Publishing Exchange used to be easy. You installed Microsoft Security and Acceleration (ISA) Server or Forefront Threat Management Gateway (TMG) and considered your work done. But with the changes in roadmap of Microsoft security products such as TMG and UAG, and the addition of features like ARR and WAP, the sea of TLAs has become more complex than ever. Come and learn what the real risks are when publishing Exchange to the Internet, what your choices are, which you should choose, and how to deploy them. There's a TLA for everyone when it comes to publishing Exchange, but make sure you know which is which and which one you need, if at all. The Windows team have added an additional component called Application Request Routing 3.0 to the Internet Information Service (IIS) role, which enables IIS to handle reverse proxy requests and also perform layer seven Load Balancing of these requests.
Take a lightning tour of the many connectivity options for Windows 8.1 and Windows Phone 8.1 Store Apps. There are more than ever before: HTTP networking APIs, NFC and Bluetooth including ‘tap to connect’ and WebApi REST services are just the tip of the iceberg. See how to build apps that work with DataSense 2.0. Store settings and data in Microsoft OneDrive. Share state between a Windows Phone 8.1 app and the Windows 8.1 version of your app. See some practical demos, such as how to implement compression with HTTP networking and how you can handle credentials when accessing services that require user authentication. We’ll also take a quick look at building a mobile back end with Microsoft Azure Mobile Services and connecting with it from your app.
Over the last years, many customers have had to deal with cyber attacks targeted at intellectual property. We have entered a new phase in which criminals unleash destructive attacks, rendering IT environments unusable and effectively halting business. Consumerization of IT and the cloud add inherent tension and security implications to this new reality. How can one deal with data that moves in and out of your datacenters, to unmanaged devices and cloud services not directly under your control? How can you create a cost efficient architecture and plan for prevention, detection, and recovery in a time where cloud and consumerization of IT are high on every CxO's agenda? The presenters of this session have been on the Targeted Attack frontline with enterprise customers over the last years. They explain the threats of targeted attacks and share an architecture model using a data classification model, as well as their field experiences and services you can leverage to deal with prevention, detection and recovery.