TechEd 2014 – Relevant Sessions
The content of this post was created and curated by Dave Gifford, Solution Sales for Enterprise Mobility based in the US.
At TechED in Barcelona (Oct 2014) we conducted a number of sessions that provide information on how you can become a Cloud-First and Mobile-First organization. The table below provides a list of key sessions that outline how we (and our partners), can help you achieve this.
Intune/System Center and Device Management
Training Session |
Overview |
Link |
Duration |
Level |
Mobile Application Management with Intune. |
Containers may be good for sandboxing data, but why should protecting corporate data require that your users sacrifice a great user experience? With Intune and System Center Configuration Manager, you can enable your users to use the apps that they need to be productive, while maintaining protection of data on the device. Microsoft provides a layered approach to data protection that gives IT pros control over data at the device level, at the app level, and on the data itself. This control can be built directly into the apps people are familiar with and enables IT pros to define not only how each of these apps will interact with data, but also how they will interact with each other. |
70 Min |
300 |
|
Enterprise Client Management with System Center Configuration Manager and Intune |
This session outlines the current and future plans for Intune and System Center Configuration Manager. We also provide a sneak peek into the newest enhancements for managing Windows, Windows Phone, iOS, and Android systems. |
57 Min |
200 |
|
Securing Mobile Devices Access to Corporate Resources with Intune |
Mobile device management is all about IT pros getting end users up and running as quickly as possible, while maintaining control over corporate resources. In BYOD scenarios, IT pros face additional challenges due to the breadth of devices that end users want to use. Come to this session to learn how Intune and System Center Configuration Manager makes it easy to manage all of your Windows, Windows Phone 8, iOS, and Android devices with a single pane of glass. We walk you through how to easily configure devices for your users by pushing Wi-Fi, VPN, certificate, and email profiles as soon as they are enrolled. We also show you how to use conditional access policies to ensure that only devices that are fully managed and compliant with your policies are able to access corporate resources. |
57 Min |
300 |
|
Mobile Device Management for Office 365 |
Mobile Devices are the first and only connected device for a billion people, and there no question that workplaces are evolving to become more focused on mobile computing. As businesses adopt a BYOD (Bring Your Own Device) approach to mobile devices, it is critical for them to keep corporate data secure on personal devices. Traditional Mobile Device Management (MDM) solutions used for this purpose have a one-size fits all approach with a non-intuitive restricted application that challenges users. Come and explore our new Office 365 MDM solution we will soon be releasing that addresses these concerns and more. |
66 Min |
300 |
|
Infrastructure Deployment for MDM with System Center Configuration Manager and Intune |
This session dives into what you'll do at the server level to drive System Center Configuration Manager and Intune integration for mobile device management. The session includes subscription, connectors, certificates, Active Directory Federation Services (AD FS), DirSync, among other server configurations that enable Mobile Device Management. |
68 Min |
300 |
|
Configuring Corporate Owned Mobile Devices with Intune |
In this session, learn how to use Apple Configurator to bulk-enroll iOS devices, how to tightly control devices usage, and how to pre-provision apps and policies to devices. We walk you through how Intune enables IT pros to keep devices secure and managed, while enabling end users to be productive. Not all mobile devices are personally owned. Often, corporations own the devices and issue them to end users. It's up to the IT pro to configure these devices. Intune and System Center Configuration Manger make it easy for IT pros to provision, configure, and manage corporate-owned devices. |
65 Min |
300 |
|
Enterprise App Deployment for Windows and Windows Phone |
Learn how companies can publish their line-of-business apps for deployment to Windows and Windows Phone, and then manage the lifecycles of those apps. The two platforms haven’t yet converged on a single mechanism for doing this, and this session helps you navigate the differences. This session provides overviews of each platform as well as what’s new for 8.1, including policy allowing only certain apps to run on Windows Phone, the ability to remotely install and uninstall apps from a Windows Phone, changes to line-of-business app deployment in Windows 8.1 Update, and more. Also, see how MDM vendors such as Windows Intune choose to abstract many of the differences and service both platforms in a unified way. |
58 Min |
300 |
Azure Active Directory Premium and Hybrid Identity Management.
Training Session |
Overview |
Link |
Duration |
Level |
Hybrid Identity Management |
Today, people want to work anywhere on any device. How do you enable this, yet retain control and meet compliance requirements in both on-premises and cloud environments? Join us to learn more on the Microsoft hybrid identity story that spans Active Directory, Identity Manager and Azure Active Directory. |
74 Min |
200 |
|
Microsoft Azure AD Premium, in Depth |
In this demo-heavy session we present in depth the most significant capabilities of Azure Active Directory Premium, the advanced hybrid identity and access management cloud solution of Microsoft. Self-Service Password reset with write-back to on-premises directories, Group Management Delegation, Machine learning-based Security and Usage reports , license assignment via UI and PowerShell and more. Let's go deeper on these popular capabilities to understand their architecture and how they can be configured, enabled and used |
73 Min |
300 |
|
Microsoft Identity Manager vNext Overview |
Identity Management for customers' on-premises environments remains a significant area of focus. In this session we explore Identity Manager vNext and the areas we are investing in for the next release, including privileged access management and hybrid integration |
70 Min |
300 |
|
Active Directory + BYOD = Peace of Mind |
The increasingly popular trends of 'BYOD (bring your own device) to work' and 'work from anywhere' expose corporate IT resources to greater risk. Active Directory Federation Services (AD FS) technology on Windows Server is designed to enable end-users to securely access corporate resources from devices of their choice whilst connected from inside or outside your corporate network. Learn how to configure conditional access policies that leverage new AD FS capabilities such as network location awareness, device authentication and multiple-factor authentication in a flexible and intuitive manner. Learn how you can be in control of what authentication methods are made available to end-users, how to plug-in additional authentication providers and how to configure distinct policies governing extranet access. This session explores how AD FS technology helps you avoid 'bring your own disaster' scenarios by confidently securing your corporate resources. |
75 Min |
300 |
|
Cloud Identity: Microsoft Azure Active Directory Explained |
Azure Active Directory is the cloud identity and access management solution of Microsoft. It consist of various hybrid identity management capabilities for enterprise users, task workers, B2B and B2C scenarios. Single Sign On to thousands SaaS applications, self-service password reset, group management delegation, device registration/conditional access, multi-factor authentication, cloud application discovery, application proxy, advanced sync engines with on-premises directories, advanced security reports, and more. |
75 Min |
200 |
|
Building Web App and Mobile Apps Using Microsoft Azure AD for Identity Management |
Cloud-based applications have unique challenges when it comes to identity management. In this session, join us for a deep dive in how to build web applications and web APIs on a variety of platforms using Azure Active Directory for user sign-in and resource authorization |
75 Min |
300 |
Azure Rights Management Services, Data Protection and Content Management
Training Session |
Overview |
Link |
Duration |
Level |
Empowering You Users and Protecting Your Corporate Data |
The average user these days is often equally as IT savvy as a lot of the professionals that deliver IT. They expect technology to be seamless and to allow them to work anywhere, anytime. This includes utilizing both business owned assets and their own devices that they bring from home to retrieve, modify, and send corporate data. The challenge for IT organizations is to balance the competing demands for access against the requirements to secure data. In this session we discuss how other IT departments are helping to make their users more productive while protecting their organizations corporate assets. We look at how Microsoft is addressing the Bring Your Own Device challenge and how you might leverage a combination of solutions to both enable and protect your modern workforce. |
69 Min |
300 |
|
Microsoft Azure Multi-Factor Authentication Deep Dive: Securing Access on Premise and in the Cloud |
Using Azure Multi-Factor Authentication, adding a second factor of authentication to on-premises and cloud applications is easier than ever. Join this session for a technical breakdown of Azure Multi-Factor Authentication and how it works with Active Directory, Active Directory Federation Services, and Azure Active Directory to enable rapid deployment of strong authentication for a wide range of applications. Multi-Factor Authentication (MFA) secures access to remote access VPNs, virtual desktops, web applications (OWA and SharePoint), cloud services (Office 365), and custom applications. New features and MFA roadmap are making our offering even better. We show you how. Objectives: 1. Add a second layer of security to on-premises and cloud application access; 2. Deploy Multi-Factor Authentication Server for on-premises applications; and 3. Describe new additions to Multi-Factor Authentication feature set and the roadmap of the service. |
68 Min |
300 |
|
Collaborating in the Cloud and Across Devices with Office 365 |
Today, Microsoft Office is available on Windows desktop client, Mac, iPad, all phones (iPhone, Windows Phone and Android) and in the browser. Microsoft is committed to establishing the Office footprint across devices and platforms. Not only does Office provide a superior experience on all end points, it also enables collaboration through real-time and same-time co-authoring regardless of which device you are using, the latest and greatest feature updates through the Office 365 service, and true mobile productivity. In this session, we showcase the power of the mobile-first, cloud-first world for the modern workplace with Office. |
46 Min |
200 |
|
Microsoft One Drive for Business: What’s New Overview |
All your work files are accessible from anywhere. Come to this session and learn about OneDrive for Business and everything it has to offer for your organization, from simple sharing and team collaboration to the industrial strength management and control that you have come to expect from Microsoft |
63 Min |
200 |
|
BYOD for File Server Home Folders |
Work Folders allows you to leverage your investment in File Servers while simultaneously providing end users with anywhere access to their data from their work PC as well as their personal devices. In this session, learn about the challenges IT faces in a BYOD (bring your own device) world and how we’re helping you embrace this trend securely. Learn how to deploy and manage Work Folders servers and clients, gain an understanding of how Work Folders operates end-to-end and integrates into your existing infrastructure, and how Work Folders takes advantage of capabilities like multi-factor authentication, Workplace Join and Selective Wipe to ensure that corporate data remains secure wherever it goes. |
78 Min |
300 |
|
Azure Rights Management; What is it, New Features and a View into the Roadmap |
The Azure Rights Management Service (RMS) enables customers to protect their sensitive information, enforce their organization’s information use policies, IT architecture, and mobility needs. Recognizing that many organizations have specific security and IT deployment requirements, Azure RMS is available in cloud, hybrid, and on-premises configurations. This past year, RMS has received significant upgrades for both end user productivity features, and for IT pros, flexibility, manageability, and deployability. In this session, we discuss and demonstrate many of these enhancements, how they can help protect your organization’s sensitive information, and present the Microsoft roadmap for new features under development for RMS. |
76 Min |
300 |
Virtualization
Training Session |
Overview |
Link |
Duration |
Level |
An Insider’s Guide to Desktop Virtualization |
Ready to drink from a fire hose? In this highly energized session, learn about insights, best practices and hear unfiltered thoughts about Desktop Virtualization, VDI, vendors, and solutions. Discussion topics include: VDwhy, VDCry, VDI Smackdown, building and designing a Microsoft VDI solution, and 3D graphics. Experience the Microsoft and Citrix Virtual Desktop solution with a huge amount of videos and demos. With unique content and insights, this session is fun and packed with great content for everyone interested in Desktop Virtualization—and some nice giveaways. A session you don’t want to miss! |
77 Min |
300 |
|
Extending Microsoft Azure Capability through Citrix XenDesktop, XenApp and NetScaler |
Are you a Citrix customer evaluating how to deploy native mobile apps, virtualized apps, and/or virtualized desktop in Azure? This is the right session for you. In this session we cover starting with scale analysis/consideration when architecting the solution in Azure, ensuring the correct networking services are in place to provide seamless access to the Azure environment. We walk through every step in the architectural process to create a fully functional XA/XD deployment in Azure. We demonstrate key deployment steps pertaining to XA/XD on Azure (mini deployment guide). And finally, we provide essential cost modeling data to evaluate economics compared to on-premises deployment. |
57 Min |
300 |
|
Deploying Remote Desktop Services Roles in Microsoft Azure and Private Cloud |
This session walks through the architecture of Remote Desktop Solutions (RDS) hosted in Azure, public, and private clouds. The discussion includes high availability considerations and capacity planning, as well as connectivity to corporate Active Directory and network resources |
65 Min |
300 |
|
Investments in Remote Desktop Services |
Come and learn about our investments and focus areas for VDI in the next version of Windows Server |
60 Min |
300 |
|
Azure Remote Application |
This session gives a brief overview of using Azure RemoteApp for Mobility and BYOD scenarios where IT can enable users to access corporate data and applications while ensuring compliance. With Azure RemoteApp, you can enable your users access corporate applications on a variety of devices, scale up or down without large capital expenditure while protecting your sensitive corporate resources. |
65 Min |
200 |