Your current filters are…
by Murari Sridharan and Yu-Shun Wang
'Any service at any server in any cloud.' Next generation data centers should allow dynamic resource allocation and consolidation across large resource pools. The topological constrains of today’s data center networks limit how services can be assigned to servers. Windows Server 8 enables you to create an agile, multi-tenant cloud on top of your existing infrastructure by virtualizing the network. Network virtualization decouples server configuration from network configuration to provide a virtual dedicated network to each tenant. This allows seamless migration of workloads, while continuing to provide security isolation between tenants. Partners have the opportunity to become multi-tenancy aware and provide the next generation of services, devices, appliances, both physical and virtual, to augment and complete the Windows offering to build secure, scalable, multi-tenant public and private clouds.
by Dave McPherson and Jay Dave
This session demonstrates how the new claims based access control capabilities in Windows 8 significantly enhances the security audit and analysis capabilities for compliance and business forensic analysis. In this session, we will describe the new expression-based auditing policies that can be deployed centrally as well as locally, and will demo how monitoring products use these security events for compliance reporting and triggering alerts for suspected activity. In addition, we will describe the full set of auditing scenarios around claims-based access control to demonstrate end-to-end event-driven reporting capabilities for both compliance and day-to-day security management.
by Matthias Wollnik
This session describes how data classification is used for information governance, security access and auditing using the new claims-based access control capabilities in Windows 8. In this session, we will explain how partners can provide automatic classification capabilities so that Windows applies appropriate security to the information. We will also explain how partners implementing data management capabilities such as encryption, archival, retention and disaster recovery can leverage classification in information governance offerings. Finally, we will show how line of business apps can tag data so that the appropriate information governance is applied to that data.
13th–16th September 2011