Classrooms in a city near you!
Don’t miss the fun and educational event that will enable you to not only extract maximum benefit from your KACE Appliance, but also gain advice for using KACE in your environment — directly from the experts. You'll also get to know your fellow users in the local KACE community, and in many cases- attendees benefit from minimal travel expenses and time away from the office.
We want you to learn all the latest tricks and tips for using your KACE Systems Management Appliance. That’s why we’re bringing our popular training to you. Register today for multiple days of instructor-led training that will refresh or enhance your skill set and empower you to save even more time and money with your KACE Systems Management Appliance.
Is Backyard Boot Kamp right for you?
Backyard Boot Kamp is designed specifically for new users, or those desiring a skills refresh. They are not generally intended for advanced KACE users. Backyard Boot Kamp training is usually best attended by:
- New team members who did not attend their company's initial training
- Customers seeking overall product knowledge
- Customers who haven't used the appliance in some time
- Customers that prefer to practice and learn in a non-production environment
- Customers preparing to implement new features that were previously not in use
- Customers seeking to gain new knowledge and experience
- Agent & Agentless Inventory
- Label Management
- Software Distribution
- Patch & Update Management
- Assets Management
- User Console
- Service Desk
- And More!
Backyard Boot Kamp Dates and Location:
Salt Lake City
Interested in learning more?
Checkout http://www.kacebootkamp.com or contact your sales representative for more info.
Looking for something more focused, or on your appliance? Consulting and Remote Implementation can be remotely delivered and customized to fit your goals. For additional information, please email firstname.lastname@example.org
ITNinja's are you into cycling and or running for fitness or even find yourself competing on the weekends? If so, I have been giving the ok to make available for a limited time some ITNinja branded gear. I have already designed a cycling jersey and am working on a short sleeve running top. Cost will depend ultimately on how many people purchase. Below is roughly the cost per jersey at different quantities.
Cycling Jersey Design
Store Link: http://shop.jakroo.com/ITNINJA
Once again, at this time I only have the design finished for the cycling jersey but the running shirts should be available to order by 2/14/2014. So what are you waiting for, take advantage of the limited (ORDERING WILL CLOSE 2/28/2014) run of cycling jerseys and represent like the geeks we are!
Running shirt design!
*WARNING* Now the definition of this session made me think that it was going to be a session going into how you can secure Windows 8 from threats however, it really was a sales pitch of what feature Windows 8 has added into in for increased security.
Microsoft has made the decision to invest in four core areas:
- Malware Resistance
- Protect Sensitive Data
- Modern Access Control
- Trustworthly Hardware
Presentor spoke to one sepcific Malware Challenges that MS is currently facing is that Malware has the ability to interact with the pc prior to the completion of loading windows. This is one main reasons why MS is putting so much efforts into UEFI. Now its important to understand that UEFI isn't a MS technology rather a industry standard. Key benefits of UEFI that were outlined are:
- Enables the device initialization and operation (mouse, pre-os apps, and menus)
- UEFI firmware cannot be rolled back unlike legacy system.
Microsoft has also made the decision that TPM will be a requiement for all hardware that has the Windows logo by end of year.
The speaker also spoke to the fact that although Windows 7 leveraged ASLR and DEP it wasn't widely leveraged in Windows 7. In Windows 8 however, this is not the case because now its more the standard than that of the exception. Addition Windows 8 help makes it harder than ever to create exploits.
Trusted and Measured Boot Feature is Windows 8
- Hardens the end to end boot process
- Protects all system boot compnents and the anti-malware driver (ELAM)
- Ensures defenses are running before malware get the chance to start
- Automatic remediation/self healing if compromised.
- Comprehensive set of integrity measurements
- Measurements can be offered to a Remote Attestation Service for analysis
So a review of how this all works now with Windows 8. Basically with the use of UEFI, TPM, Truted Boot, and Measure Boort allows for protection from power up of the hardware.
Now what about sign-in sercurity features in Windows 8.
PIN vs Picture, both very secure but the important thing to remember is that picture passwords are very easily seen by nearby users.
Windows 8 Firewall
Microsoft feels like they have no need to make any changes to Win8 Firewall because they have kept up throughtout the years with windows firwall needs.
Attestation & Verification
Microsoft 8 is basically putting this on the shoulders of 3rd party vendors as of now. Why? The speaker spoke to it but didn't come right out and say it but, basically they aren't sold off on the fact that Windows 8 is going to be bought into. So they don't want to spend development time on the feature.
Current companies that help fill the gap currently:
Windows 8 Security Wrap-Up
To sum it up, Windows 8 is MS shinning new toy that has all of its new security functionality.