Accelerating Your Distributed Environment with LANDesk Systems Management

Size: px
Start display at page:

Download "Accelerating Your Distributed Environment with LANDesk Systems Management"

Transcription

1 LANDesk Technical White Paper Accelerating Your Distributed Environment with LANDesk Systems Management Technical White Paper

2 Visit for more information. To the maximum extent permitted under applicable law, LANDesk assumes no liability whatsoever, and disclaims any express or implied warranty, relating to the sale and/or use of LANDesk products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right, without limiting the rights under copyright. LANDesk retains the right to make changes to this document or related product specifications and descriptions, at any time, without notice. LANDesk makes no warranty for the use of this document and assumes no responsibility for any errors that can appear in the document nor does it make a commitment to update the information contained herein. For the most current product information, please visit Copyright 2012, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks of LANDesk Software, Inc. and its affiliates in the United States and/or other countries. Other brands and names may be claimed as the property of others. LSI /12 BT-FS/AS/AZUU

3 Contents Client Management in Today s Distributed Enterprise...4 The Traditional Approach to Management Communication: Unicast Data Transfer...4 The Subprime Sides of Subnet Staging...5 An Agile, Lightweight Alternative...5 Automating Discovery and Asset Inventory...6 Automating Software, Patch, and Operating System Distribution...6 Push Distribution: Targeted Multicast...6 Pull Distribution: Peer Download...7 Operation System Distribution: PXE Prozy...7 Automating Mobile Systems Management...7 The LANDesk Cloud Services Appliance...8 A More Manageable Solution for Distributed Client Management

4 Client Management in Today s Distributed Enterprise Distributed computing is one the most significant business enablers of the late 20th century. By connecting personal computers into local area networks and linking those subnets into an enterprise network fabric, companies have accelerated communications, strengthened collaboration, shared business intelligence, improved responsiveness, and placed a growing list of innovative business services at their employees fingertips. To avoid contention on sensitive links, most management solution vendors long ago adopted a unicast approach to intermachine communication. Messages flow in a single packet stream from one transmitting machine to one receiving machine at a time, using the unicast feature of the Routing Information Protocol in the TCP/IP stack. Unicast transmission avoids the congestion that can occur when multicast (one-to-many) or broadcast (one-to-all) communications hit an oversubscribed network link. But they do so by creating many separate and largely redundant message streams. Today s enterprise environments link corporate headquarters and data centers to divisional business centers, manufacturing facilities, distribution centers, call centers, branch offices, retail locations, and a constellation of mobile and home office users, all of them bound together by a fabric of LANs, WAN links, and VPN tunnels through public networks. The site count can easily run into the hundreds or thousands and span a country, a continent, or the globe. To manage the users and client systems spread out across the distributed enterprise, IT organizations have built out overlay environments of their own. But increasingly these two environments seem to be on opposite evolutionary paths. As the production infrastructure gets faster, more agile, affordable, and responsive, the management infrastructure gets slower, more cumbersome, expensive, and restrictive. To understand why this is so and why it doesn t need to be requires some historical perspective. The Traditional Approach to Management Communication: Unicast Data Transfer IT organizations need to be able to execute a variety of client management and security tasks remotely over the network. Common examples include system discovery, software inventory and license management, remote control and configuration, security software updates, patch management, and software distribution. Because distant sites are typically connected by high-cost WAN links or low-speed VPNs, management communication must yield priority to core business traffic. A model of a distributed network that requires additional expenses in hardware, software licenses, and security for each remote location or user. Most management systems require additional hardware, software licenses, and IT resources to manage remote sites. This approach is problematic when a large volume of data an application package, for instance must be delivered to many client machines at multiple sites. Distributing a new release of Microsoft Office might mean moving a one-gigabyte package to a thousand target systems a full terabyte of network traffic for a single job. To avoid clogging inter-site network links with redundant data, most unicast management solutions have adopted a staging server strategy. A dedicated server at each business location or major subnet acts as a local target for management communications. Handling inter-site downloads and local distribution, they eliminate redundant traffic over busy WAN links. Microsoft System Center Configuration Manager (SCCM) is one of the many solutions that take this conventional approach to management infrastructure. The Subprime Sides of Subnet Staging But placing a dedicated server on every subnet creates a significant new infrastructure layer whose only purpose is managing other systems. Each new management server adds its own increment of capital expense and administrative overhead, and in large environments the total number of management nodes can run into the hundreds. In addition to the server hardware, each management node needs an operating system, security and other standard software components, and often a back-up system all of which must be monitored, managed, and maintained. 4

5 This dedicated infrastructure also creates a great deal of network traffic simply to synchronize and coordinate its own activities. Most nodes are configured to periodically poll the central management system for scheduled tasks. Setting the polling interval too frequently creates a very chatty network with a high level of background management communication. Setting it too infrequently raises the risk of delaying an urgent but unscheduled project perhaps an antivirus update. In short, any distributed management infrastructure based on unicast data transfer and a dedicated tier of subnet staging servers locks in high levels of capital and operating expense, and requires potentially unacceptable tradeoffs between network efficiency and operational agility. Its structural handicaps impose an operational or financial penalty on every type of management task. Furthermore, it affords no support for mobile or home office users that lack a dedicated connection into the enterprise network. As a result, many organizations are actively seeking a more efficient, scalable, and flexible alternative. An Agile, Lightweight Alternative Until 2001, LANDesk also relied on a unicast-local server infrastructure, until a Fortune 100 customer requested a more responsive alternative. In response, LANDesk engineers developed the Targeted Multicast Peer Download model that provides the communications infrastructure for today s LANDesk Management Suite the Light Infrastructure. The LANDesk Light Infrastructure has just four key components: A core communications server A SQL database The LANDesk software agent the same lightweight agent deployed on all managed systems A LANDesk Cloud Services Appliance At each site and on each subnet, one client is dynamically elected to function as the subnet representative for a pending management task based on currently available resources. The elected system s LANDesk agent then temporarily assumes the functions of a local management server. Data transfer is unicast once across the high-traffic WAN connection, then multicast within each subnet. If the subnet representative becomes unavailable, then another is dynamically elected, which also provides fault tolerance. Requires no site servers, back-up servers, server licenses, or IT management associated with a traditional network management infrastructure. This lightweight and economical approach is made possible by the flexible architecture of the LANDesk software agent, which uses a wrapper service to call up only those executables and services required for a specified task. Once that task is complete, all expendable code is unloaded from memory and consumes no further resources. The LANDesk Light Infrastructure delivers a wide range of capital savings and operational benefits relative to traditional management infrastructure. By using available systems and resources for administrative communication and software distribution, it eliminates the need for dedicated staging servers, yet it will efficiently leverage existing infrastructure. It reduces network traffic, frees up bandwidth for core business traffic, dramatically improves software distribution performance, and provides built-in fault tolerance and load balancing. Perhaps most importantly, it eliminates the need for complex infrastructure to handle routine management tasks. 5

6 Gartner: LANDesk in Client Management Leaders Quadrant Gartner Inc. s January 31 Magic Quadrant Report for Client Management Tools placed LANDesk firmly in the leaders quadrant. The report notes that: LANDesk has one of the most complete products in terms of overall functionality. LANDesk Targeted Multicast Peer Download enables administrators to distribute applications using a peer-to-peer model at subnets. LANDesk customers have fewer remote package servers than customers using competitive products. LANDesk Security Suite and LANDesk Service Desk are well-integrated with LANDesk Management Suite. Push Distribution: Targeted Multicast Automating Discovery and Asset Inventory The LANDesk Light Infrastructure provides LANDesk Management Suite with extraordinarily granular client discovery and inventory capabilities, regardless of where those systems are located, even when they are unmanaged and have a firewall enabled. Extended Device Discovery (XDD) leverages the LANDesk software agent on managed devices to listen for Address Resolution Protocol broadcasts that occur when clients connect to the network. Agents use the ARP broadcasts to associate TCP/IP and MAC addresses and identify new arrivals on the network. New clients are checked for the presence of a LANDesk agent, and unmanaged systems are reported to the core server. The result is a highly accurate and up-to-date inventory that quickly identifies unmanaged machines, anywhere on the network. In addition, LANDesk inventory scans are designed so that only discovered changes are recorded and transferred over the network. Because subsequent inventory reports are usually less than a kilobyte, frequent scans can be scheduled to efficiently maintain a high degree of accuracy and currency. Automating Software, Patch and Operating System Distribution There are two types of distribution processes: a push process typically initiated by an administrator, and a pull process triggered by an end user. Let s look at how each process executes within a LANDesk Light Infrastructure. LANDesk uses unicast across the WAN to reduce traffic on slower connections. Any machine with the right resources can be elected dynamically as the subnet representative, which acts like a site server to distribute software, patches, and other updates via multicast on the subnet. When an IT administrator prepares a large-scale distribution, the core server begins by building a list of target systems at each site and subnet, based on the most recent asset inventory, or a fresh one if desired. A subnet representative is elected for each network segment. All machines on the subnet are eligible. Each subnet representative downloads the distribution package from the core server via HTTP, simultaneously loading it into local cache and multicasting it to all the other target systems on the subnet, which also load it into cache. Once all downloads and local multicasts are complete, and all target systems have the distribution package in cache, the core server sends an execution command via TCP request to install the package. If a subnet representative disconnects during download, the core server immediately repeats the election process and resumes the download. Because all target systems on the subnet will have the partial download in cache, only an average of 100 kilobytes must be retransmitted to synchronize the transfer. If a target machine powers down or disconnects before caching the entire download, the LANDesk agent will automatically request the balance of the package from peer systems upon reconnection to any enterprise network segment. 6

7 When the process is complete, all target systems will have received the distribution package, which will have been transmitted across each WAN segment only once, without the need for dedicated staging systems at any site or on any subnet. Pull Distribution: Peer Download When an end user system at a remote site needs an application or an update, its LANDesk agent will initiate a pull distribution, which it begins by checking its own cache for the required package. If it doesn t find the necessary package in cache, the agent polls other client systems on its subnet. If another system has the package, the two agents will arrange and execute a peer download. If no local peers have the necessary package and a preferred server is present on the LAN, the client will request the package from the preferred server. If there is no preferred server on site, the client agent will request the package from a core management server, which will deliver it across the WAN. Once the package has been delivered, cached, and installed by the requesting agent, that client system becomes the local source for all future deliveries at that site. With LANDesk Light Infrastructure, it doesn t matter whether a software distribution is initially accomplished by a push or pull process. No package should have to be moved across a WAN link more than once. Any device that is offline or disconnected can make a request when reconnected to the network for updates and receive them via a peer, designated server, or as a last resort from a source server from a central location. Operating System Distribution: PXE Proxy Operating system distribution is supported by using one client system on each subnet as a PXE proxy. The LANDesk agent detects a bare metal boot on the subnet and contacts the core server for boot menu instructions. This eliminates the need for a dedicated OSD server at each location or subnet. With the LANDesk Light Infrastructure, software distribution is dramatically faster, more flexible, reliable, fault-tolerant, and efficient than any process based on unicast transfer and dedicated staging servers, whether the task at hand is an application update, patch management, or new operating system image delivery. Lighten Your Management Load by Hundreds of Nodes A large organization with tens or hundreds of locations and a dual-node staging system at each of those locations can dramatically reduce the capital and administrative burdens of its IT management infrastructure and improve management efficiency by replacing those dedicated assets with the LANDesk Light Infrastructure. One Fortune 100 customer recently reduced its management server fleet from 226 machines to 22, with half of those in core applications. After the transition, the firm s IT organization was able to confirm the application of a critical patch to 97 percent of more than 100,000 global client systems within 48 hours of the patch s release. Automating Mobile Systems Management There s no kind way to say this: Mobile workers the fastest growing category of computer users are high maintenance. They require a disproportionate amount of support compared to desktop users. To further complicate matters, mobile workers are increasingly bringing their own devices to work (BYOD), working non-traditional hours, and using multiple devices per day a desktop or notebook at work, a tablet at home, and a smartphone everywhere else. The line between people s work lives and personal lives continues to blur, as their growing number of devices share both personal and business content. Today s IT organization has no choice but to support mobile users and their devices, to help them stay safe, secure, and productive. The LANDesk Light Infrastructure makes it plug-and-play easy. 7

8 The LANDesk Cloud Services Appliance The LANDesk Cloud Services Appliance extends the simplicity, affordability, scalability, and flexibility of the LANDesk Light Infrastructure to every mobile user, making them easy to manage and support without dedicated servers, VPNs, or leased lines. The appliance acts as an intermediary for the core management server and remote clients. Essentially, it brokers a secure socket-layer connection between the managed system and the back-end LANDesk core server. A certificate issued by the core server secures a pipeline and establishes a trusted relationship, and all data is SSL encoded. Management agents on remote systems authenticate to the core server, authorizing them to communicate with its management services by way of the appliance. In this arrangement, client systems access only the core server, not the corporate network. No ports are opened in the corporate firewall, eliminating a potentially serious vulnerability. A More Manageable Solution for Distributed Client Management Managing client systems in today s diverse and distributed enterprise environments is inherently complex, but traditional approaches to communications infrastructure and data transfer add high burdens of cost, complexity, and latency that are no longer necessary. When considering the functional claims of management solution vendors, customers should carefully evaluate the underlying communication infrastructure for requirements that may inflate the deployment hardware budget or overload the network backbone. Then consider the efficiency, economy, reliability, and performance of the LANDesk Light Infrastructure, and make a fully informed selection. For more information on the LANDesk Management Suite solution and the technology behind LANDesk Light Infrastructure, please visit or us at sales@landesk.com. Enables you to manage and secure remote users outside the firewall without the overhead of a VPN. Once again, a dramatic simplification in management infrastructure is made possible by the LANDesk management agent, which recognizes the nature of the available network connections on boot-up and tracks them over time. When no corporate network service is available, the agent can be configured to seek an HTTPS connection automatically with the Cloud Services Appliance. Once connected and authenticated, the client delivers an inventory report and queries the core server for pending management tasks. With the LANDesk Cloud Services Appliance, IT organizations can extend management services to remote and mobile client systems simply by adding a single appliance to their environments. Any client with an Internet connection can be administered securely and reliably, even behind a firewall. 8

Resolving the Top Three Patch Management Challenges

Resolving the Top Three Patch Management Challenges LANDesk Technical White Paper Resolving the Top Three Patch Management Challenges Technical White Paper Visit www.landesk.com for more information. To the maximum extent permitted under applicable law,

More information

LANDesk Management Suite 8.7 Extended Device Discovery

LANDesk Management Suite 8.7 Extended Device Discovery LANDesk Management Suite 8.7 Extended Device Discovery Revision 1.0 Roy Meyer Feb. 7, 2007 Information in this document is provided in connection with LANDesk Software products. No license, express or

More information

OS Deployment and Migration

OS Deployment and Migration LANDesk Solution Brief: OS Deployment and Migration Solving real IT challenges. Solving real IT challenges. Simplify OS upgrades and user migrations The Challenge: Migrating users to new Windows operating

More information

Software Distribution

Software Distribution Software Distribution Implement controlled automation for software installation, security and virus update, and application patch management across heterogeneous network environments. Fire it off and forget

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

Accelerate Private Clouds with an Optimized Network

Accelerate Private Clouds with an Optimized Network Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization

More information

Managing Mobile Devices Over Cellular Data Networks

Managing Mobile Devices Over Cellular Data Networks Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR

More information

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled

More information

Software License Monitoring

Software License Monitoring LANDESK Quick Start Guide Software License Monitoring VERSION 2 Introduction This guide was designed to help those users new to Software License Monitoring (SLM) introduced in LANDESK Management Suite

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02

Technical Brief. DualNet with Teaming Advanced Networking. October 2006 TB-02499-001_v02 Technical Brief DualNet with Teaming Advanced Networking October 2006 TB-02499-001_v02 Table of Contents DualNet with Teaming...3 What Is DualNet?...3 Teaming...5 TCP/IP Acceleration...7 Home Gateway...9

More information

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services What You Will Learn Windows Server on WAAS reduces the cost and complexity

More information

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage Data Sheet Cisco WAAS Express Product Overview Organizations today face several unique WAN challenges: the need to provide employees with constant access to centrally located information at the corporate

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

Optimizing VMware View VDI Deployments with F5

Optimizing VMware View VDI Deployments with F5 F5 White Paper Optimizing VDI Deployments with F5 F5 BIG-IP Local Traffic Manager optimizes deployments between offices to create a user experience on par with local desktops. by Alan Murphy Technical

More information

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,

More information

Mesh VPN Link Sharing (MVLS) Solutions

Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions XROADS NETWORKS - WHITE PAPER Mesh VPN Link Sharing (MVLS) Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers

Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers Cisco Wide Area Application Services Software Version 4.1: Consolidate File and Print Servers What You Will Learn This document describes how you can use Cisco Wide Area Application Services (WAAS) Software

More information

Site2Site VPN Optimization Solutions

Site2Site VPN Optimization Solutions XROADS NETWORKS WHITE PAPER Site2Site VPN Optimization Solutions XROADS NETWORKS - WHITE PAPER Site2Site VPN Optimization Solutions The purpose of this paper is to provide an understanding of how XRoads

More information

New Value for Managed Service Providers: Extending Out of Band Remote Management to Servers

New Value for Managed Service Providers: Extending Out of Band Remote Management to Servers Use Case Study New Value for Managed Service Providers: Extending Out of Band Remote Management to Servers Version 1.0 February, 2010 Intel Active Management Technology Lenovo ThinkServer* TS200v Level

More information

ALTIRIS Deployment Solution 6.8 PXE Overview

ALTIRIS Deployment Solution 6.8 PXE Overview ALTIRIS Deployment Solution 6.8 PXE Overview Notice Altiris AAA Document 2006 Altiris, Inc. All rights reserved. Document Date: October 3, 2006 Altiris, Inc. is a pioneer of IT lifecycle management software

More information

Overcoming the Performance Limitations of Conventional SSL VPN April 26, 2006

Overcoming the Performance Limitations of Conventional SSL VPN April 26, 2006 Overcoming the Performance Limitations of Conventional SSL VPN April 26, 2006 NeoAccel, Inc. 2055 Gateway Place, Suite 240 San Jose, CA 95110 Tel: +1 (408) 274 8000 Fax: +1 (408) 274 8044 Web: www.neoaccel.com

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

GlobalSCAPE Wide Area File Services

GlobalSCAPE Wide Area File Services Wide Area File Services: Document Collaboration for the Distributed Business Environment The days of having everyone on a project together in the same office have long passed. To expand global reach and

More information

Print Audit Facilities Manager Technical Overview

Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager Technical Overview Print Audit Facilities Manager is a powerful, easy to use tool designed to remotely collect meter reads, automate supplies fulfilment and report service

More information

Wyse Device Manager TM

Wyse Device Manager TM Wyse Device Manager TM Secure, flexible and effective thin client management software All youneed toknow.here. An introduction to Wyse Device Manager TM Minimize your desktop support costs. Maximize desktop

More information

Tech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2. Presented by Martin Gannon June 21, 2015

Tech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2. Presented by Martin Gannon June 21, 2015 Tech Brief Q&A: Implementing Endpoint Security in 9.6 SP 2 Presented by Martin Gannon June 21, 2015 Contents Questions and Answers from the Live Webinar... 3 About LANDesk Software... 5 To the maximum

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

RemoteApp Publishing on AWS

RemoteApp Publishing on AWS RemoteApp Publishing on AWS WWW.CORPINFO.COM Kevin Epstein & Stephen Garden Santa Monica, California November 2014 TABLE OF CONTENTS TABLE OF CONTENTS... 2 ABSTRACT... 3 INTRODUCTION... 3 WHAT WE LL COVER...

More information

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

LANDesk Patch Manager. Strategic and Tactical Implementation Guide

LANDesk Patch Manager. Strategic and Tactical Implementation Guide LANDesk Patch Manager Strategic and Tactical Implementation Guide Contents Using this Guide... 4 Quick Start... 4 Technical High-Level Overview... 5 Discovering your environment... 5 Using Inventory...

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,

More information

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable

More information

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology

Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology Solution Recipe: Remote PC Management Made Simple with Intel vpro Technology and Intel Active Management Technology Preface Intel has developed a series of unique Solution Recipes designed for channel

More information

Directory Integration in LANDesk Management Suite

Directory Integration in LANDesk Management Suite Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010 S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...

More information

Virtualization Support - Real Backups of Virtual Environments

Virtualization Support - Real Backups of Virtual Environments Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in

More information

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Overcoming Security Challenges to Virtualize Internet-facing Applications

Overcoming Security Challenges to Virtualize Internet-facing Applications Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing

More information

Mobile Network Access Control

Mobile Network Access Control Mobile Network Access Control Extending Corporate Security Policies to Mobile Devices WHITE PAPER Executive Summary Network Access Control (NAC) systems protect corporate assets from threats posed by devices

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

An Oracle White Paper June 2013. Oracle Linux Management with Oracle Enterprise Manager 12c

An Oracle White Paper June 2013. Oracle Linux Management with Oracle Enterprise Manager 12c An Oracle White Paper June 2013 Oracle Linux Management with Oracle Enterprise Manager 12c Introduction... 1 Oracle Enterprise Manager 12c Overview... 3 Managing Oracle Linux with Oracle Enterprise Manager

More information

Windows Server 2012 R2 VDI - Virtual Desktop Infrastructure. Ori Husyt Agile IT Consulting Team Manager orih@agileit.co.il

Windows Server 2012 R2 VDI - Virtual Desktop Infrastructure. Ori Husyt Agile IT Consulting Team Manager orih@agileit.co.il Windows Server 2012 R2 VDI - Virtual Desktop Infrastructure Ori Husyt Agile IT Consulting Team Manager orih@agileit.co.il Today s challenges Users Devices Apps Data Users expect to be able to work in any

More information

Big data management with IBM General Parallel File System

Big data management with IBM General Parallel File System Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers

More information

Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER

Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER Addressing Microsoft Windows 7 Deployments with VMware Mirage WHITE PAPER Storage I/O Performance on VMware vsphere 5.1 over 16 Gigabit Fibre Channel Table of Contents Abstract.... 3 The Problem with Windows

More information

Getting More Performance and Efficiency in the Application Delivery Network

Getting More Performance and Efficiency in the Application Delivery Network SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency

More information

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK

ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically

More information

Load Balancing for Microsoft Office Communication Server 2007 Release 2

Load Balancing for Microsoft Office Communication Server 2007 Release 2 Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks

More information

Flexible Routing and Load Control on Back-End Servers. Controlling the Request Load and Quality of Service

Flexible Routing and Load Control on Back-End Servers. Controlling the Request Load and Quality of Service ORACLE TRAFFIC DIRECTOR KEY FEATURES AND BENEFITS KEY FEATURES AND BENEFITS FAST, RELIABLE, EASY-TO-USE, SECURE, AND SCALABLE LOAD BALANCER [O.SIDEBAR HEAD] KEY FEATURES Easy to install, configure, and

More information

Distributed Software Development with Perforce Perforce Consulting Guide

Distributed Software Development with Perforce Perforce Consulting Guide Distributed Software Development with Perforce Perforce Consulting Guide Get an overview of Perforce s simple and scalable software version management solution for supporting distributed development teams.

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business

More information

Eliminating the Need for WAN Acceleration Using the Cloud

Eliminating the Need for WAN Acceleration Using the Cloud Eliminating the Need for WAN Acceleration Using the Cloud Using cloud-based storage to optimize data distribution and access www.nasuni.com Introduction Data is an organization s most important asset and

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

8000 Intelligent Network Manager

8000 Intelligent Network Manager SOLUTION BRIEF 8000 Intelligent Network Manager Improve Profitability and Competitiveness with Operational Efficiency The Coriant 8000 Intelligent Network Manager is a powerful network and service management

More information

Asset Discovery with Symantec Control Compliance Suite

Asset Discovery with Symantec Control Compliance Suite WHITE PAPER: ASSET DISCOVERY WITH SYMANTEC CONTROL COMPLIANCE............. SUITE........................... Asset Discovery with Symantec Control Compliance Suite Who should read this paper IT Operations

More information

IP Multicast Backgrounder An IP Multicast Initiative White Paper

IP Multicast Backgrounder An IP Multicast Initiative White Paper Stardust Technologies, Inc 1901 S. Bascom Ave, #333 Campbell, CA 95008 USA Tel: 408-879-8080 Fax: 408-879-8081 Web: www.ipmulticast.com IP Multicast Initiative (IPMI) IP Multicast Backgrounder An IP Multicast

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Eliminating the Need for WAN Acceleration Using the Cloud

Eliminating the Need for WAN Acceleration Using the Cloud Eliminating the Need for WAN Acceleration Using the Cloud Using Cloud-based Storage to Optimize Data Distribution and Access Introduction Data is an organization s most important asset and the ability

More information

How To Use Shareplex

How To Use Shareplex Data consolidation and distribution with SharePlex database replication Written by Sujith Kumar, Chief Technologist Executive summary In today s fast-paced mobile age, data continues to accrue by leaps

More information

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3 WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113

More information

Real-World Scale for Mobile IT: Nine Core Performance Requirements

Real-World Scale for Mobile IT: Nine Core Performance Requirements White Paper Real-World Scale for Mobile IT: Nine Core Performance Requirements Mobile IT Scale As the leader in Mobile IT, MobileIron has worked with hundreds of Global 2000 companies to scale their mobile

More information

IP SAN Best Practices

IP SAN Best Practices IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

Enterprise Data Protection

Enterprise Data Protection PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

SolarWinds Scalability Engine Guidelines for SolarWinds Products Technical Reference

SolarWinds Scalability Engine Guidelines for SolarWinds Products Technical Reference SolarWinds Scalability Engine Guidelines for SolarWinds Products Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced

More information

Managing Security Risks in Modern IT Networks

Managing Security Risks in Modern IT Networks Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

White Paper. McAfee Multi-Link. Always-on connectivity with significant savings

White Paper. McAfee Multi-Link. Always-on connectivity with significant savings McAfee Multi-Link Always-on connectivity with significant savings Table of Contents Executive Summary...3 How McAfee Multi-Link Works...4 Outbound traffic...4 Load balancing...4 Standby links for high

More information

SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES

SECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

Accelerating High-Speed Networking with Intel I/O Acceleration Technology

Accelerating High-Speed Networking with Intel I/O Acceleration Technology White Paper Intel I/O Acceleration Technology Accelerating High-Speed Networking with Intel I/O Acceleration Technology The emergence of multi-gigabit Ethernet allows data centers to adapt to the increasing

More information

FatPipe Networks www.fatpipeinc.com

FatPipe Networks www.fatpipeinc.com WARP WHITE PAPERS FatPipe WARP Reliability, Redundancy and Speed of Bi-directional IP Traffic The implementation of mission critical applications run over wide area networks as a basic communication tool

More information

How To Get A Client Side Virtualization Solution For Your Financial Services Business

How To Get A Client Side Virtualization Solution For Your Financial Services Business SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide

ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide ALTIRIS Software Delivery Solution for Windows 6.1 SP3 Product Guide Notice Altiris Software Delivery Solution for Windows 6.1 SP3 Product Guide 2007 Altiris, Inc. All rights reserved. Document Date: February

More information

The Definitive Guide to Cloud Acceleration

The Definitive Guide to Cloud Acceleration The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential

More information

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security F5 and Oracle Database Solution Guide Solutions to optimize the network for database operations, replication, scalability, and security Features >> Improved operations and agility >> Global scaling Use

More information

System Services. Engagent System Services 2.06

System Services. Engagent System Services 2.06 System Services Engagent System Services 2.06 Overview Engagent System Services constitutes the central module in Engagent Software s product strategy. It is the glue both on an application level and on

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS

WAN OPTIMIZATION FOR MICROSOFT SHAREPOINT BPOS WHITEPAPER EXECUTIVE SUMMARY Microsoft SharePoint is a web-based collaboration and information-sharing platform designed as a centralized replacement for multiple web applications. SharePoint leverages

More information

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency

Solving I/O Bottlenecks to Enable Superior Cloud Efficiency WHITE PAPER Solving I/O Bottlenecks to Enable Superior Cloud Efficiency Overview...1 Mellanox I/O Virtualization Features and Benefits...2 Summary...6 Overview We already have 8 or even 16 cores on one

More information

PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V

PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V Version 6.0.8 Published: DEC-2013 Updated: 24 MAR 2014 2005-2014 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

Private Cloud Solutions Virtual Onsite Data Center

Private Cloud Solutions Virtual Onsite Data Center ZEROOUTAGES WHITE PAPER Private Cloud Solutions Virtual Onsite Data Center ZEROOUTAGES - WHITE PAPER Single Side / Balancing The ZeroOutages solution makes for a perfect link bonding/balancing device for

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information