1 IBM Software Thought Leadership White Paper February 2012 Automated, centralized management for enterprise servers Servers present unique management challenges but IBM Endpoint Manager is up to the job
2 2 Automated, centralized management for enterprise servers Contents 2 Introduction 2 One solution for two sets of challenges 5 IBM Endpoint Manager characteristics and capabilities 7 Techniques for automating server endpoint management 10 Integration with other Tivoli products 11 Conclusion Introduction Managing desktop, laptop and mobile endpoints is an ongoing challenge that many organizations have tackled successfully using IBM Endpoint Manager. But what you may not realize is that the same solution that provides automated, centralized lifecycle management, security management and other critical capabilities for end user endpoints is ideal for managing servers as well. With its single-agent, single-console approach, unique automated techniques and integration with IBM Tivoli products, IBM Endpoint Manager is an efficient and effective alternative to the ad hoc collections of point products and internally-developed solutions that many organizations are currently using to manage servers. It provides a centralized way to deliver automated lifecycle management and security management for heterogeneous server deployments without disrupting critical business applications or slowing network traffic. This paper explores the unique issues that server endpoint management raises, examines the IBM Endpoint Manager capabilities that address those issues and describes two successful implementations. One solution for two sets of challenges The first thing that is important to understand about server endpoints is that you can t manage them exactly the same way you manage other endpoints, because they have their own distinct requirements and challenges. But you can use the same solution to manage them, if it s the right solution one with the comprehensive capabilities in place to address server-related challenges. The result is the kind of unified environment for endpoint management illustrated in Figure 1.
3 IBM Software 3 Systems management Managed = Secure Common management agent Unified management console Common infrastructure Single server IBM Endpoint Manager Security management that can result in missed change windows, decreased server availability and poor performance, negatively impacting service levels. In contrast, IBM Endpoint Manager provides highly efficient server management capabilities that automate management and maintenance of servers to meet the demands of tight change windows in a manner that is both effective and cost-efficient. The benefits of these high levels of automation are many, including reduction in the change window duration, increased business application availability and decreased server management labor costs. Desktops / laptops / servers Mobile devices Purpose-specific devices Figure 1: Unified management enabled by IBM Endpoint Manager The following briefly describes some of the main challenges posed by server endpoint management and how IBM Endpoint Manager enables organizations to respond to them. Strictly defined change windows Unlike desktops, laptops and mobile devices, servers have tightly defined maintenance windows during which management tasks such as patches, updates and configuration changes must be completed. Many server management products on the market today employ slow, scan-based architectures, requiring costly manual administration to ensure on-time completion and to verify proper operation after maintenance is completed. Some organizations have attempted to develop their own in-house, script-based server management tools that must be maintained and continually updated. Both of these approaches typically result in slow, costly and inefficient server management processes Virtualization Virtualized server environments are in a constant state of change, requiring frequent provisioning and deprovisioning of virtual machines as computing requirements dictate. Virtualized servers demand close management to ensure they are configured to meet service level agreements and that they comply with corporate policies and government regulations. Using IBM Endpoint Manager, however, administrators can automate management and maintenance of virtualized servers just as easily as they can with physical servers. IBM Endpoint Manager also supports virtualized desktop technologies, including the distribution and management of Microsoft Application Virtualization (App-V) packages using the same distribution tools and processes as non-virtual packages configuring and maintaining App-V clients, profiles and packages to reduce infrastructure cost and maintenance time. Using a dashboard that shows which virtual machines are running on which host, administrators can use the same solution to manage virtualized desktops and laptops in the IT environment, rather than having to use two different sets of tools to manage desktop/laptop virtualization and server virtualization.
4 4 Automated, centralized management for enterprise servers Heterogeneous deployments Whether in traditional data centers, branch offices or retail settings, server deployments often comprise a variety of operating platforms, including Microsoft Windows, UNIX and Linux. Since many distributed servers are located outside traditional data centers, including branch offices and public, private and hybrid clouds, the ability to manage these machines remotely with as much visibility as possible is essential. Administrators need to discover and inventory the numbers and types of servers deployed in their complex environments and know and report the current state of all servers, including configuration changes and software updates. Using IBM Endpoint Manager in their heterogeneous environments, administrators can gain the deep insight and manageability they need with server management capabilities such as asset discovery and inventory, compliance enforcement and reporting, automation, software and operating system deployment, and policy-based patch and configuration management, all via a single management console and serverbased agent, simplifying management operations. Figure 2 highlights how IBM Endpoint Manager addresses server endpoint management across a distributed, multiplatform organization. Server management using IBM Endpoint Manager Stores 56k WAN Headquarters Remote command and control of managed servers Content Update Service Continuous patch and policy updates Satellite Data center Cloud-based virtual servers Remote offices Distribution center Existing servers used as relays to minimize network traffic Figure 2: Server management using IBM Endpoint Manager.
5 IBM Software 5 IBM Endpoint Manager characteristics and capabilities The broad set of capabilities delivered by IBM Endpoint Manager provides an industry-leading approach that not only reaches across diverse endpoint environments and operating platforms, but also operates from a centralized control point to simplify management functions. These centralized capabilities aggregate and analyze data and provide reports to ensure ongoing operations. The solution s flexible infrastructure leverages existing machines, quickly designating agents to act as content relays or discovery points. And a single intelligent management agent provides an extraordinarily efficient approach with minimal system for continuous self-assessment and policy enforcement on average generally requiring less than two percent of the CPU and less than 10 MB of memory on average. From lifecycle management capabilities (including asset discovery and inventory, software distribution, patch management, operating system deployment and remote control) to security and compliance capabilities (including security configuration management, vulnerability management, patch management, anti-virus and anti-malware client management and network self-quarantine), the solution is designed to provide flexible, modular management. An organization can easily start with one set of capabilities and later add capabilities (generally via a simple licensing key change) as needed. Lifecycle management IBM Endpoint Manager for Lifecycle Management delivers functions that address the full server lifecycle, including asset discovery and inventory, software distribution, operating system deployment and patch management. The solution places an intelligent agent on each endpoint to perform multiple functions, including continuous self-assessment and policy enforcement, without significantly affecting system performance. Unlike traditional client-server architectures that wait for specific management instructions from a server, the IBM Endpoint Manager intelligent agent initiates actions autonomously based on policies that it has been instructed to enforce. It automatically pulls patches, configurations or other information to the endpoint whenever necessary to comply with a relevant policy. Fixlet messages, based on a unique and flexible policy language, enable administrators to create custom policies and services for endpoints. In addition to providing a simple process for custom policy authoring, IBM also provides thousands of out-of-the-box Fixlets for patch, configuration, security and compliance management purposes.
6 6 Automated, centralized management for enterprise servers Security and compliance management IBM Endpoint Manager for Security and Compliance provides unified, real-time visibility and enforcement to help protect server assets and to assure regulators that systems are meeting security compliance standards. Addressing key security capabilities such as security standards support, security configuration management and vulnerability management, the solution delivers unified, real-time visibility and enforcement to protect complex distributed environments. Built to include libraries of technical controls and tools based on industry best practices and standards for server and endpoint security configuration, IBM Endpoint Manager for Security and Compliance enables continuous, automated detection and remediation of security configuration issues. Its management capabilities are designed to give organizations control over the full range of compliance deployment, managing computer groups, computer properties, datasources, imports, roles, server settings, users and exceptions. With endpoint management and security built into a single solution, IBM Endpoint Manager for Security and Compliance is designed to identify configuration issues and report levels of compliance toward security configuration goals. It provides accurate, precise and up-to-the minute visibility into, and continuous enforcement of security configurations and patches. And it centralizes management of third-party anti-malware and firewall protection. The solution s support for custom reports extends to security and compliance; Figure 3 shows a custom report that is being used in a real-world deployment to report comprehensively on security and compliance status, including status of patches, IP scans and anti-virus scans. Patch management An explosion of security breaches in 2011 prompted IBM X-FORCE to label it the Year of the security breach. 1 These breaches, and the increased awareness that followed, prompted the urgent issuance of software and operating system patches aimed at blocking attackers points of entry via organizations servers and user endpoints. IBM Endpoint Manager for Patch Management is designed specifically to enable organizations to keep ahead of the steadily increasing number and frequency of patches being issued today with speed and reliability. Operating efficiently even over high-latency, low bandwidth connections, it shortens remediation time to hours, reduces IT workload and cost with automation, and ensures greater than 90 percent first-pass success rates. With comprehensive capabilities for delivering patches for Microsoft, UNIX, Linux and Macintosh operating systems and a full range of vendors applications, IBM Endpoint Manager for Patch Management provides all the basic steps for patch management research, assess, remediate, confirm, enforce and report in a unified, closed-loop, fully verifiable (and auditable) process.
7 IBM Software 7 Figure 3: Custom report with a single view of security and compliance activity, including patches, IP scans and anti-virus scans. Techniques for automating server endpoint management Reducing manual processes with an automated solution such as IBM Endpoint Manager can reduce the administrative effort required to manage servers while increasing overall service levels and system availability. In some environments, the number of servers can make manual management not only difficult, but actually impossible. IBM Endpoint Manager provides three specific techniques to automate management and maintenance of servers: Maintenance windows, out-of-band management and patch waves. Maintenance windows Maintenance windows are a familiar concept in data center management, but they often serve only as a time window during which manual processes are applied to servers an inherently inefficient and potentially costly situation. Inability to perform
8 8 Automated, centralized management for enterprise servers all required maintenance within the given timeframe can also result in violations of service level agreements (SLAs) and can impact the availability of critical business applications. IBM Endpoint Manager helps avoid these issues by establishing and enforcing maintenance windows through the use of automatic tools. The solutions capabilities for closed-loop policy enforcement, locking and Fixlet messages are designed to improve maintenance windows: Closed-loop policy enforcement automatically publishes policies to the IBM Endpoint Manager agent, which evaluates them for relevance, takes necessary actions and reports on resulting changes in state in near real-time. This requires fewer resources than traditional manual methods. A locking mechanism allows administrators to distribute policies to servers for reporting while delaying actual policy enforcement actions until the appropriate change window occurs. Fixlet messages enable highly-granular policy deployment for efficient, targeted control, down to the level of one Fixlet for one patch. Competitive offerings must package multiple patches together, increasing the likelihood of failure since all patches must be successfully applied or rolled back in the same unit of work. For further efficiency, Fixlets can be pre-staged on managed servers for evaluation and reporting, with the locking mechanism described above preventing action until the change window occurs. Out-of-band management IBM Endpoint Manager reduces network load by using a network of hierarchical relays acting as super agents that can be used to route management traffic via a noncritical network path, using bandwidth throttling if required. Fixlets and other content, such as patches and software installers, are passed to these relays, which are typically another non-dedicated managed device also on the network close to the managed server. Managed servers then retrieve Fixlets and other content directly from the relays instead of the IBM Endpoint Manager server. IBM Endpoint Manager agents can be configured to automatically select the best and closest relay, providing a level of fault tolerance, as well as efficiency. Because traffic through relays can be routed via noncritical network links, all management traffic can be easily routed away from line of business activities known as an out-of-band network. IBM Endpoint Manager also routes all management traffic via a single customizable port, making it easier to assign quality of service and to route management traffic to other networks as needed. Other approaches can require as many as 20 ports to accomplish the same tasks that IBM Endpoint Manager accomplishes with one port, making quality of service prioritization much more difficult.
9 IBM Software 9 Patch waves IBM Endpoint Manager delivers the real-time awareness and high speed required to patch servers in groups, or waves, rather than simultaneously, in a waterfall-like test and deployment environment. This reduces risk by introducing a proper test regimen into the patch process. Patches are deployed first to a test environment, where any issues can be identified and resolved before they have a widespread effect; the patches are then deployed to servers in subsequent waves in a conveyor-belt fashion, with more business-critical servers being patched later in the cycle. IBM Endpoint Manager makes it easy to create and execute patch waves using custom groups and custom sites. Custom groups enable administrators to group servers according to criteria such as directory group memberships, server-naming conventions, or virtually any other identifiable characteristic. Administrators can control exactly which Fixlets are applicable to any given group of servers by publishing the Fixlets to a custom site for that group of servers. The servers are then assigned to that site instead of to the main patch site. It is easy to copy specific Fixlets from the main patch site to a custom site, using a simple point-and-click operation. Brit Insurance: Using patch waves to reduce risk Brit Insurance, an international general insurance and reinsurance group with offices in countries around the world, uses IBM Endpoint Manager to keep pace with the application of security software patches to the servers in its UK data center. Proper application of patches is vital to the company s security and compliance posture, as the center hosts the bulk of business-critical applications and data for the company s worldwide operations. Brit Insurance specifically uses the patch waves capability in IBM Endpoint Manager to reduce risk by tightly controlling rollout of patches to its large server landscape. The steps in this process are: Create several server groups: test, bulk 1, bulk 2, bulk 3 and control Roll out patches to the test group first to allow for identification and resolution of any issues before deploying to remaining groups Deploy patches to remaining groups in turn, reducing the risk of disrupting business-critical production systems Add servers to appropriate groups based on each server s specific risk profile Monitor progress and deliver management information on the number of servers in each deployment group and overall rollout status Brit Insurance s group security manager notes, Having the Tivoli solution in place means we can patch business-critical production servers in a controlled, automated way, with relatively little effort. It reduces the patching risks, and enables me to enforce security standards more rigorously across the application teams.
10 10 Automated, centralized management for enterprise servers Integration with other Tivoli products IBM Endpoint Manager is designed to integrate with IBM asset management and other solutions to provide unified visibility and control of IT operations, in the interest of smooth, consistent management. For example, in an internal IBM deployment, IBM Endpoint Manager is bi-directionally integrated with IBM Tivoli Asset Management for IT, which delivers comprehensive service management capabilities, and with IBM Tivoli Service Request Manager, which provides service desk capabilities. IBM Endpoint Manager can also be integrated with a variety of other IBM tools, depending on an organization s specific requirements, and with non-ibm products as well. Thanks to IBM Endpoint Manager s open interfaces, integration with any third-party application that has an open interface is possible, including configuration management databases (CMDBs) and service desk solutions. The ease of integration that IBM Endpoint Manager offers illustrates IBM s broad commitment to helping organizations address management of the full range of IT operations across the enterprise while preserving existing investments. IBM Tivoli solutions help ensure real-time visibility, centralized control and enhanced productivity and security for the entire IT infrastructure, including its globally distributed endpoints. IBM Tivoli integrated service management Employee information LDAP Tivoli Application Dependency Discovery Manager Deployed assets Tivoli Secure Authentication Service Asset database Tivoli Asset Management for IT database Tivoli Service Request Manager database Configuration management database IBM Endpoint Manager Servers Deployed assets Tivoli Process Automation Engine Service request application Problem management application Change management application Asset management application Common and integrated workflows Figure 4: Integration of IBM Endpoint Manager with Tivoli Asset Management for IT and Tivoli Service Request Manager, as deployed internally by IBM.
11 IBM Software 11 IBM: A large-scale, integrated internal deployment In addition to managing more than 400,000 end user workstations and laptops, IBM uses IBM Endpoint Manager to manage servers for the company s Tivoli software development laboratories. This means managing server farms comprising more than 4,500 Windows, UNIX and Linux machines for a multitude of groups within the organization, with functions that include asset management, service management and ticketing, plus security and compliance. Administrators managing security and compliance in this complex environment rely on IBM Endpoint Manager to: Streamline security and compliance through a unified approach that combines patch management, anti-virus activity and password rules activity Track server classifications, groups, owners, users and other key information and attributes required to effectively manage security and compliance, using a custom security configuration file placed on each server Improve patch delivery by publishing Fixlet messages to time-saving custom sites where users can easily find them and apply them to manage compliance Increase endpoint management efficiency through full integration with IBM Tivoli Asset Management for IT and IBM Tivoli Service Request Manager; IBM Endpoint Manager automatically collects information to populate lists of deployed assets for the former and opens tickets for the latter Achieve the difficult balance between enabling groups to operate as secure, separate silos and managing all the operations as an integrated, synchronized entity Conclusion In today s complex IT infrastructures, managing the server lifecycle, including configuration changes and security updates, can be a challenge. Many organizations turn to ad hoc collections of point products and internally-developed solutions. But IBM Endpoint Manager provides a more efficient, more comprehensive solution. From a single, centralized management console, IBM Endpoint Manager supports today s heterogeneous environments including virtualized servers with capabilities for lifecycle management and security and compliance management, including outstanding capabilities for rapid and effective patching. Integration with IBM asset management and other solutions provides unified visibility and control for a full range of server needs. For more information To learn how IBM Endpoint Manager can help you manage distributed server endpoints effectively, contact your IBM representative or visit: ibm.com/tivoli/endpoint ibm.com/software/tivoli/products/endpoint-lifecycle-mgmt/ ibm.com/software/tivoli/products/ndpoint-security-compliance/ ibm.com/software/tivoli/products/endpoint-patch-mgmt You can download a free trial of IBM Endpoint Manager for Lifecycle Management, with its software distribution capabilities, enabled for up to 30 endpoints for 30 days. Simply visit the following website: ibm.com/developerworks/downloads/tiv/endpoint/ You also can arrange through your IBM sales representative a free proof of concept, which will enable you to compare IBM Endpoint Manager s capabilities with your incumbent solution.
12 About Tivoli software from IBM Tivoli software from IBM helps organizations efficiently and effectively manage IT resources, tasks and processes to meet ever-shifting business requirements and deliver flexible and responsive IT service management, while helping to reduce cost. The Tivoli portfolio spans software for security, compliance, storage, performance, availability, configuration, operations and IT lifecycle management, and is backed by world-class IBM services, support and research. For more information on Tivoli software from IBM, visit: ibm.com/tivoli Additionally, IBM Global Financing can help you acquire the IT solutions that your business needs in the most cost-effective and strategic way possible. We ll partner with credit-qualified clients to customize an IT financing solution to suit your business goals, enable effective cash management, and improve your total cost of ownership. IBM Global Financing is your smartest choice to fund critical IT investments and propel your business forward. For more information, visit: ibm.com/financing Copyright IBM Corporation 2012 IBM Corporation Systems and Technology Group Route 100 Somers, NY U.S.A. Produced in the United States of America February 2012 IBM, the IBM logo, ibm.com, and Tivoli are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The client examples cited are presented for illustrative purposes only. Actual performance results may vary depending on specific configurations and operating conditions. It is the user s responsibility to evaluate and verify the operation of any other products or programs with IBM products and programs. THE INFORMATION IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Actual available storage capacity may be reported for both uncompressed and compressed data and will vary and may be less than stated. 1 IBM X-Force 2011 Mid-year Trend and Risk Report, IBM Corporation, September 2011 Please Recycle TIW14128-USEN-00
Trend Micro Deep Security Server Security Protecting the Dynamic Datacenter A Trend Micro White Paper August 2009 I. SECURITY IN THE DYNAMIC DATACENTER The purpose of IT security is to enable your business,
Delivering better business results, higher availability and lower costs IBM Tivoli Monitoring Highlights Improve availability and meantime-to-recovery Make new operators highly pro- (MTTR) with ductive
Microsoft Corporation and HP Using Network Attached Storage for Reliable Backup and Recovery Microsoft Corporation Published: March 2010 Abstract Tape-based backup and restore technology has for decades
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
Microsoft Dynamics NAV 2009 Business Intelligence Driving insight for more confident results White Paper November 2008 www.microsoft.com/dynamics/nav Table of Contents Overview... 3 What Is Business Intelligence?...
Microsoft Dynamics NAV 2009 Business Intelligence Driving insight for more confident results White Paper November 2008 www.microsoft.com/dynamics/nav Table of Contents Overview... 3 What Is Business Intelligence?...
Securing Enterprise Applications Version 1.1 Updated: November 20, 2014 Securosis, L.L.C. 515 E. Carefree Highway Suite #766 Phoenix, AZ 85085 T 602-412-3051 email@example.com www.securosis.com Author
Problem Management Contents Introduction Overview Goal of Problem Management Components of Problem Management Challenges to Effective Problem Management Difference between Problem and Incident Management
A COALFIRE WHITE PAPER Using s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance Implementing s Deep Security Platform in a Payment Card Environment April 2015 Page 1 Executive Summary...
Symantec Control Compliance Suite Overview Addressing IT Risk and Compliance Challenges Only 1 in 8 best performing organizations feel their Information Security teams can effectively influence business
WHITE PAPER: LICENSE MANAGEMENT........................................ Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that
Standard: Version: 2.0 Date: June 2011 Author: PCI Data Security Standard (PCI DSS) Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines
Connecting PPM and software delivery Efficiently deliver strategic, high-value, low-risk software projects Contents 2 The outdated approach to PPM 2 A better approach to PPM for software delivery 4 IBM
Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success June, 2013 Contents Executive Overview...4 Business Innovation & Transformation...5 Roadmap for Social, Mobile and Cloud Solutions...7
Best practice in the cloud: an introduction Using ITIL to seize the opportunities of the cloud and rise to its challenges Michael Nieves AXELOS.com White Paper April 2014 Contents 1 Introduction 3 2 The
UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) È Annual Report pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934 For the fiscal year ended
A Requirement for Virtualization and Cloud Computing An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange Solutions October 2012 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS
NDMP Backup of Dell EqualLogic FS Series NAS using CommVault Simpana A Dell EqualLogic Reference Architecture Dell Storage Engineering June 2013 Revisions Date January 2013 June 2013 Description Initial
An Oracle White Paper April 2010 Application Performance Management with Oracle Enterprise Manager 11g Introduction... 1 Top Challenges of Application Performance Management... 2 Oracle s Application Performance
White Paper Information Security, Virtualization, and the Journey to the Cloud By Jon Oltsik August, 2010 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG.
M86 MailMarshal Exchange USER GUIDE Software Version: 7.1 M86 MAILMARSHAL EXCHANGE USER GUIDE 2011 M86 Security All rights reserved. Published November 2011 for software release 7.1 No part of this Documentation