With the proliferation of mobile devices as well as the flexibility of delivering mixed topology implementations of Lync, Exchange and other dependent systems, optimizing your security architecture has never been more important. Derek and team will cover: _x000D_ _x000D_ Security Framework: Confidentiality, Integrity and Availability _x000D_ Telecom and network security best practices _x000D_ Trends in authentication: Mobile devices, 2-Factor Authentication _x000D_ Encryption TLS and sRTP_x000D_ Resilient certificate management _x000D_ Mitigating the risk of denial of Service attacks _x000D_ Basic steps for protecting against minute theft _x000D_ Real life edge and reverse proxy scenarios_x000D_
Join this session to learn how Microsoft IT is successfully managing the Application lifecycle in their System Center 2012 Configuration Manager R2 environment with zero touch. Deep technical overview on how Microsoft IT automates LOB application publishing by leveraging System Center Orchestrator, Configuration Manager cmdlets, PowerShell scripts, and Team Foundation Server. This session covers the key stages of the application lifecycle for Windows 8.1, Windows Phone, Windows RT, and iOS – starting with Application object creation, deployment, supersedence, and ending with the retirement/removal of the application object from the environment—all this without the administrator having to lift a finger.