Microsoft Forefront "Stirling" -- Integrated Security Configuration and Response Platform

What is Stirling? Forefront codename "Stirling" is an integrated security system that delivers comprehensive, coordinated protection across endpoints, messaging and collaboration applications, and the network edge that is easier to manage and control.

At release, "Stirling" will include:

  • A single management console and dashboard for security configuration and enterprise-wide visibility.

  • The next-generation versions of Forefront Client Security, Forefront Security for Exchange Server, Forefront Security for SharePoint, and Internet Security and Acceleration Server (to be renamed Forefront Threat Management Gateway).

Microsoft has published a FAQ on "Stirling" that has information you'll want to know about. After reading the FAQ, I'm sure you'll want to download the trial software and give it a go. Check out the FAQ at:

http://www.microsoft.com/forefront/stirling/en/us/faq.aspx

Download the Stirling software at:

http://technet.microsoft.com/en-us/evalcenter/cc339029.aspx

You can also download preconfigured virtual machines with the "Stirling" software so that you can more quickly get up to speed on what "Stirling" has to offer. The VM download link is on the same page.

HTH,

Tom

Thomas W Shinder, M.D., MCSE
Sr. Consultant / Technical Writer
Prowess Consulting www.prowessconsulting.com

PROWESS CONSULTING documentation | integration | virtualization
Email: tshinder@isaserver.org
MVP - Forefront Edge Security (ISA/TMG/IAG)

Deb Shinder

Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.

Share
Published by
Deb Shinder

Recent Posts

Losing your edge? 7 free tools to keep you focused at work

Staying focused at work in an always-connected world is hard! Here’s how to use tech — and some free tools…

11 hours ago

What’s next in the evolution of biometrics and facial recognition technology?

Facial recognition technology has matured to the point of being reliable — for better or for worse. What does the…

15 hours ago

Locking down your Exchange server with cipher suites

Cipher suites are a set of algorithms you need to secure your environment, either by using SSL and TLS. Here’s…

18 hours ago

AI cyber risks: What to look out for when deploying AI technology

Artificial intelligence has greatly improved modern life. But businesses must recognize that AI cyber risks exist and take appropriate measures.

1 day ago

Review: Office 365 synchronizing and administration tool CiraSync

CiraSync offers an enterprise solution for syncing global address list contacts and calendars to smartphones and other mobile devices. Here’s…

2 days ago

HIPAA IT compliance: Privacy and security rules you must know

HIPAA is the mandatory health regulation that must be followed strictly. But if you’re an IT pro in the health-care…

2 days ago