Windows 8 extends the security and isolation capabilities of Windows to help build a far more trusted application experience. In this session, get a review of the Windows features that have been evolving since Windows Vista, and culminating in a whole new level of application isolation in Windows 8 Applications.
With the proliferation of mobile devices as well as the flexibility of delivering mixed topology implementations of Lync, Exchange and other dependent systems, optimizing your security architecture has never been more important. Derek and team will cover: _x000D_ _x000D_ Security Framework: Confidentiality, Integrity and Availability _x000D_ Telecom and network security best practices _x000D_ Trends in authentication: Mobile devices, 2-Factor Authentication _x000D_ Encryption TLS and sRTP_x000D_ Resilient certificate management _x000D_ Mitigating the risk of denial of Service attacks _x000D_ Basic steps for protecting against minute theft _x000D_ Real life edge and reverse proxy scenarios_x000D_
Join this session for a journey through the lifecycle of a Microsoft Application Virtualization (App-V) 5.0 package. From the birth of a sequenced package through deployment, streaming, configuration, updates, connection groups, user customization and eventual termination. This session is based solely on stand-alone mode, demo-driven, behind-the-scenes views of how each part of the application lifecycle is handled by the App-V Client. No ties to Configuration Manager or Full Infrastructure, just an under the hood insight into how App-V applications are handled regardless of delivery mechanisms.