With organisations moving into the Microsoft Cloud, providing a solid identity management foundation has become crucial to successful projects. One of the core features of Azure is Azure Active Directory, however there are multiple methods of identity implementation upon Azure Active Directory that need to be considered prior to delivering hybrid or Cloud Services. In this session Mark will explain the methods that are available for Organisations to use when considering integrating their existing infrastructure with the Cloud, and go into detail on the strengths and weaknesses of each, as well as demonstrating how to implement each of the options.
While not a tool designed specifically for network or enterprise security, Configuration Manager (ConfigMgr) 2012 can certainly be used as part of an overall strategy in securing an environment (large or small). With the rise of publicly disclosed breaches, "security" should be at the top of every IT engineer's and administrator's list because everyone is either part of the solution or is part of the problem. This session will explore what's built into ConfigMgr to help secure an environment and will also present some semi-custom solutions, ideas, and options (including leveraging other tools) that can make ConfigMgr a valuable tool in the fight to secure an environment against those evil-doers.
This session outlines the latest enhancements in enterprise mobility management using Microsoft Intune and System Center Configuration Manager. Learn about the current state of the System Center Configuration Manager product for managing mobile productivity without compromising compliance, and learn about the futures of Microsoft Intune and Configuration Manager, including new Windows 10 management scenarios.