Admin Center Exchange 2010 includes a number of new native web-based management features, which are collectively referred to as the “Exchange Control Panel,” which enhance the capabilities of the Microsoft Online Admin Center.Exchange Management Console:For managing an on-premises Exchange Server installation, the tool of choice for administrators has long been the Exchange Management Console. In Exchange 2010, you can use the robust capabilities of this familiar tool to manage your cross-premises Exchange environment.Remote PowerShell: With Exchange 2010, the robust scripting capabilities of PowerShell now extend to the datacenter, allowing you to manage their hosted environment across the Internet.The introduction of these management capabilities means that you can move your environment to cloud without giving up control. You can offload task while retaining control over essential management features. You can let the Microsoft datacenter staff manage servers, hardware, and storage, but still retain control over settings and configuration, and rolling out features that are visible to your org.Let’s take a closer look at each of these management tools.Simplified UIFor the Standard offering, we will be providing a new user experience. Today, we have four different portals depending on the usage needs. In H2 2010, we will be consolidating the subscription, administration and end user portal into one. We will have role based access capabilities that will only allow users to access and see the features that they have rights too. Another significant improvement tied to the previous slide is we will be removing the need to have a sign-in client for users of ADFS or non-ADFS. End users will be able to managed their Online password (non-ADFS users) directly with the portal. To ensure end users working with Office clients to have best possible experience. We will be provide customer a service connector that automatically updates the PC with the correct patches to ensure Office works well with Online. This is only required when working with Office clients. Web scenarios do not require the Service Connector.Here are some of the other key UI design goals: Consolidate Separate ExperiencesOne site, one navigation system across the entire lifecycle of learn/try/buy/manageGetting setup is done through one site, end-to-endOne login, one identity across all experiencesShared look & feel for all workloads within the platformGetting Started with Online is EasyUsers don’t require a Live ID to sign-up & setup, instead reserve a namespace & login ID for themselvesUsers set their own initial password for their trialInitial Sign-up process is simplified and very lightweightYour prescribed setup tasks are based on your answers to a “setup assessment”Updated Information Architecture Revised organization of top-level elements, MOCP/Marketing/MOAC are now all represented at the top levelFlatter navigation scheme (2 levels instead of 3)Improved page types:Standardized, toolbar-style grids with filteringFull-page wizards & property sheets for simpler layouts & localization optionsExtensible, Consistent Workload Marketing & Management ExperienceWorkloads can create consistent Service Cataloging pages in our catalogConsistent Deep-link pages for each service organized in a common wayConsistent Header link within workloads to return to the central management consoleNew platform requirementsOperating System RequirementsXP SP3 with RPC over HTTP patchXP Home and Media Center edition only for managed identity deploymentVista SP2 Windows 7Mac OS X 10.4 (Tiger), 10.5 (Leopard), 10.6 (Snow Leopard)Office Client RequirementsOffice 2007 SP2 and aboveInvestigating support for Outlook 2003 with Exchange OnlineInvestigating support for Office 2003 with SharePoint OnlineOffice 2008 for Mac & Entourage 2008 Web Services EditionService Connector with .NET 2.0 or later (highly recommended)New Office Communicator ClientMac Messenger 9 Browser RequirementsInternet Explorer 8 is required for XP Internet Explorer 7 for Vista users Firefox 3.xSafari 4.x
  24. Slide objectiveExplain the management tools available to an Exchange Online administratorTalking pointsMOP = Microsoft Online Portal used to manage users and licenses for online services.ECP = A companion management interface for on-premises IT Pro. & The interface for specialists who perform delegated management tasks. Exchange Control Panel:New self-service capabilities are accessible through a Web-based management portal which is based on the same technology as Outlook Web App and can be run on IE, Safari or Firefox.Users can reach the Exchange control panel through the options button in Outlook Web Appor from a link on the Microsoft Online PortalAll tools use the RBAC filters so users only see features they have access to – i.e. The Exchange Control Panel & Exchange Management Console are RBAC aware Remote PowerShell is the underlying technology for all the management tools—the Exchange Management Shell, the Exchange Management Console and the Exchange Control Panel
  25. The IMAP migration tool is completely web based. Admins specify the settings for their on-premises mail server (or a hosted server that supports IMAP), and follow a UI wizard to start the migration process. After this is done, Exchange Online will query the on-premise server to handle provisioning and data migration. Simple IMAP Migration supports migration from a wide variety of IMAP servers, including Exchange’s IMAP server implementation but not all content can be migrated using IMAP due to lack of support for Calendar, Contacts, Tasks, and other non-Mail items. Organizations migrating from Exchange 5.5 or 2000 could use this method for mail-only migration. However, it is more likely that they would do staged migration, or use partner tools, to migrate full mailbox content.
  26. Exchange Online provides a quick, low-impact option for moving from Exchange 2003/2007 to the cloud. This migration method is designed for customers who want to migrate their on-premise or 3rd party hosted Exchange 2003 and 2007 mailboxes into Exchange Online and who do not have complex requirements like coexistence, federation, off-boarding, etc. Companies who have deployed Small Business Server 2003 or 2008 will also be beneficiaries of this feature. This option is for customers who want to migrate their users and corresponding data from on-premise Exchange servers to Exchange Online with ease and with as little change as possible on their environment, and can do an “all at once” cutover of users to the cloud. Exchange cutover migration will provide a complete migration solution by first re-creating the on-premise directory in Exchange Online (i.e. provisioning), then migrating the mailbox data from on-premise to the datacenter. Admins will initiate and monitor the progress of their migration from one common place, as there is no need to do provisioning and data migration as separate steps (as is the case for IMAP Migrations). The admin only needs to provide credentials for a user with permissions to other mailboxes on-premise and enable Outlook Anywhere on-premise (RPC/HTTP). The rest of the migration process will be driven from Web-based GUI in a few simple steps. This migration method uses the RPC/HTTP protocol to provide migration with the highest fidelity.
  27. Exchange Online supports Exchange Web Services (EWS). EWS is a unified API for accessing Exchange mailbox data that has existed since Exchange 2007 and the original launch of Exchange Online.EWS offers three main benefits:It is the richest, most functional, and most versatile API for Exchange. It supports all new features Exchange 2007 and 2010 offers. The one API can be used in the various application models: you can build the Exchange information into your own client application, you can mash Exchange information into your Web portals, or you can even use Exchange data into your processes.Examples of the first are Entourage for the Mac or Apple’s iMail in Snow Leopard. Or the display of free/busy information in Communicator, or how Communicator can store conversations into your Conversation folder in Exchange.Examples of the second are Webparts, like used in SharePoint or Dynamics CRM, or various University portals of Live@Edu.Examples of the third are Google using EWS to synchronize the contact list with their Android based mobile phones, or the displays Microsoft conference rooms have showing who has reserved such conference room. Also Dynamics uses EWS to sync its data with Exchange 2010.It is easy to use, for any Visual Studio developer will feel familiar with the two major programming paradigms supported: Web Services.NET.In Exchange 2010 we have added a full implementation of the EWS API in Managed code, supporting .NET 3.5 SP1. Using this API increases productivity tremendously for you need less lines of code and have full support of IntelliSense in Visual Studio, with autocomplete and inline help.The last benefit is that given Exchange always use Web Services to communicate with the server, even if you implement the application in the EWS Managed API, it is the same code that can be run against an on-prem implementation as well as against an online implementation. Applications can reside locally on the CAS server or can connect via the Intranet or via the Internet.
  28. The Security Program takes a risk-based, multi-dimensional approach to putting in place the necessary & adequate safeguards across all aspects of a service. The Program aims to define security requirements applicable to people, processes and technology, and implement corresponding controls & capabilities across the services themselves, the supporting platform and infrastructure components, as well as the hosting facilities and the hardware residing within them. Role & Responsibility of the Security Program: Help ensure services are developed in a secure manner. Microsoft’s Secure Development Lifecycle plays a critical role here. Help ensure the services are operated in a secure environment. Security controls exist across and within all layers of a given service, which supports the principle of defense-in-depth.Help ensure that services and infrastructure are monitored for configuration errors, vulnerabilities, security events and anomalous behavior.Help ensure incidents are promptly detected and a mature incident management process not only addresses the immediate issue, but identifies and corrects the cause.Help ensure personnel are adequately prepared and trained to identify security issues and provide notification through the appropriate procedure.
  29. PLEASE CONSULT OUR INTERNAL FAQs to understand latest information on compliance: https://spsites.microsoft.com/sites/RM/RMdocs/Wikis/Sales/Compliance.aspx What security policies does Microsoft follow for Microsoft Online Services? External:Microsoft Online Services Information Security Policy is based on ISO 27002 directives augmented with requirements specific to online services. (In the online space, for example, Microsoft Online Services requires that all major service releases must undergo web penetration testing; any critical vulnerabilities discovered during such penetration testing must be resolved prior to releasing that service version to the web.)  The Microsoft Online Services Information Security Policy also incorporates additional requirements derived from best in class security practices and mapping of relevant international, national and state/providential requirements.   ISO 27002 is part of the ISO/IEC 27000 series of standards, published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) and is the renamed, updated ISO17799 standard.  The full name of this international standard is, "Information technology - Security techniques - Code of Practice for Information Security Management". The ISO27000 family of standards is intentionally broad in scope, covering privacy, confidentiality and technical security issues and  "established guidelines and general principles for initiating, implementing, maintaining, and improving information security management within an organization." To that end, the standard outlines hundreds of potential controls and control mechanisms.  ISO27000 was developed in the context of the following core principles:  “the preservation of  confidentiality (ensuring that information is accessible only to those authorized to have access),  integrity (safeguarding the accuracy and completeness of information and processing methods) and  availability (ensuring that authorized users have access to information and associated assets when required)”[1].At Microsoft we have a process we call the Secure Development Lifecycle. This is the process by which we take services from the design, through the build and implementation and release phases of its lifecycle, and consider security from all aspects. This is a process that is robustly documented and shared externally from Microsoft. It's in books, our websites, and it's a methodology that our customers can both learn about how Microsoft builds our services, as well as implement. It's detailed enough guidance that they can take that guidance and implement it on their own. As you look through the slide, you're going to see a couple key points that I think are really key controls in the SDL. One is the threat modeling and attack surface analysis, and that's the process by which we look at a service and we understand what are all the threats that could come in, and what aspects of the service are exposed that someone might look at to try and attack the service. And then we proceed to both minimize the attack surface by restricting services or eliminating functions that don't need to be there, and then the threats that we identify in the threat analysis throughout the various phases we implement and test controls to mitigate those threats, and with the end result being a service that is released to our customers that they can have great confidence in.
  30. Microsoft recognizes that privacy is a critical element of a highly secure computing experience. Customers have high expectations about how Microsoft collects, uses, and stores their data. Privacy is one of the four pillars of the Microsoft Trustworthy Computing Initiative, along with security, reliability, and business integrity. Microsoft commits significant resources to enhancing privacy protection, and as a result, privacy has been woven into the culture at Microsoft as an automatic priority in every area of the company. When customers consider privacy concerns about online services in general, they see a couple of examples in the marketplace about how companies treat data in the cloud. Some companies believe that they own their customers' data. Other companies don't disclose to their customers where their data is hosted or can't tell the customers where the data is hosted or accessed from. At Microsoft a key tenet for us from a privacy perspective is that customers own their data and should have access and control to it at all times. We also believe that we should disclose and be transparent with customers about where their data is and where it's hosted. We also adhere to strict legal requirements in markets like the European Union and elsewhere around the globe.Microsoft datacenters are strategically located throughout the world to provide seamless, around-the-clock access to Microsoft Online Services and to help keep data safe. Moreover, Microsoft goes beyond online services, offering a choice between on-premises and online deployment models by geography, workload, or role. This provides the customers with online services that are data compliant, flexible, as well as customizable. Microsoft Privacy efforts are focused around three key areas: technology, partnershipandcollaboration, and customer guidance and engagement. These privacy efforts provide the customers with control over their data and information, provide resources to help keep their data secure and private. Additionally, for customers in the European Union, Microsoft is Safe Harbor–certified with the U.S. Department of Commerce. This allows for European customers to legally transfer data to Microsoft for processing from within the European Union. At Microsoft our aim is to set a high bar for privacy and execute against it every time. We like to make our privacy practices available to customers through a variety of methods. One method we do is our privacy statement, which is available on our website, and customers can look at it to understand what we do from a privacy perspective. We also publish our code of conduct, and our subscription agreement when customers purchase our services online. We have a couple of other subscription agreements for enterprise customers that are also available for customers when they sign, and they all express to customers what our commitments to them are from a privacy perspective. And the last thing that customers can review to understand our privacy practices is to review our EU Safe Harbor certification, and that's posted online as well, posted on the FTC website.
  31. We use our compliance management framework to achieve a number of independent third party certifications that help our customers understand our controls and how effective they are.  The first certification you'll see on the bottom of the slide is ISO 27001. It's a key security control for us, and it's one that distinguishes us from other vendors in the marketplace. It's internationally recognized, and is used as the de facto standard for all information security management programs in most enterprise customers. You'll also see SAS 70. The combination of these two certifications allows customers to understand both the breadth and the depth of our security program and the controls and effectiveness that we operate them with.
  32. Microsoft® Office 365delivers the power of cloud productivity to businesses of all sizes, helping to save time, money and free up valued resources. Office 365 combines the familiar Office desktop suite with cloud-based versions of Microsoft’s next-generation communications and collaboration services: Exchange Online, SharePoint Online and Lync Online. Office 365 is simple to use and easy to administer – all backed by the robust security and guaranteed reliability you expect from a world-class service provider.Microsoft Office 365 Includes:Microsoft® Office Professional PlusThe world’s leading productivity tool now seamlessly connected and delivered with cloud services – for the best productivity experience across the PC, Phone and Browser.Exchange OnlineCloud-based email, calendar and contacts with always-up-to-date protection from viruses and spam.SharePoint OnlineCloud-based service for creating sites to connect colleagues, partners and customers.Lync OnlineCloud-based instant messaging, presence, and online meeting experiences with PC-audio, video conferencing and screen sharing. Key Microsoft Office 365 Benefits:Anywhere-access to email, documents, contacts, and calendars on nearly any device Work seamlessly with Microsoft Office and the other programs your users already count on everydayBusiness-class features including IT-level phone support,  guaranteed 99.9% uptime, geo-redundancy, and disaster recoveryPay-as-you-go pricing options which give you predictability and flexibility for all or part of your organizationLatest version of Business Productivity Online Suite (BPOS), which has millions of business users today Microsoft® Office 365 for small businesses offers an easy-to-use set of web-enabled tools for small businesses, independent consultants and professionals looking for business-class productivity services. Working with the tools people know and use today, Office 365 provides anywhere access to email, important documents, contacts, and calendars on nearly any device. It’s free for the first 30 days and then just $6 per user per month. Microsoft® Office 365 for enterprises brings together cloud versions of our trusted communications and collaboration software with our familiar Office Professional Plus desktop suite. It is designed to help meet your IT needs for robust security, 24/7 reliability, and user productivity.We have a variety of plans to meet the needs of businesses of all sizes and varying IT needs. Priced from $2 - $28 per month per user, each plan has the same 99.9% uptime guarantee and includes the security and support you expect from Microsoft. Office 365 offers great flexibility by allowing businesses to provide users access to only the services they need and pay-as-you-go pricing options. Microsoft® Office 365 for education provides your institution with the same great communication and collaboration experiences used in enterprises around the world while saving time and money. Microsoft Office 365 for education delivers all of this and more while training students on familiar software which employers depend upon.