Patch management point solution. Platform. Patch Management Point Solution
|
|
- Rosamund Anthony
- 8 years ago
- Views:
Transcription
1 Markets, R. Colville, M. Nicolett Research Note 18 March 2003 Patch Management: Identifying the Vendor Landscape As the importance of patch management increases, it is important to understand the limitations and capabilities of the five classes of vendors that offer solutions. Core Topics Enterprise Management: Configuration Management Security and Privacy: Security Management Strategies and Processes Key Issues How will configuration management technologies and standards evolve? How will enterprises evolve their security strategies from their current states of neglect? Strategic Planning Assumption By year-end 2005, at least 60 percent of configuration management, vulnerability assessment, and policy compliance tools will have complete patch management capability (0.7 probability). There is nothing new about the need to manage the software that is deployed on servers and PCs. There is, however, a new appreciation of the risks associated with not applying the growing number of software patches. Enterprises have renewed their focus on the long-standing problem of patch management in an effort to reduce the exposure to mass outages or security breaches. Patch management is an area in which manual approaches have no chance of being effective. There is a specific set of functional requirements for patch management automation because of the following factors: a large number of patches and systems; the complicated interrelationships among patches, service packs and installed software; and the need for deployment speed. For more details on the functional requirements that are referenced in this research, see "Robust Patch Management Requires Specific Capabilities." The following classes of vendors offer tools that address various degrees of patch management: Patch management point solution Desktop configuration management Server provisioning and configuration management Platform Policy compliance and vulnerability assessment Patch Management Point Solution Patch management point solution vendors offer a new breed of tools to assist enterprises in the evaluation and installation of patches. Although patch management tools are focused on only one aspect of the overall configuration management problem, they provide the most-complete set of functions for resolving patch vulnerabilities in an automated fashion. Patch Gartner Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 management point solution vendors include Configuresoft (policy compliance and patch management), PatchLink, Shavlik Technologies, St. Bernard Software, Ecora and BigFix. Patch management point solution vendors provide a focused approach to the problem of managing patches across servers and desktops. The following tools have the capability to install any patch and offer specific differentiation for security patches: Patch Matching Reports The majority of patch management tools provide reports that list the patches that are needed by each server or PC, based on the installed software and system role. Patch Analysis Many of these tools offer the capability to analyze supersedence, prerequisites, co-requisites and issues related to the coexistence of a patch for one application in a system with other applications. Platform Support Most patch management vendors are Windows-centric, and a few also support Unix and Linux. Templates and Policies Some of these tools offer an enriched capability for templating. Models are used to determine which systems are out of patch compliance and what changes have occurred. Desktop Configuration Management The configuration management market is mature (some vendors have been around for more than 10 years) and includes more than a dozen vendors that focus on all sizes of enterprises. Enterprises primarily use configuration management tools to install and update applications and configuration settings across desktops. Examples of configuration management vendors/tools are: Altiris, Computer Associates International, IBM Tivoli, LANDesk Software, LSVi, Marimba, ManageSoft, Microsoft, NetSupport Solutions, Novell, Novadigm, OnDemand Software, ON Technology and Mobile Automation. This class of vendors offers tools related to software inventory, distribution and installation capabilities that can be applied to patch management. Enterprises that have installed these tools already have agents installed and processes defined for tool use. Many of these solutions offer scalable architectures across a multitude of platforms (for example, Windows, Unix and Linux). They offer a means to discover established systems, and some provide a policy-oriented approach for deploying content, applications, system settings and patches. They can leverage directory information and other feeds as a means of establishing specific target criteria. These vendors offer templates and bestpractice guidelines for deploying applications. 18 March
3 Unfortunately, most configuration management tools lack many functions that are required for patch management. To date, desktop configuration management vendors have approached patch management as "just another distribution." There is no imbedded knowledge of patch interrelationships, no patch inventory and a lack of patch analysis capabilities. For these reasons, configuration management tools are not optimized for patch management, and their use for this purpose is laborintensive. To date, these vendors have demonstrated mixed success less because of their capability and more because of the heterogeneity and complexity that exist across users' personal systems. The strength of this class of vendors lies in an installed base that has gone through the considerable effort of installing agents on a large number of desktop systems. There is a strong desire on the part of the current installed base to leverage the agent for related functions, such as patch management. We expect a number of desktop configuration management vendors to buy or build the technology to address patch management requirements. Server Provisioning and Configuration Management With elevated attention on the limited resources available for managing server configurations and the risks associated with server outages, a new set of vendors has emerged during the last 18 months that focuses on managing the provisioning and configuration of servers. Some desktop configuration management vendors have extended their capability to servers (see "Emerging Tools for Server Configuration Management"). Like desktop configuration management vendors, these vendors focus on discovery, deployment and reporting configurations, applications and system settings. They approach the patch problem as an extension of overall system configuration management. Although these vendors are taking a more holistic approach to each type of server (for example, Web servers, application servers and infrastructure servers), most look at patch management as "just another deployment." Of these, vendors such as BladeLogic, Novadigm and Opsware offer specific capability for patch management, but they do so as a subset of their overall configuration management solution. Novadigm has extended its capability for servers and desktops. Emerging vendors will likely enhance their solutions organically or license technology from patch management vendors, while others will acquire patch management vendors. Platform Operating-system and platform vendors (for example, Sun Microsystems, Hewlett-Packard, Linux, IBM and Microsoft) offer 18 March
4 complementary tools for patch management. The biggest limitation of these tools is that they are platform-specific, and each offers varying capability. Sun Patch Manager provides indepth configuration comparisons and analysis for Solaris to determine which patches are necessary on which systems. Hewlett-Packard does in-depth dependency checking on HP-UX platforms, can deploy patches and offers a different tool for patch management on Proliant servers. Microsoft's approach to patch management is not as robust. Microsoft's Software Update Services does not do patch analysis and does not have robust system matching capability. Enterprises have the choice to leverage these tools, which are not cross-platform, by layering process and staff to ensure consistency. However, if patches are for applications (for example, Oracle) that are multiplatform, these tools will not suffice. Platform vendors will continue to enhance these tools as a means of offering more-reliable platforms. Policy Compliance and Vulnerability Assessment Vendors such as Symantec (Enterprise Security Manager), BindView (bv-admin) and NetIQ (Security Manager) provide tools that can be used to evaluate security policy compliance, configuration and vulnerabilities. Although these tools can be used to identify systems that lack specific security patches, they typically lack functions in the areas of patch distribution and installation. What to Do For some enterprises, patch management will be an extension of an established deployment of configuration management infrastructure. IS organizations will have to layer manual processes, staffing and testing to their configuration management tools to compensate for their lack of specific patch management automation. Although we expect configuration management vendors to eventually offer a critical mass of patch management automation, configuration management tools alone will not suffice. Policy compliance and vulnerability assessment tools can be used to provide patch analysis functions. Enterprises that deploy server provisioning tools will benefit from the patch management capabilities that these products provide; however, most of this class of vendors does not address desktop patch management. For enterprises that are looking for a focused solution specific to security patches, emerging patch management vendors will offer the most complete capability. Bottom Line: Enterprises should try to leverage configuration management infrastructures for patch distribution and installation. In doing so, enterprises will require processes that 18 March
5 leverage patch analysis functions from policy compliance and vulnerability assessment tools. Platform vendor tools may suffice in the Unix environment. For enterprises that do not have configuration management automation, patch management vendors must be considered because today's security environment requires enterprises to be good at patching, or they will risk losing business. 18 March
2003 Desktop Software Distribution Magic Quadrant
Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic
More informationCIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
More informationThe PC life cycle configuration management Market Overview
Magic Quadrant for PC Life Cycle Configuration Management, 2005 Gartner RAS Core Research Note G00131185, 17 October 2005, Ronni J. Colville, Michael A. Silver, R1580 05052006. The PC life cycle configuration
More informationHow to Develop an Effective Vulnerability Management Process
Research Publication Date: 1 March 2005 ID Number: G00124126 How to Develop an Effective Vulnerability Management Process Mark Nicolett IT organizations should develop vulnerability management processes
More informationSAN Management Software Magic Quadrant
Markets, C. DiCenzo, R. Paquet, N. Allen, R. Passmore Research Note 22 April 2003 SAN Management Software Magic Quadrant In the storage area network management software market, expect increased competition
More informationBusiness Applications and Infrastructure Entwined
Markets, S. Hayward, B. Burton, J. Comport, Y. Genovese, T. Bittman Research Note 9 July 2003 Business and Infrastructure Entwined Oracle's bid for PeopleSoft encompasses more than applications. It illustrates
More informationPLM Eclipses CPC as a Software Market
Markets, M. Halpern, K. Brant Research Note 20 March 2003 PLM Eclipses CPC as a Software Market Gartner is retiring the Collaborative Product Commerce Magic Quadrant and introducing the Product Life Cycle
More informationDon't Pay to Support CRM 'Shelfware'
Tactical Guidelines, J. Disbrow Research Note 3 May 2003 Don't Pay to Support CRM 'Shelfware' Enterprises license customer relationship management solutions that are often never totally deployed. Software
More informationPatch Management Is a Fast Growing Market
Market Analysis Patch Management Is a Fast Growing Market Abstract: The market for enterprise patch management tools is being pioneered by seven small vendors. Larger players are expected to validate and
More informationNetIQ Chariot and Application Scanner for Application Performance Management
John Inverso Product Report 29 September 2003 NetIQ Chariot and Application Scanner for Application Performance Management Summary NetIQ Chariot tests network equipment by generating application-layer
More informationWhat CIOs Want to Know About Microsoft Active Directory
IGG-01222003-01 J. Enck Article 22 January 2003 What CIOs Want to Know About Microsoft Active Directory Active Directory deployments are increasing and so are questions about the technology. Gartner addresses
More information2003 Enterprise Backup/Restore Magic Quadrant
Markets, C DiCenzo, R Paquet Research Note 9 May 2003 2003 Enterprise Backup/Restore Magic Quadrant The backup/restore software market is maturing, with a limited number of vendors competing for the bulk
More informationSIEM and IAM Technology Integration
SIEM and IAM Technology Integration Gartner RAS Core Research Note G00161012, Mark Nicolett, Earl Perkins, 1 September 2009, RA3 09302010 Integration of identity and access management (IAM) and security
More informationData Center Conference Survey Results: Server Consolidation
Events, J. Phelps Research Note 31 March 2004 Data Center Conference Survey Results: Server Consolidation At the December 2003 Data Center Conference, attendees were asked questions for each presentation.
More informationPredicts 2008: The Market for Servers and Operating Systems Continues to Evolve
Research Publication Date: 6 December 2007 ID Number: G00152575 Predicts 2008: The Market for Servers and Operating Systems Continues to Evolve John Enck, Philip Dawson, George J. Weiss, Rakesh Kumar,
More informationTHE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market
THE CHANGING LINUX LANDSCAPE The cloud, community distributions and devops are dramatically impacting the market Trends such as cloud computing and devops whereby application development and deployment
More informationSecurity and Identity Management Auditing Converge
Research Publication Date: 12 July 2005 ID Number: G00129279 Security and Identity Management Auditing Converge Earl L. Perkins, Mark Nicolett, Ant Allan, Jay Heiser, Neil MacDonald, Amrit T. Williams,
More informationHow Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary
How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary Publication Date: 2 January 2004 Author Bruce M. Caldwell This document has been published to the following
More informationMagic Quadrant for Application Platform Suites, 2Q03
Markets, Y. Natis, M. Pezzini, G. Phifer, C. Haight, M. Driver Research Note 5 May 2003 Magic Quadrant for Application Platform Suites, 2Q03 Application platform suites are incrementally assembled or bought
More informationTroux Configuration Management Software
Sharon Fisher Product Report 5 December 2003 Troux Configuration Management Software Summary With the Troux Blueprinting System, Troux hopes to help create a new market with software to map an information
More informationCLOUD CLIENTS AND VIRTUAL CLIENTS
CLOUD CLIENTS AND VIRTUAL CLIENTS The Transformation of Virtual Desktops Through Mobility and Cloud Computing Over the past three years, the technology we used to know as virtual desktop infrastructure
More informationJob Scheduling Magic Quadrant Reflects New Challenges
Markets, M. Govekar Research Note 23 January 2003 Job Scheduling Magic Quadrant Reflects New Challenges In 2003, job scheduling systems should be starting to address new platforms and environments. Some
More information8 Key Requirements of an IT Governance, Risk and Compliance Solution
8 Key Requirements of an IT Governance, Risk and Compliance Solution White Paper: IT Compliance 8 Key Requirements of an IT Governance, Risk and Compliance Solution Contents Introduction............................................................................................
More informationBSM Definition, Drivers and Inhibitors
Events, D. Curtis, M. Govekar Research Note 11 August 2003 BMC Positions Itself for Business Service Management BMC Software's announcement of its business service management strategy is solidified by
More informationMagic Quadrant for a Fading PKI Market, 2003
Markets, V. Wheatman, R. Wagner Research Note 17 June 2003 Magic Quadrant for a Fading PKI Market, 2003 Pure-play public-key infrastructure vendors are disappearing due to failure or acquisition, or by
More informationDefining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.
Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core
More informationManagement Update: Powerhouse Vendors Implement Document Management
IGG-10302002-04 G. Landers, K. Shegda, D. Logan Article 30 October 2002 Management Update: Powerhouse Vendors Implement Document Management Interest within enterprises is growing in the management of unstructured
More informationToolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
More informationCA Virtual Assurance for Infrastructure Managers
DATA SHEET CA Virtual Assurance for Infrastructure Managers (Includes CA Systems Performance for Infrastructure Managers) CA Virtual Assurance for Infrastructure Managers (formerly CA Virtual Performance
More informationCOM-19-8811 M. Silver
M. Silver Research Note 19 June 2003 Commentary Linux Desktop TCO: An Overview With Linux, the client operating system only constitutes a small part of the total cost of ownership. From a TCO perspective,
More informationCOM-18-7559 J. Holincheck
J. Holincheck Research Note 3 December 2002 Commentary Leveraging HCM Technologies to Control Labor Costs Large human capital management application suite purchases will be few and far between in 2003.
More informationG00123440 A. Allan. Directory authentication providing a common ID and password across multiple systems
. llan Research Note 21 October 2004 Commentary Enterprise Single Sign-On Tools re Comprehensive but Costly Managing multiple user identities and passwords is difficult for companies and users. ESSO can
More informationGartner Updates Its Definition of IT Infrastructure Utility
Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some
More informationClinical Decision Support: Core Capability of Evolving CPR
Tutorials, B. Hieb, M.D. Research Note 6 November 2003 Clinical Decision Support: Core Capability of Evolving CPR More-sophisticated computer-based patient record systems can offer increasing value to
More informationBladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture
BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance
More informationManagement Update: The Cornerstones of Business Intelligence Excellence
G00120819 T. Friedman, B. Hostmann Article 5 May 2004 Management Update: The Cornerstones of Business Intelligence Excellence Business value is the measure of success of a business intelligence (BI) initiative.
More informationIBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
More informationManagement Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002
IGG-10232002-03 J. Holincheck Article 23 October 2002 Management Update: Gartner s Large-Enterprise HRMS Magic Quadrant for 2002 The market for large-enterprise human resources management system (HRMS)
More informationPatch Assessment Content Update Release Notes for CCS 11.1. Version: 2016-02 Update
Patch Assessment Content Update Release Notes for CCS 11.1 Version: 2016-02 Update Patch Assessment Content Update 2016-02 Release Notes for CCS 11.1 Legal Notice Copyright 2016 Symantec Corporation. All
More informationManagement Update: The Eight Building Blocks of CRM
IGG-06252003-01 S. Nelson Article 25 June 2003 Management Update: The Eight Building Blocks of CRM Customer relationship management (CRM) represents the key business strategy that will determine successful
More informationKey Findings. Recommendations
Total Cost of Ownership Comparison of PCs With Server-Based Computing Gartner RAS Core Research Note G00159622, Federica Troni, Mark A. Margevicius, Michael A. Silver, 4 August 2008, R1 04032009 Server-based
More informationOracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (10.1.3.4.
Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.2) E12692-08 September 2011 This document outlines the certified hardware and software configurations for Oracle
More informationIBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
More informationThe Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
More informationUnified Communications MQ Selection Criteria for 2003
Decision Framework, B. Elliot Research Note 22 January 2003 Unified Communications MQ Selection Criteria for 2003 Unified communications enable enterprises to control their communication options, leveraging
More informationSAP's MDM Shows Potential, but Is Rated 'Caution'
Products, A. White, D. Hope-Ross Research Note 16 September 2003 SAP's MDM Shows Potential, but Is Rated 'Caution' SAP's introduction of its Master Data Management solution shows it recognizes that maintaining
More informationQ&A: The Many Aspects of Private Cloud Computing
Research Publication Date: 22 October 2009 ID Number: G00171807 Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner
More informationDecision Framework, DF-19-1071 J. Holincheck. Application Service Provider Traditional Payroll/Benefits Outsourcing Business Process Outsourcing
Decision Framework, J. Holincheck Research Note 28 February 2003 Deciding to Insource or Outsource for Human Resources Enterprises making new technology decisions are often considering various types of
More informationVertical Data Warehouse Solutions for Financial Services
Decision Framework, M. Knox Research Note 24 July 2003 Vertical Data Warehouse Solutions for Financial Services Packaged DW financial services solutions differ in degree of and approach to verticalization,
More informationBusiness Intelligence: The European Perspective
Markets, F. Buytendijk Research Note 5 November 2002 Business Intelligence: The European Perspective When choosing business intelligence products, European users are not that different from North American
More informationThe Ten How Factors That Can Affect ERP TCO
The Ten How Factors That Can Affect ERP TCO Gartner RAS Core Research Note G00172356, Denise Ganly, 1 February 2010, V1RA9 04082011 Organizations tend to focus on the what that is, the vendor or the product
More informationMarket Trends in 2002 and 2003
Markets, J. Pescatore, R. Wagner Research Note 8 January 2003 Extranet Access Management 2H02 Magic Quadrant Inside-the-firewall (intraenterprise) integration to reduce costs dominated the extranet access
More informationThe IFX Standard Opens the ATM and POS Channels
Strategic Planning, M. Knox, S. Cohen, B. Adrian Research Note 27 August 2003 The IFX Standard Opens the ATM and POS Channels Interactive Financial exchange v.1.4 introduced significant new messaging standards
More informationThe Four "A's" of Information Security
Strategic Planning, R. Witty, A. Allan, J. Enck, R. Wagner Research Note 4 November 2003 Identity and Access Management Defined An IAM solution requires multiple products from multiple vendors. It also
More informationCOM-19-1316 A. White, K. Peterson, B. Lheureux
A. White, K. Peterson, B. Lheureux Research Note 1 February 2003 Commentary New P2P Solutions Will Redefine the B2B Supply Chain As multienterprise business processes evolve on a large scale, application
More information2002-2003 Web Services Development, North America (Executive Summary) Executive Summary
2002-2003 Web Services Development, North America (Executive Summary) Executive Summary Publication Date: 3 July 2003 Authors Nicole S. Latimer Colleen Graham Joanne M. Correia Norma Schroder This document
More informationITG Executive Summary
ITG Executive Summary VALUE PROPOSITION FOR IBM SYSTEMS DIRECTOR: CHALLENGES OF OPERATIONAL MANAGEMENT FOR ENTERPRISE SERVER INSTALLATIONS Economics Benefits for IBM Power Systems Deployment Challenges
More informationCOM-18-5018 J. Woods, A. White, K. Peterson, M. Jimenez
J. Woods, A. White, K. Peterson, M. Jimenez Research Note 28 October 2002 Commentary Demand Chain Management Synchronizes CRM and SCM Pursued separately, supply chain management and customer relationship
More informationX.509 Certificate Management: Avoiding Downtime and Brand Damage
G00226426 X.509 Certificate Management: Avoiding Downtime and Brand Damage Published: 4 November 2011 Analyst(s): Eric Ouellet, Vic Wheatman Organizations are often not aware of the scope or the validity
More informationSoftware asset management White paper. Improving IT service delivery through an integrated approach to software asset management.
Software asset management White paper Improving IT service delivery through an integrated approach to software asset management. September 2008 2 Contents 2 Introduction 3 The challenges of managing software
More informationIAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
More informationTECH CHOICES. April 20, 2005 The Forrester Wave : Client Systems Management Tools, Q2 2005. by David Friedlander
April 20, 2005 The Forrester Wave : Client Systems Management Tools, Q2 2005 by David Friedlander TECH CHOICES Helping Business Thrive On Technology Change TECH CHOICES Includes a Forrester Wave April
More informationHow PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006
How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management White Paper Sept. 2006 Introduction It happens, five, ten, twenty times a month: A hardware or software vendor
More informationORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically
More informationAltiris Business Unit Review. Greg Butterfield Group President, Altiris Business Unit
Altiris Business Unit Review Greg Butterfield Group President, Altiris Business Unit Agenda 1 Altiris 2 Symantec and Altiris 3 Growth Drivers 4 Summary Financial Analyst Day 2007 2 FY08 Objectives Business
More informationManagement Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant
IGG-02192003-03 R. Matlus Article 19 February 2003 Management Update: Gartner s Updated Help Desk Outsourcing Magic Quadrant The North American help desk outsourcing market is growing despite a down economy.
More informationModernizing enterprise application development with integrated change, build and release management.
Change and release management in cross-platform application modernization White paper December 2007 Modernizing enterprise application development with integrated change, build and release management.
More informationCA Systems Performance for Infrastructure Managers
PRODUCT SHEET: CA Systems Performance for Infrastructure Managers agility made possible CA Systems Performance for Infrastructure Managers CA Systems Performance for Infrastructure Managers is an add-on
More informationTotal Configuration Management for Networked Devices. Gartner Interview...2. Software Distribution...4. Case Study...7. About matrix42...
A matrix42 publication featuring research from Gartner Contents Gartner Interview........2 Software Distribution......4 Case Study.............7 About matrix42..........8 Total Configuration Management
More informationSimplify security management in the cloud
Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized
More informationIBM Tivoli Service Request Manager
Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate
More informationPatch Management Marvin Christensen /CIAC
Patch Management Marvin Christensen /CIAC US DOE Cyber Security Group 2004 Training Conference May 26, 2004 Management Track 11:00 am 11:45 pm UCRL-CONF-204220 CIAC 04-099 This work was performed under
More informationIBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
More informationIBM Maximo Asset Management Essentials
Enterprise asset capabilities for small and midsized organizations IBM Maximo Asset Essentials Highlights Leverage enterprise asset capabilities in a package specifically designed for small and midsized
More informationManaging Vulnerabilities For PCI Compliance
Managing Vulnerabilities For PCI Compliance Christopher S. Harper Vice President of Technical Services, Secure Enterprise Computing, Inc. June 2012 NOTE CONCERNING INTELLECTUAL PROPERTY AND SOLUTIONS OF
More informationPatch Assessment Content Update Release Notes for CCS 11.0. Version: 2012-2 Update
Patch Assessment Content Update Release Notes for CCS 11.0 Version: 2012-2 Update Patch Assessment Content Update 2012-2 Release Notes for CCS 11.0 Legal Notice Copyright 2012 Symantec Corporation. All
More informationSpiritSoft (SpiritWave)
Decision Framework, R. Schulte Research Note 9 December 2002 Predicts 2003: Enterprise Service Buses Emerge The enterprise service bus, a new variation of software infrastructure, has added to the range
More informationVendor Classification
Markets, L. Geishecker, F. Buytendijk Research Note 2 October 2002 Introducing the CPM Suites Magic Quadrant Vendors are developing a wide range of new functionality for corporate performance management.
More informationUnderstanding Vulnerability Management Life Cycle Functions
Research Publication Date: 24 January 2011 ID Number: G00210104 Understanding Vulnerability Management Life Cycle Functions Mark Nicolett We provide guidance on the elements of an effective vulnerability
More informationVendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
More informationAutomated Patching. Paul Asadoorian IT Security Specialist Brown University
Automated Patching Paul Asadoorian IT Security Specialist Brown University Outline Automated Patching Introduction Tools from Microsoft Microsoft SUS Microsoft SMS Others HFNetCheck Pro (Shavlik) Novell
More informationWhy you need an Automated Asset Management Solution
solution white paper Why you need an Automated Asset Management Solution By Nicolas Renard, Support and Professional Services Manager, BMC France Table of Contents 1 OVERVIEW Automated Asset Discovery
More informationTivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time
1 Tivoli Endpoint Manager Increasing the Business Value of IT, One Endpoint at a Time Endpoint Management Cost Today s Endpoint Management Challenges Drive IT Costs Up More than 50% of end users change
More informationResponsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
More informationSoftware License Management: 2012 Software License Management Benchmark Survey SOLUTION WHITE PAPER
Software License Management: 2012 Software License Management Benchmark Survey SOLUTION WHITE PAPER TABLE OF CONTENTS EXECUTIVE SUMMARY................................................ 1 WHAT IS SOFTWARE
More informationHP-UX 11i software deployment and configuration tools
HP-UX 11i software deployment and configuration tools Simplifying management of servers in a virtualized environment Introduction... 2 Simplifying management in dynamic, virtualized environments... 2 HP-UX
More informationRed Hat Enterprise Linux and management bundle for HP BladeSystem TM
HP and Red Hat are announcing a specially priced software bundle for customers deploying Red Hat Linux on HP BladeSystem servers. HP will offer Red Hat Enterprise Linux and management bundle that combines
More informationIncentive Compensation Management for Insurance
Markets, J. Galvin, K. Harris Research Note 10 September 2002 Incentive Compensation Management for Insurance Packaged ICM applications provide alternatives for insurance companies struggling to transform
More informationDisaster Recovery: Weighing Data Replication Alternatives
Technology, D. Scott, J. Krischer, J. Rubin Research te 15 June 2001 Disaster Recovery: Weighing Data Replication Alternatives Enterprises with short disaster recovery time objectives use data replication
More informationKey Considerations for Vulnerability Management: Audit and Compliance
Key Considerations for Vulnerability Management: Audit and Compliance October 5, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software
More informationThe Altiris CMDB BECAUSE YOU HAVE A BUSINESS TO RUN, NOT JUST AN OPERATING SYSTEM
The Altiris CMDB BECAUSE YOU HAVE A BUSINESS TO RUN, NOT JUST AN OPERATING SYSTEM About Altiris, Now Part of Symantec Altiris, Inc., now part of Symantec, is a pioneer of IT lifecycle management software
More informationOracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
More informationAPS/SES combination. Traditional package
Markets, G. Phifer, R. Valdes, D. Gootzit Research Note 26 March 2003 The Horizontal Portal Product 2003 Magic Quadrant The portal product market is undergoing significant segmentation. Gartner presents
More informationApril 15, 2008 The Forrester Wave : Data Center Automation, Q2 2008. by Evelyn Hubbert for IT Infrastructure & Operations Professionals
April 15, 2008 The Forrester Wave : Data Center Automation, Q2 2008 by Evelyn Hubbert for IT Infrastructure & Operations Professionals Making Leaders Successful Every Day Includes a Forrester Wave April
More informationBest Practices for Password Strength
A. Allan Research Note 6 December 2004 Passwords Are Near the Breaking Point Mitigating authentication weaknesses by increasing password length and complexity will reduce security if passwords are pushed
More informationTHE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper
THE COMPLETE VIEWER FOR MS PROJECT Seavus DOOEL 2010 2 TABLE OF CONTENTS 1 DEPLOYMENT OPTIONS... 3 1.1 SINGLE USER INSTALLATION... 3 1.2 CONCURRENT USER INSTALLATION... 4 1.3 SINGLE COMPANY KEY INSTALLATION...
More informationHP Systems Insight Manager and HP OpenView
HP Systems Insight Manager and HP OpenView Working Better Together to Deliver End-to-End Management, from Hardware Infrastructure to Business Service Availability Executive Summary... 2 Challenges of Managing
More informationCDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
More informationResearch. Identity and Access Management Defined
Research Publication Date: 4 November 2003 ID Number: SPA-21-3430 Identity and Access Management Defined Roberta J. Witty, Ant Allan, John Enck, Ray Wagner An IAM solution requires multiple products from
More informationHP Security Assessment Services
HP Security Assessment Services HP Data Center Services Technical data Your corporate information and intellectual property are important assets that you want to protect from unauthorized users. Developing
More information