DANIEL ILIES. Territory Manager South-East Europe
|
|
|
- Dwayne Jordan
- 10 years ago
- Views:
Transcription
1
2 DANIEL ILIES Territory Manager South-East Europe
3 ABOUT LANDESK
4
5 Delivering Value
6 LANDESK Quick Facts LANSystems Inc. was founded NetPort, LANSpool, LANSpace, LANShell, LANSight and ReferencePoint LANSystems introduces LANSchool (one of the industry s first automated desktop management solutions) LANSystems introduces remote control capability 1991 Intel acquires LANSystems 1992 Intel is founding member of DMTF (LANDESK, as a software division of Intel, plays a key role) 1993 Intel releases LANDESK Manager 1.0. IDC starts watching desktop management market and names LANDESK the category leader 1996 Intel releases the Wired for Management Initiative (LANDESK again plays a key role) 1996 Intel and IBM form the Advanced Manageability Alliance (LANDESK again plays a key role) 1997 Intel releases LANDESK Configuration Manager 1999 Intel introduces the Preboot Execution Environment PXE (LANDESK plays a key role) 2001 LANDESK solutions revolutionize large packet distribution with LANDESK Targeted Multicast technology During the Intel era LANDESK licensed significant technology (remote control, systems management functionality, and virus protection) to important industry players including Microsoft, Novell and Symantec
7 LANDESK Quick Facts (cont d) 2002 LANDESK spins out of Intel and becomes stand-alone corporation 2004 LANDESK provides convergence for systems and security management into a single fully integrated solution, all manageable within a single console and database 2006 Avocent acquires LANDESK Leading analyst firm Gartner Research places Avocent s LANDESK in the Leaders Quadrant of its PC Life Cycle Configuration Management Magic Quadrant Avocent s LANDESK Management Suite 8.8 named Clear Choice Test winner by Network World Magazine Leading analyst firm Gartner Research places Avocent s LANDESK in the Leaders Quadrant of its PC Life Cycle Configuration Management Magic Quadrant Avocent acquired by Emerson 2013 LANDESK Acquires Shavlik VMware Security Team
8 Delivering Business Value Increase Productivity Children s Hospital of Philadelphia (10k clients) desktop services unit reduced helpdesk calls by 50%. Advocate Health Care (27k clients) increased PC count from 4,500 to over 25,000, but are managed with less technical staff. London Borough of Hillingdon (pop. 250,000) doubled 1 st line support resolution from 30% to 60%. 2 nd and 3 rd line team undertook strategic roles, saving $100,000 annually in contractors. End user selfservice decreased helpdesk volume by 5%. American Modern Insurance (2k clients) re-deployed over $1m in FTE resources. Reduce Risks China Construction Bank (210k clients) performs layered security with HIPS and patch management across their worldwide infrastructure. Honeywell (110k clients) centralized desktop management services, gaining control and achieving over 97% success in worldwide updates, lowering infrastructure demands from 263 servers to 25 servers. Wawa (580 locations) Delivers a secure file integrity monitoring system while providing best-practice auditing reports achieving PCI compliance. Reduce Costs CEG (14k clients) saved $1m in their first year through software license reclamation. DC Government (15k clients) saves $600k per year in energy costs using client power management. BASF (47k clients) uses systems lifecycle management and application virtualization to distribute 250,000 patches per month, managing 3,000 applications and 24,000 remote sessions per month
9 THE LANDESK VISION
10 Desktop Computer Multiple Devices Data Cloud Storage User Self Service Applications IT Support
11 LANDESK Total User Management Systems Management Security Management Enterprise Mobility Management IT Service Management Asset Lifecycle Management
12 LANDESK Centers of Excellence SYSTEMS MANAGEMENT SECURITY MANAGEMENT SERVICE MANAGEMENT ASSET MANAGEMENT MOBILITY MANAGEMENT Inventory Discovery Remote Control Workflow Automation Software Distribution OS Deployment Profile Migration Power Management Software License Mgmt Asset Mgmt HP & Lenovo HW Mgmt Win/Mac/Linux Exec. Dashboarding Patch Management Win, Mac, Linux 3rd Party Apps Server Patch Virtualization Patching Workflow Automation Anti-Spyware App Blacklisting App Whitelisting AV Management Software Firewall Compliance Auditing Exec. Dashboarding PinkVERIFY on 15 ITIL disciplines Workflow Automation Self-Service Request Service Catalog Incident Management Problem Management Change Management Federated CMDB Config. Management Knowledge Management Event Management Enterprise Integration Discovery State Management Location Tracking SW License Detection SW License Use Tracking Workflow Automation Vendor Integration Warranty & Lease Mgmt Contract Management Barcoding / RFID Web Console SNMP Device Mgmt BYOD Management Discovery ios/droid/blackberry Device Blocking Policy Enforcement Device Provisioning Device Wipe App Advertisement Location Tracking Voice Enablement Terminal Svc. Client Exec. Dashboarding Exec. Dashboarding
13 Why? Bare Metal Provisioning LD-SD -> Inventory -> Remote Desktop Remote Desktop to non-ms Systems, based on HTML5 Consistent policy per user Intelligence LDDA for (non-) agent systems Printer / Network Equipment Monitoring / Management Mobility: MDM and BYOD (agentless vendor / OS agnostic) Analytical Patch Management
14 VULNERABILITY MANAGEMENT & COMPLIANCE
15 Good software gone bad 1 39% of companies have had security incidents by legitimate software Go Beyond OS Updates 86% of Vulnerabilities are in third party applications. 3 25% Suffered Critical Data Leaks 10% Suffered Serious Financial Losses 84% of Vulnerabilities in Software have a Patch Available. 3 Focus Your Application Patch Strategy On 2 : 50% Oracle Java 22% Adobe Reader 13% Browsers 15% Others Sources: 1 Kaspersky Labs, IBM Threat Report, Dan Sher, Security Bistro, 2013 Application Vulnerabilities
16 Patch Management Heterogeneity in OS Patching Patch Windows, Mac, Linux Devices Application Patching Patch third-party vulnerability content including Adobe, Apple, Java and others Remediation Not only see the vulnerabilities on your network but remediate these vulnerabilities.
17 Patch Management Remote Users Using the Cloud Services Appliance (CSA) patch users regardless of their location. The CSA ensures the user s devices are updated with the latest definition files. Conserve corporate bandwidth by having your clients download patches directly from 3 rd party patch servers.
18 LANDESK Security Suite LANDESK provides me the tools and technologies I need to secure and manage my IT environment in a way that saves me time and money, while allowing me to focus on other important projects Macintosh/Windows/Linux / Unix Support FileVault/Bitlocker Status and Inventory Active Directory and Directory Services Integration *Patch Management Operating Systems And Over rd Party Applications Maintenance Windows Application Control Whitelisting and Blacklisting Cloud Based File Reputation Connection Control Manager Drives, Modems, USB, Comm Ports, Bluetooth, Etc Encrypt Remote Media Spyware Blocking and Removal *Can Be Licensed Separately From Suite
19 LANDESK DATA ANALYTICS
20 LANDESK Data Analytics We can determine at a glance which machines will need to be replaced or upgraded, and build those costs almost to the penny into our budgets. It would take 4 additional technicians to manually do what each of our 4 support people can now do with LANDESK. That s an annual savings of $224,000 in salaries and benefits alone. Gregory Pentz, Sun National Bank Aggregate Vendor, Reseller and Manufacturer Data Share Analytical IT Data for Processes and Decision Making Control Software Licenses Manage Hardware Lifecycles Control Software Licenses Drive down costs Negotiate licensing more effectively Track SaaS and VDI usage Manage Hardware Lifecycles Agentless infrastructure See printer and asset status Locate and map printers and other assets *Can Be Licensed Separately From Suite
21 LANDESK Data Anlaytics System Warranties Inventory Printers, Copiers, Network Gear, IP Phones, Etc Import/Export Info Between Applications Gather PO and Purchase Info Normalize Vendors/Application Names Which Software I Have To Pay For EULA Awareness Approved Software Lists Update Active Directory Pull In My Reseller Info Automatically Tell How Many Pages I Have Printed VDI Software Licensing Fill In SCCM s Gaps
22 Discovery and Inventory Challenges: I have all this data, but no way to see or report what we have LANDESK Solution: Discover all software and software licenses Base IT decisions on accurate information about the environment Purchase Data Challenges: We don t have people to input all the information from each asset purchase LANDESK Solution: Know everything about purchases Automatically import vendor and warranty data Automate data manipulation for better reporting normalization, standardization, calculations
23 Software License Challenges: What do we own? We also need to know if something comes on the network. LANDESK Solution: Reconcile installs with entitlements; handle the exceptions (especially installed, but not entitled) Be prepared for an audit: Move from defense (you prove compliance) to offense (they prove violation) Purchase Data Challenges: We don t have people to input all the information from each asset purchase LANDESK Solution: Know everything about purchases Automatically import vendor and warranty data Automate data manipulation for better reporting normalization, standardization, calculations
24 User-Related Hardware Challenges: I d like to know the status for hardware like printers We ve lost leased assets before and had to pay a heavy price for LANDESK Solution: See printer and asset status like ink and toner levels, plus number of pages printed Track and located leased assets and integrate with asset tracking through barcode scanning Visibility Challenges: Need to know when to replace assets LANDESK Solution: Track warranty information to know when to retire and replace assets See the relationships among hardware, software, contracts, users and organizational units to enable comprehensive asset reporting Track lifecycle states for each managed asset and use state changes to trigger automated workflows
25 How It Works Data Analytics Manufacturer Cloud Data LANDesk Vendors Resellers Executives Barcodes Private Data Imports SNMP AD Normalization Standardization Data Mapping Calculations IT Directors SCCM IT Analysts & Admins
26 Cloud Aggregators: Reseller Costs, Number of licenses, PO# Vendor EULA, Versions, Packaging (Single or Suite) Assigned Owner AD LANDesk Effective Licensing Beginning of Life Benefits: More robust data = all the data you need to control your software licenses Data:
27 Cloud Aggregators: Reseller Purchasing Vendor EULA Scanned Shipping Scanned Receiving Dock Beginning of Life Benefits: More and clearer data = more confidence, more savings, more efficient IT Data: Analysis & Report: Upgrade:
28 LANDESK Mobility Manager
29 LANDESK Mobility Manager ios, Android, Windows Phone 8, Blackberry support Management Suite integration Emphasis on Mobile Security LANDESK Portal app Simplified device management LANDESK allows us to easily control and secure our data and ensure our devices are inventoried and protected. The solution is absolutely a missioncritical tool for us. Enhanced Mobile Application Management
30 Mobile User IT Profile Operation Task Worker Customer Task Worker Knowledge Worker Corporate Owned Corporate Owned Corporate and\or User Owned Business Concern: Productivity Business Concern: Productivity & Security Business Concern: Security
31 Mobile Device Management (MDM) Vision: Enable secure enterprise access for all major mobile phone, tablet, and laptop devices Device Configuration Security Compliance and control Integrated with broader IT tools Desktop Management Service Desk Endpoint Security SaaS and On-premise delivery End-user portal for all devices to: Apps: Access corporate developed and\or approved Content: Single stop for secure access to corporate content Service: self-service portal for all, not just mobile service needs
32 BYOD - LetMobile
33 BYOD the New User Landscape 70% of mobile professionals will conduct their work on personal smart devices by 2018 Gartner
34 Business Applications IT Services Sales Applications Back Office BI
35 Inbound Authorization, access control Monitoring, auditing Profiling The LetMobile Gateway Public or private cloud Corporate Data Center
36 Outbound Credentials not stored on the device Apply DLP rules in real-time Apply access control policies in real time The LetMobile Gateway Public or private cloud Corporate Data Center
37 How Does it Work
38 Native Mail Client
39 Corporate Content protected - not stored on device Private Content is not protected by LetMobile Unified View
40 LetMobile server detects that the user is not in session requires authentication Corporate Content is Locked
41 Password policy is configurable Redirected to LetMobile app to authenticate
42 Project the content from the LetMobile server content not stored on the device Back to the native app Read
43 Attachment Viewing Attachment not stored on the device Viewed and protected by LetMobile No Save as or Open with DLP rules applied in real time
44 Corporate Credentials Stored on the device Sent over the wire Can be easily stolen Even if sent over SSL
45 Secure Mobile Folder Allow Save as to a personal virtual drive All files saved on server not on device
46 Offline Access Airplane mode Hybrid mode Secure container per Bypass
47 Mobile DLP
48 Real Time DLP Decision
49 Mobile DLP Content based Context based Geo location based
50 Web Console
51 Self Service Portal
52 Administrator Console
53 TOTAL USER MANAGEMENT
54 Why Focus On The User? Cost Risk Device-Based Management Avg # of devices per worker is now 2.93 Increase in management cost Higher risk of losing critical data Increase in service/support cost and resources Licensed Software for Devices unplanned 64% of workers use personal devices at work Users Taxing IT by driving their wants User-Oriented IT License User vs. Devices = Lowers Cost One solution to manage all devices Service moves more to user self-service Users are productive no matter where they work Increase productivity, lower cost and risk Provide users with options and deliver IT control Embrace productivity and maintain policy
55 SYSTEMS MANAGEMENT SECURITY MANAGEMENT MOBILITY MANAGEMENT ASSET MANAGEMENT SERVICE MANAGEMENT Inventory Discovery Remote Control Workflow Automation Software Distribution OS Deployment Profile Migration Power Management Software License Mgmt Asset Mgmt HP & Lenovo HW Mgmt Win/Mac/Linux Exec. Dashboarding Patch Management Win, Mac, Linux 3rd Party Apps Server Patch Virtualization Patching Workflow Automation Anti-Spyware App Blacklisting App Whitelisting AV Management Software Firewall Compliance Auditing Exec. Dashboarding BYOD Management Discovery ios/droid/blackberry Device Blocking Policy Enforcement Device Provisioning Device Wipe App Advertisement Location Tracking Voice Enablement Terminal Svc. Client Discovery State Management Location Tracking SW License Detection SW License Use Tracking Workflow Automation Vendor Integration Warranty & Lease Mgmt Contract Management Barcoding / RFID Web Console SNMP Device Mgmt Exec. Dashboarding PinkVERIFY on 15 ITIL disciplines Workflow Automation Self-Service Request Service Catalog Incident Management Problem Management Change Management Federated CMDB Config. Management Knowledge Management Event Management Enterprise Integration Exec. Dashboarding LICENSED BY EMPLOYEE LICENSED BY EMPLOYEE LICENSED BY EMPLOYEE LICENSED BY EMPLOYEE LICENSED BY EMPLOYEE SECURE USER MANAGEMENT TOTAL USER MANAGEMENT
56 Q&A
57 THANK YOU
Ben Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Symantec IT Management Suite 7.5 powered by Altiris
Symantec IT Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve productivity,
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Unified Windows Device Management in the Enterprise
Unified Windows Device Management in the Enterprise Chuck Brown Product Management Jimmy Tsang Product Marketing Lenovo ThinkPad 8 Giveaway Tweet @MaaS360 with event hashtag #MaaS360Win Winner will be
IBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Mobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
Symantec Endpoint Security Management Solutions Presentation and Demo for:
Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Simplifying Desktop Mgmt With Novell ZENworks
Simplifying Desktop Mgmt With Novell ZENworks Joe Marton Senior Systems Engineer Collaboration Solution Principal Novell North America [email protected] Ryan Radschlag Network Manager Hartford Joint #1
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Microsoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
Altiris Client Management Suite
Altiris Client Management Suite Agenda 1 What DO YOU Need Help With 2 What does Altiris have to Assist 3 What s New with CMS 7 4 Beyond Client Management Altiris Client Management Suite Leads the Way Symantec
IBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
Secure User Management
What s New in 9.5 SP1 Secure User Management 9.5 SP1 Technology Updates Updated Overview: Secure User Management / LANDesk Management and Security Solutions, including Management Suite, Security Suite,
LANDesk Data Analytics
LANDesk White Paper LANDesk Data Analytics An innovative, comprehensive approach to managing software and hardware assets Visit www.landesk.com for more information. To the maximum extent permitted under
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Symantec Client Management Suite 7.5 powered by Altiris
Symantec Client Management Suite 7.5 powered by Altiris IT flexibility. User freedom. Data Sheet: Endpoint Management Overview technology enables IT to make better decisions, be more flexible, improve
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! [email protected]
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! [email protected] 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, 2016. Kaseya Catalog - 1 - Kaseya Copyright 2016. All rights reserved.
KASEYA CLOUD SOLUTION CATALOG 2016 Q1 UPDATED & EFFECTIVE AS OF: February 1, 2016 Kaseya Catalog - 1 - Overview of the Kaseya Cloud Subscription Solutions The Kaseya Cloud solutions are designed to meet
On and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant
Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant The Future of LANDESK Management Suite & Security Suite W H AT S N E W i n 9.6 + SP1 + SP2 E N D U S E R WORKSPA C E A C C E L E R AT
Device Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
Microsoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, [email protected] IT-Concern John Marcum Enterprise Client Management Architect / [email protected]
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Altiris IT Management Suite 7.1 from Symantec
Altiris IT 7.1 Achieve a new level of predictability Overviewview Change is inevitable for IT and it comes from several sources: changing needs from lines of business, managing and supporting too many
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
IT Enterprise Services
IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Dynamic Service Desk. Unified IT Management. Solution Overview
I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Microsoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions [email protected] @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.
Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 [email protected] 1 Agenda New threats means advanced security tactics SEP
Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Dell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
CDH. Microsoft System Center Configuration Manager & Mobile Device Management
Microsoft System Center Configuration Manager & Mobile Device Management Quick Facts About Us 22 nd Year Grand Rapids & Royal Oak 30 Staff Approach Vendor Independent Non-reseller Professional Services
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
Mobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
Simplify and Automate IT
Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
Data Protection McAfee s Endpoint and Network Data Loss Prevention
Data Protection McAfee s Endpoint and Network Data Loss Prevention Dipl.-Inform. Rolf Haas Principal Security Engineer, S+, CISSP [email protected] January 22, 2013 for ANSWER SA Event, Geneva Position Features
Required Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Asset Management Suite Backup Exec Certificate Intelligence
Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014
Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity
Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility
Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser
Kaseya Product Brief The Kaseya Platform Making your systems more secure, your staff more productive, your services more reliable and your results easier to validate. No matter what part of Kaseya s integrated
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
IBM Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
Altiris IT Management Suite 7.1 from Symantec
Altiris IT Management Suite 7.1 from Achieve a new level of predictability Data Sheet: Endpoint Management Overviewview Change is inevitable for IT and it comes from several sources: changing needs from
Best Practices in Lifecycle Management
Best Practices in Lifecycle Management Comparing Suites from Dell, LANDESK, Microsoft, and Symantec An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) Position Paper Prepared for Dell Revised: February 2015 IT
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
ITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009
ITIL and Altiris ServiceDesk Joseph Carson, Sr. Product Manager October 21, 2009 Agenda Altiris Portfolio Overview IT Lifecycle Management Service Framework Establish the Face of IT to the Business Automate
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
EndUser Protection. Peter Skondro. Sophos
EndUser Protection Peter Skondro Sophos Agenda Sophos EndUser Solutions Endpoint Usecases Sophos Mobile Solutions Mobile Usecases Endpoint Sophos EndUser Solutions EndUser Protection AV Firewall Application
Bitdefender GravityZone Sales Presentation
6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations
Mobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
KIFINTI. Kifinti White Paper. IT Asset Management Four Steps To Implementing an Effective IT Asset Management Strategy. Paul Kelsey 4/1/2012
KIFINTI Kifinti White Paper IT Asset Management Four Steps To Implementing an Effective IT Asset Management Strategy Paul Kelsey 4/1/2012 This paper is designed for IT Managers, Business Analysts and Controllers
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Numara Track-It! 10.5. Product Family Overview. www.numarasoftware.com
Numara Track-It! 10.5 Product Family Overview www.numarasoftware.com Introduction The Numara Track-It! family of IT Management solutions gives you the ability to immediately take control of your Help Desk
Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization
Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization Barb Goldworm Founder, president & chief analyst, FOCUS, LLC [email protected] The
IBM Security Systems Solutions
1 IBM Security Systems Solutions Agenda Market opportunity Where are companies investing in security today? What do we offer? Customer case studies and win reviews Security and the Cloud Call to action
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage
CONSUMERIZATION OF IT BYOD and Cloud-based File Storage Moderator: John Payne, Principal Consultant, Pueblo Technology Group, Inc. Speakers: Royce Holden, Director of Information Technology, Greater Asheville
Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune
Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune Enrollment and Management of Mobile Devices with Microsoft System Center Configuration
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
A guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
