Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses

Size: px
Start display at page:

Download "Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses"

Transcription

1 WHITE PAPER: LICENSE MANAGEMENT Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that need to move beyond the static environment to manage application licenses should read this white paper. Before, the workforce environment was mobile in which most users worked in the office, from the same computers this management method is no longer sufficient. The flexibility needed to support today s mobile work force while providing the control, efficiencies and cost savings, is required by IT organizations.

2

3 WHITE PAPER: LICENSE MANAGEMENT Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Content Executive Summary Challenges with Traditional Approaches to License Management Licensing Strategies for Today s Workplace Just-in-Time Computing: Putting Effective Licensing Strategy in Place License Management with Symantec Workspace Streaming Conclusion

4 Executive Summary The methods that IT organizations historically used to manage licenses when there were static environments in which most users worked in the office, from the same computers are no longer sufficient. They don t provide the flexibility needed to support today s mobile work force. And they don t provide the control, efficiencies, and cost savings that IT requires. IT organizations need a new approach that addresses the priority that has been placed on reducing total cost of ownership (TCO), while enabling a portable user experience in which workspaces can be dynamically configured, license management can be automated, and user productivity can be improved. Symantec makes this possible with just-in-time computing enabled through Symantec Workspace Streaming, an on-demand application delivery and license management system that enables IT to capture all the rules associated with licenses and automatically enforces them. Using Workspace Streaming, customers can instantly provision the right resources to users as they need them, regardless of their device or location; eliminate the need for daily IT interaction; improve license compliance; and optimize license usage and reharvesting all while saving significant management time and IT costs. Challenges with Traditional Approaches to License Management Traditional license management approaches were originally designed for static environments in which all of a company s users work in the office, always access applications and data from the same computers, and in which software installations are targeted at machines and computers that are infrequently updated. They require IT to choose between models that maximize end user productivity and models that enhance IT control and contain costs. Companies that deem user productivity to be most important may end up allocating application licenses for every device that a user might need the software on leading to excessive license consumption. Organizations that focus on control and cost containment may implement terminal services across the enterprise, since it delivers the best cost-per-user. However, terminal services only supports users who are always connected to the corporate network and isn t appropriate for people who need dedicated computer power. To get around this either/or proposition, some companies adopt heterogeneous computing infrastructures and assign different groups within their IT organization to manage desktops, terminal services, and VDI (virtual desktop infrastructure) environments. While these siloed teams often support the same, or overlapping, user base, they each handle their own application packaging and licensing. And because traditional license management wasn t designed to support these mixed environments, these companies end up with duplicate efforts and sets of licenses. Not only has the makeup of the corporate computing environment changed, the nature of the workforce has evolved during the past decade, making traditional license approaches much less effective. Today s workforce is comprised of people who are increasingly mobile, whether traveling for business, working from remote offices, or telecommuting. This growing mobility has considerable implications on computer and software usage. Instead of working from the same computers at the same locations, today s employees may use one computer in the main office, another when in a branch location, a company-owned laptop when travelling, or their own personal laptop when working from home or even in the office. Wherever they are, these users need to access their applications. Enabling this kind of anytime, anywhere access is expensive and complicated for companies that employ traditional license management techniques. It requires that they adhere to a maximum-configuration model, where IT invests tremendous time and resources into preparing systems with pre-loaded applications including developing images, testing co-existing applications for compatibility, and installing those applications. IT also ends up expending a lot of time updating and remediating these highly populated devices. Not only do these efforts represent a significant resource drain, they don t address the needs of all users, such as people who bring their own personal devices to work; 1

5 these employees typically cannot access the corporate network or get their . And, because traditional license tools don t provide muchneeded intelligence on who is using which applications, what devices employees are using, or what the usage levels are, there is no way for these companies to know whether all of the licenses that are allocated and, therefore, consumed are actually being used. For instance, licenses may be unnecessarily consumed by sleeper users who never or rarely use an application; on hardware that is infrequently utilized; and by ghost employees whose licenses remain unaccounted for when they leave the company or change jobs within the organization and no longer require the applications. Even if IT creates scripts to monitor inventory, information will inevitably fall through the cracks when applications are running on laptops that are disconnected or on virtual desktops that are not activated when the script runs. Because they lack critical license information, companies that want to avoid non-compliance typically pay for more licenses than are needed and waste licenses that could have been repurposed. As a result, overlicensing and overspending are rampant. This high degree of spending is in direct conflict with today s economic conditions. Companies across the board are operating with less budget and fewer IT staff. As a result, their main focus now is on cutting near-term costs and reducing the amount of effort and money that it takes to maintain technologies throughout their lifecycles both of which are extremely difficult to achieve with traditional license management approaches. Licensing Strategies for Today s Workplace To effectively support today s workplace, companies need a new approach to license management one that is tailored to a highly mobile workforce, can efficiently handle a variety of computing environments and license models while capturing real-time license information, and is aligned with current fiscal realities. IT departments that want to meet the corporate directive for lower TCO without negatively impacting user productivity must re-examine the way they manage the user workspace. The workspace consumes the greatest amount of variable IT staff time and money with ongoing activities and costs associated with licensing, delivering, supporting, and maintaining applications, whether the desktop is physical or virtual, local or remote. As such, the workspace affords the greatest opportunity to affect savings. The right licensing strategy can transform the way IT manages the user workspace. It can help improve efficiencies, reduce the need for daily IT involvement, and lower costs for application deployment, support, and maintenance. Effective licensing management can also facilitate user productivity by enabling the workspace to follow the user, so that employees can access the resources they need from any location and any endpoint device, while making it easy for IT to support heterogeneous environments, employing a variety of models (desktop, VDI, terminal services, or a hybrid approach) as appropriate to user needs. By adopting a licensing management strategy that transforms workspace management, organizations can realize their budgetary goals while effectively supporting the needs of a dynamic workplace. Just-in-Time Computing: Putting Effective Licensing Strategy in Place Just-in-time computing is a user-centric approach to computing that enables companies to provision the resources users need, just when they need them, wherever they are and it is essential to effective license management. With just-in-time computing, instead of spending time and resources pre-configuring fully loaded systems that, in all likelihood, won t be completely utilized, IT organizations postpone setting up systems and consuming application licenses until they know exactly what each user s needs are. IT can adopt a minimum-configuration strategy, where it creates a standard image with the lowest-common denominator installation (for example, the operating system and security software) and delivers applications, upon request, to appropriate users. 2

6 To make just-in-time computing work, organizations must have a license management system that is rules-oriented and that can respond automatically to user actions. This way, when a user shows up by logging in (using domain logon, directory service, etc.), IT knows who they are, what role they play in the organization, where they are, what device is at their disposal, what applications they are authorized to use, and whether the licenses for those applications are available. The automated roles-based license rules engine makes sure that the right workspace resources are available to the user in the manner IT prescribed. And by leveraging on-demand deployment capabilities, the moment the user clicks on an icon, the application if not already on the device is streamed so that the user can begin working with it immediately. For instance, Microsoft Office might automatically start streaming in the background so that it is already there when the user needs it, while the rest of the user s applications are represented as icons only and streamed when required. By postponing assignment of licenses and delivery of applications until the user and her device are identified, IT not only avoids a tremendous amount of upfront effort, it can reserve application licenses for when and where they are actually required. License Management with Symantec Workspace Streaming Workspace Streaming is an on-demand application delivery and license management system that uses just-in-time computing to solve the management and cost challenges traditionally associated with licensing. It works across all computing models rich desktops, laptops that can be disconnected, VDI, and terminal services providing a unified solution for centrally managing and provisioning licenses enterprisewide. Workspace Streaming enables IT to easily capture all license rules up front, and then the solution does all the work of following and enforcing the rules. This automated rules enforcement enables IT to essentially guarantee compliance with license agreements while optimizing license usage. Workspace Streaming integrates the rules engine with streaming functionality so that IT can deliver and maintain minimally configured systems and still ensure that users get all the applications they need to do their jobs. These capabilities relieve IT of ongoing license management efforts, driving out costs and enabling a much more efficient process. Comprehensive License Rules Configuration Organizations that use Workspace Streaming begin by capturing license rules associated with each software provider agreement. This includes the number of licenses purchased, how many can be used simultaneously, whether to employ hard number enforcement or liberal distribution with alerts and future true-ups, and the type of license model employed, such as: User-based model - where an application is licensed for a particular user, for use on multiple machines. IT can configure licensing for several or unlimited instances. If a different user who also has a license for that application logs onto the same machine, the software is already there so it doesn t have to be streamed again, and Workspace Streaming recognizes that the second user is working via a separate license. Concurrent model - typically used in terminal services environments, where IT sets a specified number of users to access an application at the same time. Host-based - where an unlimited number of users can access the license when using the same device. Next, IT sets rules for license distribution and acquisition, tying in with its directory service through LDAP integration, to dictate who can use the licenses and under what circumstances. Applications are assigned based on logical roles and/or group membership such as human resources, marketing, sales, and contractors enabling a tailored, portable workspace that follows each user. Because applications can be 3

7 allocated to all users who might need them, whether now or in the future, IT can be assured that users will instantly be able to get the applications they require wherever they are, without having to contact IT for assistance and without interrupting user productivity. IT can configure licenses for provisioning in a number of ways: Pre-streamed upon first login - such as with the Microsoft Office example cited earlier. Displayed as icons - with the applications streamed only when requested for actual use. Workspace Streaming automatically identifies the startup block the minimum code needed to get the application up and running and streams that to the memory on the user s device. The user doesn t have to wait for the entire application to be downloaded before being able to work with it. Accessible through an application portal - when users go to the portal and click on an icon for software that they are allowed to access, the application is streamed to their device. (This method is beneficial for second- and third-tier applications that are less frequently required, and would unnecessarily clutter the desktop or start menu if their icons were pre-populated on the user s workspace.) Licenses can be configured for online, offline and/or offline-if-laptop modes, the latter of which enables administrators to specify that an application is automatically available and 100 percent streamed for offline use if Workspace Streaming determines that it is being accessed via a laptop or other mobile device. These options allow IT to dictate that certain users will not be able to access licenses when offline and ensure productivity for other users by allowing them to access particular applications when disconnected from the corporate network. IT can also set expiration dates for allocated licenses, if needed. For instance, IT staff in educational institutions can configure license longevity to match class duration, and corporate IT staff can assign an application to a contractor and enable it for offline use with an expiration date that coincides with the end of the engagement. Once any required expiration dates are configured, IT can create cost optimization guidelines, prescribing idle time re-harvesting and icon retention rules. With all the rules associated with licenses established, the foundation is now set for Workspace Streaming s rules enforcement engine to implement them. Optimizing Licenses through Automated, Real-time Rules Enforcement Workspace Streaming provides real-time usage monitoring and automated enforcement of licenses rules, whether those licenses are for virtualized software that has been streamed, software that has been locally installed via traditional methods, applications used on disconnected devices, or in VDI environments. This makes it easy for companies to remain in compliance without over-purchasing licenses and to reharvest licenses that aren t being used ultimately optimizing licenses and reducing spending. The solution s client-side enforcement capabilities ensure that the scenarios IT configured in advance such as trial period expiry, onetime use, and idle periods will be implemented. One-time use: Consider, for instance, the contractor configuration noted previously. When the contractor logs onto her computer, the appropriate application icon shows up on the desktop. When the time period is over, Workspace Streaming automatically removes the application and the icon, and the contractor cannot reacquire the license. Idle periods: In an idle period scenario, IT might have specified that a license for an application, such as Microsoft Project, that is used by a particular project manager can be inactive for 90 days. When the time period is up, if the manager hasn t accessed the application, Workspace Streaming s real-time rules enforcement uninstalls and completely removes the application. That license can then be reharvested for another authorized user; the application will be streamed when that second user clicks on the icon. If, during the configuration phase, IT specified that the icon can remain on the original manager s workspace, however, and he clicks the icon after the 4

8 idle period, he can access the application if another user hasn t already consumed the license. IT is not involved in reassigning the license or reprovisioning the application. Simplifying License Management through Notifications License management is also simplified through notifications that IT can configure in advance. Because querying individual users about their license usage simply is not practical, Workspace Streaming offers default notifications that automatically alert IT to take action on licenses consumed. This way, if utilization reaches 90 percent because of new hires or a new project, IT can decide to purchase additional licenses for that application. Or if IT is alerted that consumption is low because employees haven t used an application in more than 60 days, the staff can reharvest those licenses instead of purchasing additional ones. Reharvesting can save enterprises tremendous amounts of money. Ensuring Compliance and Maximizing Investments through Reporting and Integrated Asset Management The license information that Workspace Streaming captures can also be leveraged for auditing purposes. IT can run reports on license usage and share them with software vendors to prove compliance with license agreements. Organizations can also use the reports to show a particular ISV that licenses are continually underutilized, and can then renegotiate the number of licenses they maintain and pay for. Because Symantec recognizes that enterprises may also have other Symantec and third-party asset and contract management solutions, Workspace Streaming makes it easy to share all of the license information that it captures. Enterprises can use Workspace Streaming s Web services to integrate with these systems, exchanging data about license usage and availability, and thereby maximizing their IT investments and their license management capabilities. Conclusion Budget-constrained organizations that want to reduce endpoint TCO while maximizing worker productivity must take a user-centric, just-intime computing approach to license management. Workspace Streaming makes this possible by providing an automated, roles-based license rules engine with client-side enforcement and flexible, on-demand application streaming. As a result, IT no longer wastes resources and time on efforts and licenses that aren t required; instead, licenses are delivered and consumed only when they are truly needed for productive use, and can be easily recovered and repurposed. And users can instantly access their workspace from any location and device, without burdening the IT staff. Workspace Streaming enables the dynamic management of licenses that today s businesses require. 5

9

10 About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA USA +1 (650) (800) Symantec helps organizations secure and manage their information-driven world with endpoint virtualization, server virtualization, and application virtualization. Copyright 2011 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 1/

Symantec Workspace Streaming 6.1

Symantec Workspace Streaming 6.1 Workspace Management: Simplify IT Organizations Data Sheet: Endpoint Virtualization Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops, and

More information

Endpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1

Endpoint Virtualization. Workspace Management: Simplify IT Organizations. Data Sheet Symantec TM Workspace Streaming 6.1 Data Sheet Symantec TM Workspace Streaming 6.1 Workspace Management: Simplify IT Organizations Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops,

More information

Symantec Asset Management Suite 7.5 powered by Altiris technology

Symantec Asset Management Suite 7.5 powered by Altiris technology Symantec Asset Management Suite 7.5 powered by Altiris technology Take control of your assets, ensure compliance, and uncover savings Data Sheet: Endpoint Management Are you paying for unused software

More information

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments Endpoint Management and Mobility Solutions from Symantec Adapting traditional IT operations for new end-user environments During the past few years the traditional concept of end-user computing has drastically

More information

Symantec Asset Management Suite 7.6 powered by Altiris technology

Symantec Asset Management Suite 7.6 powered by Altiris technology Symantec Asset Management Suite 7.6 powered by Altiris technology Take control of your assets, ensure compliance, and uncover savings Data Sheet: Endpoint Management Are you paying for unused software

More information

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization. WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read

More information

Symantec Asset Management Suite 8.0

Symantec Asset Management Suite 8.0 Take control of your assets, ensure compliance, and uncover savings Data Sheet: Endpoint Management Are you paying for unused software licenses? Are you prepared for your next vendor software audit? Take

More information

Symantec Desktop and Laptop Option 7.6

Symantec Desktop and Laptop Option 7.6 Automated protection for desktops and laptops Data Sheet: Backup and Disaster Recovery Overview With the majority of business-critical information residing outside the data centers or on off corporate

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many

More information

Altiris IT Management Suite 7.1 from Symantec

Altiris IT Management Suite 7.1 from Symantec Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from

More information

Symantec Client Management Suite 7.6 powered by Altiris technology

Symantec Client Management Suite 7.6 powered by Altiris technology Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often

More information

VDI May Not Be The Right Solution

VDI May Not Be The Right Solution WHITE PAPER: VDI VERSUS STREAMING VDI May Not Be The Right Solution or Why Streaming Might Be A Better One Contents So You Think You Want VDI?...1 Why VDI?...1 VDI is a platform, not a solution...2 Infrastructure

More information

Altiris Server Management Suite 7.1 from Symantec

Altiris Server Management Suite 7.1 from Symantec Altiris Server Suite 7.1 from Symantec Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Overview The complexity of managing today s data centers is complicated

More information

Altiris Asset Management Suite 7.1 from Symantec

Altiris Asset Management Suite 7.1 from Symantec Ensuring compliance and maximizing your IT investment Overviewview In IT change is inevitable, but asset management provides a starting point for disciplined, standards-based management that elevates the

More information

Simplify SSL Certificate Management Across the Enterprise

Simplify SSL Certificate Management Across the Enterprise WHITE PAPER White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents introduction 1 A Platform for Single-Point Control and

More information

Demystifying Virtualization for Small Businesses Executive Brief

Demystifying Virtualization for Small Businesses Executive Brief Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................

More information

Symantec Workspace Virtualization 7.6

Symantec Workspace Virtualization 7.6 Simplifies application packaging and delivery, eliminates application conflicts, supports normal visibility Data Sheet: Endpoint Management Improve the control and management of your organization s endpoints

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information

Endpoint Virtualization for Healthcare Providers

Endpoint Virtualization for Healthcare Providers WHITE PAPER: xxxxxx BEST PRACTICES [00-Cover_Bar] FOR HEALTHCARE Endpoint Virtualization for Healthcare Providers Confidence in a connected world. White Paper: Best Practices for Healthcare Endpoint Virtualization

More information

Symantec Client Management Suite 7.5 powered by Altiris

Symantec Client Management Suite 7.5 powered by Altiris Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Enterprise Vault 11 Feature Briefing

Enterprise Vault 11 Feature Briefing Enterprise Vault 11 Feature Briefing Enterprise Vault SCOM Enhancements This document is about the new Enterprise Vault SCOM enhancements introduced in Enterprise Vault 11. If you have any feedback or

More information

A Symantec Connect Document. A Total Cost of Ownership Viewpoint

A Symantec Connect Document. A Total Cost of Ownership Viewpoint A Symantec Connect Document Two-Factor Authentication A Total Cost of Ownership Viewpoint White Paper: Two-Factor Authentication: A TCO Viewpoint Two-Factor Authentication Contents Introduction............................................................................................

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

White Paper. Simplify SSL Certificate Management Across the Enterprise

White Paper. Simplify SSL Certificate Management Across the Enterprise WHITE PAPER: SIMPLIFY SSL CERTIFICATE MANAGEMENT ACROSS THE ENTERPRISE White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents

More information

WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview

WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE

More information

Symantec IT Management Suite 7.5 powered by Altiris

Symantec IT Management Suite 7.5 powered by Altiris Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Increasing Your VDI Project s Return on Investment Using Workspace Virtualization

Increasing Your VDI Project s Return on Investment Using Workspace Virtualization W H I T E P A P E R Increasing Your VDI Project s Return on Investment Using Workspace Virtualization W H I T E P A P E R Increasing Your VDI Project s Return on Investment Using Workspace Virtualization

More information

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments

Solution Overview: Data Protection Archiving, Backup, and Recovery Unified Information Management for Complex Windows Environments Unified Information Management for Complex Windows Environments The Explosion of Unstructured Information It is estimated that email, documents, presentations, and other types of unstructured information

More information

How To Monitor Your Entire It Environment

How To Monitor Your Entire It Environment Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................

More information

Achieving Business Agility Through An Agile Data Center

Achieving Business Agility Through An Agile Data Center Achieving Business Agility Through An Agile Data Center Overview: Enable the Agile Data Center Business Agility Is Your End Goal In today s world, customers expect or even demand instant gratification

More information

Endpoint Virtualization Explained:

Endpoint Virtualization Explained: : Methods, Benefits, Challenges, and Recommendations for Desktop Virtualization and Application Virtualization An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for Symantec April 2009 IT

More information

How to Unlock Agility by Backing up to, from, and in the Cloud

How to Unlock Agility by Backing up to, from, and in the Cloud WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper

More information

Symantec Server Management Suite 7.6 powered by Altiris technology

Symantec Server Management Suite 7.6 powered by Altiris technology Symantec Server Management Suite 7.6 powered by Altiris technology Standardized control for distributed, heterogeneous server environments Data Sheet: Endpoint Management Overviewview Symantec Server Management

More information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables

More information

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops July 2009 Table of Contents Introduction... 3 What are Outsourced Hosted Virtual Desktops?... 3 How Outsourced Hosted Virtual

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

How To Support Bring Your Own Device (Byod)

How To Support Bring Your Own Device (Byod) WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Confidence in the Cloud Five Ways to Capitalize with Symantec

Confidence in the Cloud Five Ways to Capitalize with Symantec Five Ways to Capitalize with Symantec Solution Brief: Confidence in the Cloud Confidence in the Cloud Contents Overview...............................................................................................

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

What s New in Ghost Solution Suite 3.0

What s New in Ghost Solution Suite 3.0 What s New in Ghost Solution Suite 3.0 This document highlights some of the most impactful new features of Ghost Solution Suite 3.0 For more comprehensive information, please view the Ghost Solution Suite

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Module Comparison Chart

Module Comparison Chart Module Comparison Chart DYNAMIC CONFIGURATION MODULE Desktop Transformation Transforms any existing desktop infrastructure into managed user workspaces using live data and a step-bystep approach that minimizes

More information

Why Digital Certificates Are Essential for Managing Mobile Devices

Why Digital Certificates Are Essential for Managing Mobile Devices WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper

More information

Symantec ServiceDesk 7.1

Symantec ServiceDesk 7.1 Information Technology Infrastructure Library support and process automation puts the service back in service desk Data Sheet: Endpoint Management Overview IT departments are coming under pressure to do

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any

More information

Simplify Your Windows Server Migration

Simplify Your Windows Server Migration SOLUTION BRIEF: ENDPOINT MANAGEMENT........................................ Simplify Your Windows Server Migration Who should read this paper Windows Server 2003 customers looking to migrate to the latest

More information

Symantec Backup Exec 2012 Licensing Guide

Symantec Backup Exec 2012 Licensing Guide REPORT: SYMANTEC BACKUP EXEC 2012 LICENSING GUIDE........................................ Symantec Backup Exec 2012 Licensing Guide Who should read this paper Use this guide to learn how to license Symantec

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

Symantec Backup Exec 2012

Symantec Backup Exec 2012 Better backup for all Data Sheet: Backup and Disaster Recovery Overview is one integrated product that protects virtual and physical environments, simplifies both backup and disaster recovery, and recovers

More information

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution

Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid backup solution PARTNER BRIEF: IS ONLINE BACKUP RIGHT FOR YOUR BUSINESS?........................................ Is online backup right for your business? Eight reasons to consider protecting your data with a hybrid Who

More information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Direct virtual machine creation from backup with BMR

Direct virtual machine creation from backup with BMR NETBACKUP 7.6 FEATURE BRIEFING DIRECT VIRTUAL MACHINE CREATION FROM BACKUP WITH BMR NetBackup 7.6 Feature Briefing Direct virtual machine creation from backup with BMR Version number: 1.0 Issue date: 5

More information

Symantec Enterprise Vault for Microsoft Exchange Server

Symantec Enterprise Vault for Microsoft Exchange Server Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

Cloud Storage Backup for Storage as a Service with AT&T

Cloud Storage Backup for Storage as a Service with AT&T WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

More information

Cyber Security Services: Data Loss Prevention Monitoring Overview

Cyber Security Services: Data Loss Prevention Monitoring Overview WHITE PAPER: DLP MONITORING OVERVIEW........................................ Cyber Security Services: Data Loss Prevention Monitoring Overview Who should read this paper Customers who are interested in

More information

Leveraging a Maturity Model to Achieve Proactive Compliance

Leveraging a Maturity Model to Achieve Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver White Paper: BEST PRACTICES The Modern Service Desk: Contents Introduction............................................................................................

More information

Workspace Manager 2014 Module Comparison Chart

Workspace Manager 2014 Module Comparison Chart Workspace Manager 2014 Module Comparison Chart DYNAMIC CONFIGURATION MODULE Desktop Transformation Transforms any existing desktop infrastructure into managed user workspaces using live data and a step-bystep

More information

Archiving, Backup, and Recovery for Complete the Promise of Virtualization

Archiving, Backup, and Recovery for Complete the Promise of Virtualization Archiving, Backup, and Recovery for Complete the Promise of Virtualization Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that

More information

Understanding the Value of Symantec Managed Enterprise Vault

Understanding the Value of Symantec Managed Enterprise Vault REPORT: UNDERSTANDING THE VALUE OF SYMANTEC MANAGED.......... ENTERPRISE........... VAULT................... Understanding the Value of Symantec Managed Enterprise Vault Who should read this paper IT managers

More information

Rising to the Challenge. The mid-size business and the New World of Work.

Rising to the Challenge. The mid-size business and the New World of Work. Microsoft & Scense Rising to the Challenge. The mid-size business and the New World of Work. Scense, Handelsplein 125, 3071 PR Rotterdam www.scense.com Table of contents. Executive summary...2 About Scense...

More information

Citrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All. www.citrix.com

Citrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All. www.citrix.com Citrix XenDesktop with FlexCast technology White Paper Citrix XenDesktop: Desktop Virtualization For All www.citrix.com Today s organizations encompass a diverse range of users, from road warriors using

More information

Seven Steps to Getting a Handle on Software Licensing

Seven Steps to Getting a Handle on Software Licensing solution white paper Seven Steps to Getting a Handle on Software Licensing Software Audits are Increasing: Are You Ready? Table of Contents 1 OVERVIEW 2 COMMON CHALLENGES IN MANAGING SOFTWARE LICENSES

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

Mobile Device Management

Mobile Device Management Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper

THE COMPLETE VIEWER FOR MS PROJECT. Deployment White Paper THE COMPLETE VIEWER FOR MS PROJECT Seavus DOOEL 2010 2 TABLE OF CONTENTS 1 DEPLOYMENT OPTIONS... 3 1.1 SINGLE USER INSTALLATION... 3 1.2 CONCURRENT USER INSTALLATION... 4 1.3 SINGLE COMPANY KEY INSTALLATION...

More information

Symantec Backup Exec 2010

Symantec Backup Exec 2010 Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation

Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation Next Generation Data Protection with Symantec NetBackup 7 Mayur Dewaikar Sr. Product Manager Information Management Group Symantec Corporation White Paper: Next Generation Data Protection with NetBackup

More information

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows

Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Solution Overview Cisco Process Orchestrator Adapter for Cisco UCS Manager: Automate Enterprise IT Workflows Cisco Unified Computing System and Cisco UCS Manager The Cisco Unified Computing System (UCS)

More information

Two-Factor Authentication

Two-Factor Authentication WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance

More information

Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support

Symantec Managed PKI for SSL Support Overview. How to get quick and convenient customer support WHITE PAPER: SYMANTEC MANAGED PKI FOR SSL SUPPORT OVERVIEW Symantec Managed PKI for SSL Support Overview How to get quick and convenient customer support Symantec Managed PKI for SSL Support Overview CONTENTS

More information

Endpoint Protection Small Business Edition 2013?

Endpoint Protection Small Business Edition 2013? Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,

More information

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION Frequently Asked Questions WHAT IS SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION 1? Symantec Endpoint Protection Small Business Edition is built

More information

Controlling and Managing Security with Performance Tools

Controlling and Managing Security with Performance Tools Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance

More information

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot

Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

Enterprise Vault Whitepaper Move Archive Feature Overview

Enterprise Vault Whitepaper Move Archive Feature Overview Enterprise Vault Whitepaper Move Archive Feature Overview This document provides an overview of the Enterprise Vault Move Archive feature This document applies to the following version(s) of :

More information

Identity & Access Management in the Cloud: Fewer passwords, more productivity

Identity & Access Management in the Cloud: Fewer passwords, more productivity WHITE PAPER Strategic Marketing Services Identity & Access Management in the Cloud: Fewer passwords, more productivity Cloud services are a natural for small and midsize businesses, with their ability

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage

Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage Enterprise Vault Whitepaper Configuring a NAS device as Enterprise Vault storage This document provides background and guidance on how configure Symantec Enterprise Vault with generic Network Attached

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot

Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance

More information

Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010

Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper. Updated 7/20/2010 W H I T E P A P E R : T E C H N I C A L S E C U R I T Y S O L U T I O N S Symantec Endpoint Protection 11.0 Securing Virtual Environments Best Practices White Paper Updated 7/20/2010 White Paper: Symantec

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

Reach more users with business intelligence

Reach more users with business intelligence Reach more users with business intelligence Highlights Deliver BI information to users in the context of their day-to-day processes and applications Provide actionable intelligence to users, no matter

More information

An infrastructure and virtualization company. a virtualization company

An infrastructure and virtualization company. a virtualization company Clint Adkins, Service Delivery Manager Cyndi Meinke, East Region Account Executive Larry Zimmerman, Senior Account Executive An infrastructure and virtualization company a virtualization company Company

More information

Securing Microsoft Exchange 2010 With VeriSign Authentication Services

Securing Microsoft Exchange 2010 With VeriSign Authentication Services BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH VERISIGN AUTHENTICATION SERVICES Symantec Business Guide Securing Microsoft Exchange 2010 With VeriSign Authentication Services Best Practices for

More information