AGENDA 14:00 15:30. Kaffeepause 15:30 16:10 Key Note 16:10 16:50 Verabschiedung 16:50 17:00

Size: px
Start display at page:

Download "AGENDA 14:00 15:30. Kaffeepause 15:30 16:10 Key Note 16:10 16:50 Verabschiedung 16:50 17:00"

Transcription

1

2 SPONSOREN

3 Thema Zeit Registrierung 08:30 09:15 Willkommen 09:15 09:45 Corporate Strategy 09:45 10:10 Kundenpräsentation - Franck Reiner, Schindler Digital 10:10 10:35 Kaffeepause 10:35 11:05 Demo und Product Roadmap 11:05 12:15 Kundenpräsentation - Katharina Hirsch, Carexpert 12:15 12:35 Mittagessen 12:35 14:00 Breakout Sessions 1. Systems & Security 2. IT Service Management AGENDA 14:00 15:30 Kaffeepause 15:30 16:10 Key Note 16:10 16:50 Verabschiedung 16:50 17:00

4 STEVE DALY P r e s i dent a n d C E O STEVE MORTON C h i e f M a r k e t ing O ff i cer 2015 Lenovo Kickoff. All rights reserved. 4

5

6

7 UNIFIED Endpoint Management Ken Dulaney and Terrence Cosgrove Managing PCs, Smartphones and Tablets and the Future Ahead

8 I T S E R V I C E MANAGEMENT I T A S S E T M A N A G EMENT S E C U R I T Y C O N F I G U R A T I O N MANAGEMENT U N I F I E D E N D P O INT MANAGEMENT

9

10 DOUG KNIGHT V P Systems E n g i n e ering

11 S u r r o u n d i n SIMPLICITY D e l i g h t i n EFFICIENCY P r o t e c t i n SILENCE

12 S O L U T I O N S f o r t h e ENTIRE COMPANY 5 F I T A D M I N S u l l f e a t u r e d a d m i n i s t r a t o r c o n s o l e 100 I T A D M I N S Full- f e a t u r e d a d m i n i s t r a t o r c o n s o l e 10,000 E N D U S E R S W o r k s p a c e t o d e l i v e r s e r v i c e s

13

14 W H AT S N E W i n Mac OS X Patching 64-bit Core Server A C C E L E R AT E D P U S H D I S T R I B U T I O N SLAM Allocations & Reclamation ENHANCED REBOOT SETTING Inventory Extensions 9.6 D I S C O N N E C T E D P R O V I S I O N I N G SELF- O R G A N I Z I N G M U LT I C A S T H T ML5 Remote C o n t r o l E N D P O I NT S E C U R I T Y S E L F - S E R V I C E PAT C H

15 ENHANCED REBOOT SETTINGMachines Ta s k S t a t u s PACKAGE RELATIONSHIPS Inventory Extensions ENHANCED LINUX P a t c h S c a n b y S c o p e P r o v i s i o n i n g Te m p l a t e W H AT S N E W i n 9.6SP1 CSA Miniscan Scheduled Tasks Download 64-bit Core Server Multi-Threaded Query A C C E L E R AT E D P U S H D I S T R I B U T I O N Ag e n t H e a l t h M o n i t o r i n g SLAM Allocations & Reclamation Mac OS X Patching 9.6 D I S C O N N E C T E D P R O V I S I O N I N G I n t e g r a t e d L o g i n SELF- O R G A N I Z I N G M U LT I C A S T MAC PROVISIONING H T ML5 Remote C o n t r o l S c h e d u l e To Portal P r o v i s i o n ing E N D P O I NT S E C U R I T Y S E L F - S E R V I C E PAT C H End- u s er / p o r t a l I T app

16 W H AT S N E W i n E N D U S E R W O R K SPA CE Inventory Extensions ENHANCED LINUX P a t c h S c a n b y S c o p e M A C S O F T WA R E D I S T R I B U T I O N P r o v i s i o n i n g Te m p l a t e 9.6 SP2 ENHANCED REBOOT SETTINGMachines Ta s k S t a t u s PACKAGE RELATIONSHIPS CSA Miniscan Scheduled Tasks Download 64-bit Core Server Multi-Threaded Query A C C E L E R AT E D P U S H D I S T R I B U T I O N Ag e n t H e a l t h M o n i t o r i n g SLAM Allocations & Reclamation Mac OS X Patching D I S C O N N E C T E D P R O V I S I O N I N G TRUSTED PATHS I n t e g r a t e d L o g i n SELF- O R G A N I Z I N G M U LT I C A S T MAC PROVISIONING H T ML5 Remote C o n t r o l S c h e d u l e To Portal P r o v i s i o n ing E N D P O I NT S E C U R I T Y S O F T WAR E D I AG N O T I C S ET LO FO - SL E R V I C E PAT C H End- u s er / p o r t a l I T app

17 WHAT WE VE DONE for YOUR MAC 9.6 OS X Mavericks support End-user portal/workspace Multi-platform software association Support for new reboot settings Software distributions deferral options Remotely enable Filevault 2 HTML 5 remote control at login screen Optional patches publishable to the portal Patch over wireless Enhanced package properties 9.6 Mac Provisioning Minimal steps to create robust provisioning templates SP1 9.6 SP2 No additional infrastructure required like a Mac Server Leverage existing infrastructure: PXE Rep Leverage HTTP preferred servers Mac Provisioning Software distribution in provisioning Template picker for bare metal provisioning (will come up on a netbooted computer if no templates are assigned to it) New background for provisioning

18 Immediate SUPPORT

19

20

21 S E C U R I T Y B R E A C H E S EVERYWHERE Ebay 1 4 5, 0 0 0, Heartland 1 3 0, 0 0 0, TJ Maxx 9 4, 0 0 0, Sony 7 7, 0 0 0, US Military 7 6, 0 0 0, JP Morgan Chase 7 6, 0 0 0, Target 7 0, 0 0 0, Home Depot 5 6, 0 0 0, Living Social 5 0, 0 0 0, R E C O R D S L O S T To p s e c u r i t y b r e a c h e s

22 70% of companies either have no patch management process or do not have a fully mature patch management process.

23 % 90of the known vulnerabilities exploited by cyber attackers in 2014 had been Identified at least a year before.

24 #1 in PATCH MANAGEMENT DATA CENTER ENDPOINT THIRD-PARTY & OS HETEROGENEOUS

25 Multi-layered SECURITY D i s c o v e r y V u l n e r a b i l i t y M a n a g e m e n t AV / M a l w a r e A p p l i c a t i o n C o n t r o l M o n i t o r i n g & R e p o r t i n g.

26 THE WORLD HAS CHANGED

27 S E RV I CE D E S K S I N C E W E L A S T M E T Workspace Gadgets Optical Character Recognition Integration Italian Language ENDUSER WORKSPACE Content : SnapIT PRODUCT USAGE STATISTICS Enhanced Schedule Management In-context knowledge search IN-CONTEXT TELEPHONY INTEGRATION IN THE BROWSER Shibboleth Authentication Content : Time Tracking SnapIT Capability Configuration Centre website management IMAGE HANDLING MULTIPLE ATTACHMENTS Native IE7 and IE8 support Process-Linking to Web Services DATA IMPORT SCHEDULING Content : MultiLingual Service Desk Analyst ITSM Workspace KNOWLEDGE PROCESS SEARCH 7.8 DYNAMIC ROUTING OF PUBLISHED HTML LINKS Identity Confirmation Multi-lingual Capabilities Contextual Data Controls Collections CONTENT : GENIUS BAR Event Management Enhanced Enhanced messages for users DASHBOARD PIE-CHART ANIMATION In-Context Actions - Desktop Management extended Enhanced Workspace

28 T h e New Fa c e o f Ser v i c e Desk

29

30

Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant

Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant The Future of LANDESK Management Suite & Security Suite W H AT S N E W i n 9.6 + SP1 + SP2 E N D U S E R WORKSPA C E A C C E L E R AT

More information

What s New in LANDESK Service Desk A tour of the new features and functionality released since Connect 2014

What s New in LANDESK Service Desk A tour of the new features and functionality released since Connect 2014 What s New in LANDESK Service Desk A tour of the new features and functionality released since Connect 2014 Lara Hellman, Product Owner Since Connect 2014 7.7.1, 7.7.2, 7.7.3, 7.8 7.8.1 Roadmap 2 7.7.1

More information

Momentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products

Momentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products LANDESK Momentum Momentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products improve your ROI Upcoming Webinars: Visit: www.landesk.com/momentum

More information

LANDESK Service Desk Content Packs + What s next

LANDESK Service Desk Content Packs + What s next LANDESK Service Desk Content Packs + What s next Discover the hidden gold in LANDESK Service Desk Ian Aitchison, Director Product Management Jens Kindgen, Presales Consultant All that is gold does not

More information

What s New in LANDESK Service Desk Version 7.8. Abstract

What s New in LANDESK Service Desk Version 7.8. Abstract What s New in LANDESK Service Desk Version 7.8 Abstract This document highlights the new features and enhancements introduced in versions 7.8 of LANDESK Service Desk. Document Creation: December, 19 2014.

More information

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh People-centric IT: Bedeutung für das Identity und Access Management Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh Cloud OS Vision Microsoft s vision of the unified platform

More information

Getting Started with VMware Horizon View (Remote Desktop Access)

Getting Started with VMware Horizon View (Remote Desktop Access) Getting Started with VMware Horizon View (Remote Desktop Access) Use The Links Below To Navigate This Document Using VMware Horizon View with Tablet and Smartphone APP or Mobile Web Browser Walk Through

More information

Eliminating XP from the environment by the end of 2012. 2014 organizations to cost-effectively plan, manage and support PC change initiatives.

Eliminating XP from the environment by the end of 2012. 2014 organizations to cost-effectively plan, manage and support PC change initiatives. Client Automation Complete automation capabilities for managing daily operational processes across large, A locked and well-managed desktop PC can cost 43% less to keep than an 43% heterogeneous environments

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

JP1 Version 11: Example Configurations

JP1 Version 11: Example Configurations JP1 Version 11: Example Configurations Asset and Distribution Management January 2016 List of example configurations for IT asset and distribution management ITDM - 01 Configuration for centrally managing

More information

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Getting Started with the iscan Online Data Breach Risk Intelligence Platform Getting Started with the iscan Online Data Breach Risk Intelligence Platform 2 Table of Contents Overview... 3 Data Breach Risk Intelligence... 3 Data Breach Prevention Lifecycle Defined... 3 Choosing

More information

Portal for ArcGIS. Satish Sankaran Robert Kircher

Portal for ArcGIS. Satish Sankaran Robert Kircher Portal for ArcGIS Satish Sankaran Robert Kircher ArcGIS A Complete GIS Data Management Planning & Analysis Field Mobility Operational Awareness Constituent Engagement End to End Integration Collect, Organize,

More information

Bomgar 10.6 License Comparison

Bomgar 10.6 License Comparison Bomgar 10.6 License Comparison Multi-Platform Support Customer Technician/Representative Windows Windows 95-Windows 7 Server 2003 Server 2008 Windows 2000-Windows 7 Server 2003 Server 2008 Mac OS X OS

More information

Symantec Client Management Suite 7.6 powered by Altiris technology

Symantec Client Management Suite 7.6 powered by Altiris technology Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Dynamic Service Desk. Unified IT Management. Solution Overview

Dynamic Service Desk. Unified IT Management. Solution Overview I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and

More information

Secure User Management

Secure User Management What s New in 9.5 SP1 Secure User Management 9.5 SP1 Technology Updates Updated Overview: Secure User Management / LANDesk Management and Security Solutions, including Management Suite, Security Suite,

More information

How Simple Is It To Develop a Mobile App? Uma Sudhan OpenEdge Developer 7 th Oct 2013

How Simple Is It To Develop a Mobile App? Uma Sudhan OpenEdge Developer 7 th Oct 2013 How Simple Is It To Develop a Mobile App? Uma Sudhan OpenEdge Developer 7 th Oct 2013 Agenda What a mobile app is, and why is it so important? Challenges in mobile app development Progress Developer Studio

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

EMPOWERING THE DYNAMIC WORKPLACE

EMPOWERING THE DYNAMIC WORKPLACE EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile

More information

Symantec Client Management Suite 7.5 powered by Altiris

Symantec Client Management Suite 7.5 powered by Altiris Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve

More information

LANDesk 9.5.1. Hva er nytt i denne?

LANDesk 9.5.1. Hva er nytt i denne? LANDesk 9.5.1 Hva er nytt i denne? Routes to Market Broad Platform Software Asset Management Data Analytics User Mgmt. Endpoint Security 9.5 SP1 LANDesk Desktop Portal (apps, docs, links) BridgeIT portal

More information

Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune

Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune Enrollment and Management of Mobile Devices with Microsoft System Center Configuration

More information

HEAT DSM 2015.2 Release Overview. Andreas Fuchs Product Management November 16th, 2015

HEAT DSM 2015.2 Release Overview. Andreas Fuchs Product Management November 16th, 2015 HEAT DSM 2015.2 Release Overview Andreas Fuchs Product Management November 16th, 2015 HEAT DSM 2015.2 Highlights HEAT Discovery Integration Patch Management Enhancements HEAT PatchLink Integration HEAT

More information

DANIEL ILIES. Territory Manager South-East Europe

DANIEL ILIES. Territory Manager South-East Europe DANIEL ILIES Territory Manager South-East Europe ABOUT LANDESK Delivering Value LANDESK Quick Facts 1985 1991 LANSystems Inc. was founded NetPort, LANSpool, LANSpace, LANShell, LANSight and ReferencePoint

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Deployment Guide Sept-2014 rev. a Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Table of Contents 1 Introduction... 2 1.1 Array Networks AG Series Secure Access

More information

Unified Windows Device Management in the Enterprise

Unified Windows Device Management in the Enterprise Unified Windows Device Management in the Enterprise Chuck Brown Product Management Jimmy Tsang Product Marketing Lenovo ThinkPad 8 Giveaway Tweet @MaaS360 with event hashtag #MaaS360Win Winner will be

More information

VMware End User Computing Horizon Suite

VMware End User Computing Horizon Suite VMware End User Computing Horizon Suite Luc Gallet lgallet@vmware.com 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work

More information

Oracle Desktop Virtualization

Oracle Desktop Virtualization Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

Remote Access Services Apple Macintosh - Installation Guide

Remote Access Services Apple Macintosh - Installation Guide Remote Access Services Apple Macintosh - Installation Guide Version. February, 05 P age Contents GETTING STARTED... JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... Checking Mac OS version... Java

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Easily integrate Mac into Microsoft System Center

Easily integrate Mac into Microsoft System Center Master your Macs in the Business Easily integrate Mac into Microsoft System Center Sascha Uhl Business Development Manager suhl@parallels.com Leader in Cloud Services Enablement and Desktop Virtualization

More information

Mobile Application Security

Mobile Application Security Mobile Application Security Rebecca Finnin, AT&T ISACA Geek Week 08/20/2013 AGENDA Mobile Application Development Review Gartner Framework of Mobile App Development Challenges Outline Security Implications

More information

LANDesk Professional Services

LANDesk Professional Services LANDesk Professional Services Service Description For G-Cloud Background Drawing upon 25 years of experience, LANDesk today is recognized as a leading provider of systems and endpoint security management,

More information

NetSupport Manager v11

NetSupport Manager v11 Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control

More information

Symantec IT Management Suite 7.5 powered by Altiris

Symantec IT Management Suite 7.5 powered by Altiris Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,

More information

How To Set Up Hopkins Wireless On Windows 7 On A Pc Or Mac Or Ipad (For A Laptop) On A Network Card (For Windows 7) On Your Computer Or Ipa (For Mac Or Mac) On An Ipa Or

How To Set Up Hopkins Wireless On Windows 7 On A Pc Or Mac Or Ipad (For A Laptop) On A Network Card (For Windows 7) On Your Computer Or Ipa (For Mac Or Mac) On An Ipa Or Wireless Configuration Guide: Windows 7 Additional hopkins wireless network instructions and requirements for Windows XP, Vista, 8, Mac OS X, Linux, and other Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/

More information

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management

Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.

More information

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time

Tivoli Endpoint Manager. Increasing the Business Value of IT, One Endpoint at a Time 1 Tivoli Endpoint Manager Increasing the Business Value of IT, One Endpoint at a Time Endpoint Management Cost Today s Endpoint Management Challenges Drive IT Costs Up More than 50% of end users change

More information

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Parallels Mac Management v4.0

Parallels Mac Management v4.0 Parallels Mac Management v4.0 Deployment Guide July 18, 2015 Copyright 1999 2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. All other marks and names mentioned herein may be trademarks

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

IBM Endpoint Manager Product Introduction and Overview

IBM Endpoint Manager Product Introduction and Overview IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to

More information

Take Back Control in IT. Desktop & Server Management (DSM)

Take Back Control in IT. Desktop & Server Management (DSM) Take Back Control in IT Desktop & Server Management (DSM) Table of Contents 1. Abstract... 3 2. Migrating to the virtual, fluid model of client computing... 4 3. Challenges in the new era of client computing...

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

WolfTech Active Directory: SCCM 101

WolfTech Active Directory: SCCM 101 WolfTech Active Directory: SCCM 101 July 28th, 2011 2-5pm Daniels 201 August 5th, 2011 2-5pm Daniels 201 http://activedirectory.ncsu.edu/ What is going to covered? What is SCCM Roles Console Client Inventory

More information

Cascade Collaboration Solutions 5 Aug 2014

Cascade Collaboration Solutions 5 Aug 2014 Cascade Collaboration Solutions 5 Aug 2014 5530001600 Rev 03 Contents 1. Solution Overview... 3 2. Collaboration End Points... 5 3. Collaboration Cloud Server... 7 4. Technical Specifications... 8 4.1.

More information

EndUser Protection. Peter Skondro. Sophos

EndUser Protection. Peter Skondro. Sophos EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application

More information

This policy applies to all instances of LANDesk client software installed on Creighton-owned hardware that are connected to JAYNet.

This policy applies to all instances of LANDesk client software installed on Creighton-owned hardware that are connected to JAYNet. Page 1 of 5 PURPOSE This Standard supports Client Deployment Policy and provides the additional detail necessary to implement the policy. This standard ensures consistent function and delivery of the LANDesk

More information

Table of Contents. 10.0 Release Notes 2013/04/08. Introduction ... 3. in OS Deployment Manager. in Security Manager ... 7. Known issues ... 9 ...

Table of Contents. 10.0 Release Notes 2013/04/08. Introduction ... 3. in OS Deployment Manager. in Security Manager ... 7. Known issues ... 9 ... Release Notes Release Notes 2013/04/08 Table of Contents Introduction... 3 Deployment Manager... 3 New Features in Deployment Manager... 3 Security Manager... 7 New Features in Security Manager... 7 Known

More information

Simplifying Desktop Mgmt With Novell ZENworks

Simplifying Desktop Mgmt With Novell ZENworks Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America jmarton@novell.com Ryan Radschlag Network Manager Hartford Joint #1

More information

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

ArcGIS Web Mapping. Sam Berg, esri sberg@esri.com

ArcGIS Web Mapping. Sam Berg, esri sberg@esri.com ArcGIS Web Mapping Sam Berg, esri sberg@esri.com Agenda ArcGIS and WebMaps The APIs ArcGIS for Flex Viewer ArcGIS for Silverlight Builder ArcGIS for Sharepoint ArcGIS Application Templates ArcGIS Runtime

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Remote Working Service Remote Access - VDI User Instructions

Remote Working Service Remote Access - VDI User Instructions Remote Working Service Remote Access - VDI User Instructions Created By: Devilliers Swart Created Date: 12/02/14 Document Version 1.5a Page 1 Prerequisites Check List Please note these instructions are

More information

Numara Track-It! 10.5. Product Family Overview. www.numarasoftware.com

Numara Track-It! 10.5. Product Family Overview. www.numarasoftware.com Numara Track-It! 10.5 Product Family Overview www.numarasoftware.com Introduction The Numara Track-It! family of IT Management solutions gives you the ability to immediately take control of your Help Desk

More information

Attachment Y SaaS ITSM Demonstration and Scenarios

Attachment Y SaaS ITSM Demonstration and Scenarios Attachment Y SaaS ITSM Demonstration and Scenarios Demonstration and Oral Presentation Agenda In accordance with Section 1.16 of the RFP, each Presenter will be provided a 3 hour time period to discuss

More information

Adobe Flash Player and Adobe AIR security

Adobe Flash Player and Adobe AIR security Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,

More information

Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA)

Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Access the UTHSCSA Palo Alto Networks (PAN) VPN using Global Protect VPN client and Two Factor Authentication (2FA) Table of Contents Introduction. 1 Determine your Windows Operating System (for software

More information

How To Make A Desktop Operating System (Daas) Available To Aaas (Aas) Service Provider

How To Make A Desktop Operating System (Daas) Available To Aaas (Aas) Service Provider Desktop as a Service So much more than virtual desktops!!! Desktop Management & Delivery Desktop OS Patching & Update Desktop & User Support Options Traditional Desktops Virtual Desktops Application Packaging

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Business Value of Microsoft System Center 2012 Configuration Manager

Business Value of Microsoft System Center 2012 Configuration Manager Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration

More information

BYOD: The Catalyst to the Post-PC era

BYOD: The Catalyst to the Post-PC era BYOD: The Catalyst to the Post-PC era Lourens Prinsloo Senior Systems Engineer VMware South Africa 2009 VMware Inc. All rights reserved Agenda Today s dilemma: User demand The Post-PC era VMware s vision

More information

Best-of-Breed Enterprise Mac Management

Best-of-Breed Enterprise Mac Management White Paper Best-of-Breed Enterprise Mac Management Choose the right tool for the job A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and

More information

Check Point Positions

Check Point Positions Check Point Positions - Gartner Magic Quadrants - IDC Market Share Research 2012 Dean J. Whitehair Analyst Relations October 2012 Version 9.0 Updated 10/17/2012 2012 Check Point Software Technologies Ltd.

More information

QuickStart Guide for Managing Computers. Version 9.2

QuickStart Guide for Managing Computers. Version 9.2 QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software

More information

Bomgar 14.1 License Comparison

Bomgar 14.1 License Comparison Bomgar 14.1 License Comparison Features for Support Representatives Feature Name Description License Type Multi-Platform Support Customer Representative Windows Windows 2000 - Windows 8 Server 2000-2012

More information

Work Better Connected. Orange County Convention Center May 5-7, 2015 Orlando, Florida

Work Better Connected. Orange County Convention Center May 5-7, 2015 Orlando, Florida Work Better Connected. Orange County Convention Center May 5-7, 2015 Orlando, Florida Renewing your SAP Enterprise Portal implementation with SAP Fiori launchpad Inbal Sabag Customer Success Expert SAP

More information

BlackBerry Mobile Voice System

BlackBerry Mobile Voice System BlackBerry Mobile Voice System Mobile Unified Communications BlackBerry Mobile Voice System (BlackBerry MVS) brings desk phone features to BlackBerry smartphones. Work with one business number at the office

More information

Secure Virtual Assist/ Access/Meeting

Secure Virtual Assist/ Access/Meeting Secure Virtual Assist/ Access/Meeting Easy-to-use tools for secure remote support, PC control and collaboration Technical support by phone, email, chat and pre-installed remote support clients can be cumbersome,

More information

BMC FootPrints & Client Management

BMC FootPrints & Client Management BMC FootPrints & Client Management IMAVES Hotel The Loop 17.11.2015. AGENDA FootPrints SC & Client Management 10:00h 10:15h Uvod, Marin Petrović 10:15h 10:45h Client Managament, Igor Rabatić 10:45h 11:15h

More information

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006

How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management. White Paper Sept. 2006 How PatchLink Meets the Top 10 Requirements for Enterprise Patch and Vulnerability Management White Paper Sept. 2006 Introduction It happens, five, ten, twenty times a month: A hardware or software vendor

More information

Portal Instructions for Mac

Portal Instructions for Mac Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...

More information

5 Steps to Advanced Threat Protection

5 Steps to Advanced Threat Protection 5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious

More information

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management

Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING

More information

IT Security. Muscat 15+ ABOUT US IN A GLANCE

IT Security. Muscat 15+ ABOUT US IN A GLANCE www.insight.co.om insightoman insightoman insightoman insight-information-technology www.insight.co.om insightoman insightoman insightoman insight-information-technology ABOUT US LOCATION Visit us at

More information

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically

More information

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016 ZENworks 11 Support Pack 4 Management Zone Settings Reference May 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Develop IBM i Mobile and Desktop Applications with a Single Code Base. BCD Software, LLC. All rights reserved.

Develop IBM i Mobile and Desktop Applications with a Single Code Base. BCD Software, LLC. All rights reserved. Develop IBM i Mobile and Desktop Applications with a Single Code Base About the Presenters Greg Patterson Technical Sales Engineer BCD and Quadrant Software - A Division of Fresche Maximize Your Investment

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager pchadwick@suse.com. Product Marketing Manager djarvis@suse.

SUSE Cloud 2.0. Pete Chadwick. Douglas Jarvis. Senior Product Manager pchadwick@suse.com. Product Marketing Manager djarvis@suse. SUSE Cloud 2.0 Pete Chadwick Douglas Jarvis Senior Product Manager pchadwick@suse.com Product Marketing Manager djarvis@suse.com SUSE Cloud SUSE Cloud is an open source software solution based on OpenStack

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

Parallels Mac Management for Microsoft SCCM

Parallels Mac Management for Microsoft SCCM Parallels Mac Management for Microsoft SCCM Administrator's Guide v4.5 Copyright 1999-2016 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59

More information

IBM s Mobile Enterprise Strategy. 2012 IBM Corporation

IBM s Mobile Enterprise Strategy. 2012 IBM Corporation IBM s Mobile Enterprise Strategy Mobile is changing conventions for industries Healthcare Construction Government From: Traditional health institution To: Seamless interactions among physicians and providers,

More information

The Server Room vs. the Board Room. 2015 State of the Desktop Survey Reveals Executives are Out of Touch

The Server Room vs. the Board Room. 2015 State of the Desktop Survey Reveals Executives are Out of Touch The Server Room vs. the Board Room 2015 State of the Desktop Survey Reveals Executives are Out of Touch Introduction Executives at organizations of all sizes and across countless industries experience

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security

More information