Publishing Exchange used to be easy. You installed Microsoft Security and Acceleration (ISA) Server or Forefront Threat Management Gateway (TMG) and considered your work done. But with the changes in roadmap of Microsoft security products such as TMG and UAG, and the addition of features like ARR and WAP, the sea of TLAs has become more complex than ever. Come and learn what the real risks are when publishing Exchange to the Internet, what your choices are, which you should choose, and how to deploy them. There's a TLA for everyone when it comes to publishing Exchange, but make sure you know which is which and which one you need, if at all. The Windows team have added an additional component called Application Request Routing 3.0 to the Internet Information Service (IIS) role, which enables IIS to handle reverse proxy requests and also perform layer seven Load Balancing of these requests.
This session provides an overview of the new Dynamic Access Control capabilities built into Windows Server 8 and examples of how it is used for Compliance and Data Leakage Prevention. Administrators now have greater control over file server data by leveraging Active Directory claims, a more robust ACL model, Active Directory centralized authorization/auditing policy, and data classification.
This session will give a comprehensive overview of the security features of Lync. It will explain, how clients know which servers to trust, options for client authentication as well as what we are doing to encrypt communication between endpoints. The content of this session is based on real experiences from such discussions with security departments of several customers. Objectives: 1. describe Lync 2013 security capabilities. 2. determine how to position Lync when discussing with security departments. 3. convince the customer that Lync will meet their security requirements