• Forefront helps Medical University of South Carolina save money and improve patient care

    Hi all – I thought I would share another Forefront customer story.  This one is tied to our recent posts on secure collaboration.

    Founded in 1824, Medical University of South Carolina (MUSC) is a leading health-sciences center with one of the top 10 cardiovascular centers in the United States. MUSC comprises a 700-bed medical center and six colleges with 13,000 full-time employees, including physicians, researchers, professors, and administrative staff – as well as 2,600 medical students. (More below.)

    Like many large organizations, MUSC relies heavily on Exchange for email and SharePoint for collaboration. For example, the entire medical university uses SharePoint to share critical information: the IT department manages work schedules, project documentation, and its knowledge base; colleges use it to post classroom resources, such as syllabi; and researchers use it to share the latest medical research that benefits the greater medical community and, in the end, plays a part in saving people’s lives.

    Security challenges were impeding the benefits of collaboration, however, and increasing IT costs and inefficiencies.  Approximately 30 weekly malware incidents were taking up as much as 120 IT hours each week.  Worse, they could leave physicians and nurses without the critical equipment they use to improve patients’ health.

    The IT team at MUSC needed to replace its existing security solution to better protect its collaboration and messaging environment from malware and other threats.  In particular, it wanted to prevent specific content or file types from being uploaded and spread across its network.

    MUSC moved to Forefront, taking advantage of an Enterprise Client Access License (CAL) to implement Forefront Client Security and the new Forefront Protection 2010 for Exchange and SharePoint – saving $200,000 on licensing costs. 

    “Even though Forefront products are included in our CAL agreement, it really goes beyond money and comes down to ‘does it work?’” explains Clay Taylor, Endpoint Security Engineer at MUSC. “After seeing Forefront in action, the answer is ‘yes it does.’

    MUSC also uses Active Directory Domain Services to control identity-based access to SharePoint sites.  In addition, Forefront Threat Management Gateway serves as a web proxy for Exchange and SharePoint to guard against threats from unmanaged PCs that access the MUSC network.

    As a result, MUSC has reduced malicious software incidents by 45 percent to save about 108 hours each month for IT personnel, meaning they can  focus on more strategic projects…and spend fewer nights and weekends re-imaging machines.

    The IT department at MUSC is now better able to fulfill its mission of facilitating an environment where nurses, doctors, staff, and students can collaborate and collectively provide top-quality patient care and make positive contributions to the latest in medical research.

    Joel

  • Business reasons to protect SharePoint

    Recently, our Forefront Protection 2010 for SharePoint (FPSP) product was released so I thought I’d take the opportunity to explain, in my own terms, the business value for the product.  I also interviewed Noreen from the product team to get her take on the product as well as give us some demos of FPSP in action (viewable at bottom of this post).

    Defense in Depth 
    Especially considering how important SharePoint is to your business, you should have a defense in depth strategy which includes SharePoint.  How much employee time or money would your company lose if someone uploaded a virus on SharePoint bringing it down or compromised the data?  There are two significant unique features in FPSP that help your defense-in-depth strategy which I’d like to highlight:

    • Multi-Engine Anti-Virus The statistics are irrefutable, having multiple anti-virus engines has the highest detection rate.  Every company’s client anti-virus software, including Microsoft’s Forefront Client Security, utilize only a single engine.  Furthermore, if you rely only on your client anti-malware software and it does detect a virus on the SharePoint server itself, the user experience will more than likely be poor causing a loss of productivity time. 
      Side note: multi-engine AV is also available in Forefront Protection 2010 for Exchange.
    • Interoperability with Rights-Management-Services (RMS) – RMS is an excellent addition to your defense in depth strategy, protecting the documents themselves.  FPSP still has all of the same protection capabilities even with RMS-protected documents.

    More control and visibility over your data 
    With a continued expansion of the amount of data inside your environment, the time to filter this data or cost to increase storage capacity can be significant.  The data keyword & file filtering give you control over what type of data you allow on the SharePoint server and provide reporting on what type of files are present.   This could save costs through not requiring additional storage capacity or helping to prevent data leaks.  For instance, if you have a publicly-accessible SharePoint server in your company you could enable keyword file-filtering to prevent anything with the words “confidential" or “internal only” inside the files, even specifying the threshold of how many times these words show up before you disallow them from being posted.

    Get Microsoft Silverlight

    To download this video in various formats such as Zune, iPod, WMV, or MP3, please visit the original post.

  • Twitterview with Dark Reading tomorrow, May 6, 2:30 pm EST

    Tomorrow at 2:30 pm Eastern time, tune in via Twitter to see Kelly Higgins of Dark Reading interview  JG Chirapuarth, senior director of the Microsoft Identity and Security Business Group.  You can follow the discussion at either the Dark Reading or Forefront Twitter Account.

     
  • The 5 Steps to More Secure Collaboration

    Today we released Forefront Protection 2010 for SharePoint and Active Directory Federation Services 2.0, which makes it a good time to talk about secure business collaboration.

    It is clear that collaboration drives the modern enterprise.  Sharing documents and applications within the company, from the remote office, with trusted partners and customers, into the cloud, etc. - is crucial for most organizations today.

    Collaboration is a key engine for success, regardless of which industry or part of the world you're in.  And, whether its deployed on-premises or as hosted cloud service, the new SharePoint 2010 is the ideal business collaboration platform to connect people within the enterprise and beyond. 

    Of course, helping ensure valuable information is safe against accidental loss, theft and malicious software is no trivial exercise in the world of cloud computing and cross-company collaboration.  Information is the lifeblood of any organization and it must be kept highly secure.  In his blog Gartner vice president Neil MacDonald wrote about this "tearing down of walls between businesses and the opening up of our information, processes and systems to outside parties - whether these are contractors, outsourcers, partners and customers. Nearly every enterprise I speak with is being asked to enable and foster secure collaboration with external entities."

    Working with customers and partners, Microsoft has learned a great deal about secure collaboration.  Based on this, we thought we would share our top five recommendations to help companies strike the right balance of risk management and productive collaboration. 

    • Be a Team Player: Build a virtual team across security, content, identity and business managers for a holistic approach.
    • Strive for Defense-in-Depth: Apply strong anti-malware on SharePoint, in addition to anti-malware on PCs and servers.
    • Extend the Power of Identity: Identity is at the center of good security. Apply interoperable technologies to manage and federate identities across company boundaries and into the cloud (e.g. Single Sign-On.
    • Go the Extra Mile to Protect Your Information Lifeblood: Use rights management policies and technology to keep sensitive content out of the wrong hands.
    • Be Cloud-Ready: Investigate your cloud vendor's security measures. Choose technologies that bridge in-house and cloud systems.

    The new Forefront Protection 2010 for SharePoint and Active Directory Federation Services 2.0 (ADFS 2.0) provide essential building blocks for a Secure Collaboration solution.  They also represent great progress for what we call our Business Ready Security strategy to help enterprise customers manage risk and enable productivity. 

    Forefront Protection 2010 for SharePoint is deeply integrated with SharePoint Server 2010, preventing employees from uploading or downloading infected docs, inappropriate content, or sensitive information. 

    Active Directory Federation Services 2.0 is a no-cost download for Windows Server.  It enables easier, more secure access to applications on-premises and in the cloud, as well as collaboration within the enterprise and across organizational boundaries.  ADFS 2.0 lets companies apply their existing on-premises identities to the cloud. 

    Learn more here.

  • Microsoft Security Intelligence Report v.8 insights and guidance available now

    Today on the Microsoft Blog Vinny Gullotto, general manager of MS Malware Protection Center, announced the release of the Microsoft Security Intelligence (SIR) Report version 8.  The SIR is a wide-ranging study of the evolving threat landscape, and addresses such topics as software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Microsoft creates the SIR to provides information that helps customers and partners better understand the problem of malicious software, so they can take appropriate action.

    Volume 8 of the Security Intelligence Report (SIR v8) covers July 2009 through December 2009. It includes data derived from more than 500 million computers worldwide, each running Windows. It draws from a variety of sources, such as Forefront and some of the business Internet services, like Windows Live Hotmail and Bing. 

    The full report and a great interactive summary is available here and here’s a video of Vinny and Frank Simorjay discussing the report.

    Get Microsoft Silverlight

    A key finding of the latest SIR is that cybercrime continues to mature as criminals model their operations on conventional business processes. Enterprise networks continue to be susceptible to worms while home users are more exposed to malware and socially engineered threats.

    And criminals continue to package online threats into “kits” to maximize potential impact. The Eleonore browser exploit kit, for example, employs different exploits for browsers from several different vendors as well as popular application software frequently found on systems.

    SIRv8 further confirms that attackers are now largely motivated by financial gain and rarely act alone. For example, malware creators seldom conduct attacks themselves but instead work with other criminals in online black markets to buy and sell malware kits and botnet access. Bot herders are also at the core of the professional online threats, knitting together compromised machines into a dark version of a Cloud Computing network.

    From Vinny’s blog post:

    The telemetry data in SIR has shown consistently that the lowest infection rates are seen on computers running Windows Vista SP2 and Windows 7. Infection rates for both operating systems are less than half the infection rate for computers running Windows XP. Also, analyzing the attacks in affected Office program installations, we found that most attacks affected Office 2003 users who had not applied a single service pack or other security update since the original release of Office 2003 in October 2003.

    So what can enterprises and individuals do to defend against the latest malware? Keeping current is essential. Use products developed with security in mind, install good anti-malware solutions, and make certain you are applying the latest software updates.

    Finally, in this latest volume we introduced a section based on customer request called “Mitigation Strategies for Protecting Networks, Systems, and People.” This guidance section was developed by Bret Arsenault, Microsoft Chief Information Security Officer and it provides insight on how Microsoft implements our own defense in depth approach to security. We hope you find it valuable and applicable to your systems.