Solutions to Trust. NEXThink V5 What is New?



Similar documents
End-user Security Analytics Strengthens Protection with ArcSight

Vulnerability Management

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

EMC Data Protection Advisor 6.0

MRV EMPOWERS THE OPTICAL EDGE.

How To Choose A Business Intelligence Toolkit

CLOUD MANAGED SERVICES FRAMEWORK E-BOOK

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Expanding Uniformance. Driving Digital Intelligence through Unified Data, Analytics, and Visualization

WALKME WHITEPAPER. WalkMe Architecture

Total Enterprise Mobility. Norbert Elek

What is Security Intelligence?

Security Analytics The Beginning of the End(Point)

WatchGuard SSL 2.0 New Features

MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

Xerox SMart esolutions. Security White Paper

Summit Platform. IT and Business Challenges. SUMMUS IT Management Solutions. IT Service Management (ITSM) Datasheet. Key Benefits

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Header 1. John T. Irwin Software Consulting Manager EMEA Managing End User Experience

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

McAfee Server Security

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

Self-Service Business Intelligence

Bitdefender GravityZone Sales Presentation

Violin Symphony Abstract

Unified Security, ATP and more

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Cisco Performance Visibility Manager 1.0.1

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Kaseya Server Instal ation User Guide June 6, 2008

Q1 Labs Corporate Overview

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Network Configuration Settings

MSP End User. Version 3.0. Technical Solution Guide

IBM QRadar Security Intelligence April 2013

Cisco NetFlow Generation Appliance (NGA) 3140

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Systems Manager Cloud Based Mobile Device Management

Wonderware Intelligence

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Acano Manager. Acano Manager is a single point of management for enterprise and Service Provider collaboration infrastructure.

IT Operations Management. Intelligent. Integrated. Innovative.

Information Technology Policy

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Microsoft Windows Intune: Cloud-based solution

Metrics that Matter Security Risk Analytics

ALCATEL-LUCENT VITALSUITE Application & Network Performance Management Software

MassTransit vs. FTP Comparison

plixer Scrutinizer Competitor Worksheet Visualization of Network Health Unauthorized application deployments Detect DNS communication tunnels

Web Traffic Capture Butler Street, Suite 200 Pittsburgh, PA (412)

HP PCM Plus v4 Network Management Software Series

Server & Application Monitor

Enterprise Energy Management with JouleX and Cisco EnergyWise

See What's Coming in Oracle Service Cloud

Get Started Guide - PC Tools Internet Security

InTouch Access Anywhere

The Remote Infrastructure Management Platform

Secure Remote Support

Optimizing your IT infrastructure IBM Corporation

Application Performance Monitoring (APM) Technical Whitepaper

E-Guide. Sponsored By:

Elevating Data Center Performance Management

Managed Services. Business Intelligence Solutions

SaaS-Based Employee Benefits Enrollment System

MRV EMPOWERS THE OPTICAL EDGE.

Endpoint Management and Mobility Solutions from Symantec. Adapting traditional IT operations for new end-user environments

Tolling Systems Security. Ken Philmus Xerox Transportation Services

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

INSTANT MESSAGING SECURITY

Cisco Enterprise Mobility Services Platform

Using Application Insights to Monitor your Applications

Qlik Sense Enabling the New Enterprise

Aternity for End User Experience Monitoring Any Application, Any Device, Any User. June 26 th, 2013

Cloud Computing for SCADA

ANS Monitoring as a Service. Customer requirements

Agio Remote Monitoring and Management

Private Networks

PI Cloud Connect Overview

The Homebuilder Intelligence Suite

USER GUIDE: MaaS360 Services

SAP IT Infrastructure Management. Dirk Smit ALM Engagement Manager SAP Africa

Access Your Cisco Smart Storage Remotely Via WebDAV

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Big Data overview. Livio Ventura. SICS Software week, Sept Cloud and Big Data Day

ElegantJ BI. White Paper. The Enterprise Option Reporting Tools vs. Business Intelligence

Network Management Deployment Guide

HP Business Service Management 9.2 and

Integrated Asset Tracking Solutions

Secure Your Mobile Workplace

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Common Situations. Departments choosing best in class solutions for their specific needs. Lack of coordinated BI strategy across the enterprise

IBM Tivoli Composite Application Manager for WebSphere

Transcription:

Solutions to Trust NEXThink V5 What is New? HIGHLIGHTS What is New? ITSM: IT services analytics in real-time Analytics and product usability Security Analytics for all web & cloud applications Product manageability Nexthink is the innovator of End-user IT Analytics for security, ITSM and workplace transformation. Nexthink maps all the IT services, how they are being consumed, and how the IT infrastructure is operating, from the only perspective that matters most, the end-users (workers). Nexthink provides essential visibility and insight into IT operations and security for IT Governance. What makes Nexthink unique is the real-time analytics of all executions and all network connections and the corresponding real-time visualization that provides new visibility and insight into what it means, in real terms, at that particular moment in time. Nexthink s modular architecture supports customers with 250,000 end-user (worker) endpoints. Learn how to get on top of the big data challenge posed by today s end-user (worker) computing infrastructure.

In brief: Nexthink V5 raises the bar to new heights! V5 introduces a new modular product architecture and four modules. Web & Cloud module is a new module. Learn how to map all intranet and extranet activities to applications and analyze their impact. Actionable dashboard that seamlessly integrates real-time and historical data into a single view even for large environments. Security module adds application binary and website tagging and categorization tomore easily identify potential security threats in real-time. Data Privacy Nexthink protects user's privacy and provides new features to anonymize analytics data and restrict access for specific roles. Improve Incident & Problem Mgmt through IT analytics. Reduce incidents by 35%, solve problems 60% faster and move to a proactive model. VDI Transformation module provides a framework and methodology to better plan, execute and measure the impact of all your transformation projects. Integration Toolkit module is used to integrate Nexthink with other systems and processes. Integrate Nexthink to improve processes and maximize the ROI. ITSM: IT services analytics in real-time The concept of services in V5 has been rewritten from scratch, drastically improving metric accuracy, delivering better cause analysis, and breaking previous scalability limitations: Real-time overview of all service metrics User friendly visualization with location-based drill-down to analyze issues Improved cause analysis of issues between network, applications, or devices Location-based grouping of devices for improved service cartography New smart analysis of service-related issues to automatically identify: Connectivity issues with a close-tozero false-positives ratio Network performance issues from self-learned baselines by location Abnormal application crash rates Improved services metrics are computed in real-time by Nexthink Engines. Data is aggregated every 10 minutes in Nexthink Portal to provide a real-time interface. Enhanced Portal Service widget is designed to show the status of multiple services in one dashboard, running in real-time and including more metrics.

New service alerts are computed at the Portal level by hierarchy and aggregated over all Engines. Alerts can be configured based on roles; for instance, a local IT manager can be alerted if a user can t use Microsoft Office, while a CIO would be alerted only when a whole country is experiencing issues. Main benefits: Real-time visibility, showing the status and causes of issues with critical IT services for all business users in a single, cross-engine, dashboard. Be alerted of service issues with the appropriate level of detail based on role in the organization. Analyze service issues quickly: detect where the problem is located, who is affected, and whether the issue is caused at the applications, network, or devices level. Analytics and product usability Smart search and improved user experience in Nexthink Finder A smart search for the Finder. The search algorithm understands the semantic of the search string and proposes results based on that. For instance, the user can type computers firefox ; Nexthink will provide (among others) the following results: Devices where Firefox is installed Devices executing Firefox Devices with network issues of Firefox Devices where Firefox crashes A brand new login screen allows quicker access to the Finder. Collapsible accordion and restructured interface to maximize available space, showing on-screen what really matters.

Security Broader and smarter security metrics Endpoint security information is retrieved in a completely new way, applying new techniques to extend vendor and product coverage to those most commonly available on the market: Visibility of antivirus products installed on a device. For each one we provide the display name, real-time protection (RTP) status, and update status. Visibility of firewall products installed on a device. For each one we provide the display name and RTP status Visibility of antispyware products installed on a device. For each one we provide the display name, RTP status, and update status. Main benefits: Visibility for all installed antivirus, firewall, and antispyware, versus a select limited number of vendors and specific products. Ability to know if the endpoint is configured properly Has Windows Firewall been replaced by Symantec? Has Windows Defender been replaced by Bitdefender? Analytics for all web & cloud applications V5 introduces un-matched visibility for web & cloud applications. All HTTP and HTTPS requests made by any application (not only browsers) are monitored by the new Nexthink Collector V5. For each request it computes metrics such as: the incoming and outgoing traffic volume the network response time the web request duration the protocol used HTTP requests: visibility on status code including errors (2xx, 3xx, 4xx, and 5xx) Nexthink V5 brings a new Web & Cloud applications cartography in the Finder. All V5 service extensions are available for web applications, internal or cloud. In addition, extensive privacy configuration options are available to discard specific data or make it available only to specific roles. Tagging of cloud applications and web domains with key information, including: Threat level obtained by aggregating several threat providers Hosting country 20 app categories (business, IT, security threat, )

Main Benefits: Real-time web and cloud applications discovery, with zero configuration: All internal web applications accessed through browsers or rich clients All external web domains and cloud applications accessed through browsers Machines acting as web proxies Web activity of any application ITSM: Usage patterns of web-based business applications Identification of problems due to web application access with unsupported browsers or system configurations Real-time monitoring of web applications, including metrics regarding performance and errors Security: Automatic detection of obsolete encryption standards Access to web applications by unauthorized users Large downloads/uploads of data Access to insecure web domains Applications accessing unwanted web content or sending data to untrusted web domains Product manageability Scalable and simplified license management Whether your organization has 1,000 or 250,000 devices, with Nexthink V5 only one activation key/file is needed, no matter how many Engines you have. You can activate the product in five clicks and assign license slots for devices to all Engines with a single, centralized interface. Engine boosted to support up to 10,000 devices Nexthink Engine is now deployed as a 64-bit server increasing the number of devices supported per Engine up to 10,000. With Web & Cloud, for instance, an Engine can support up to 8,000 devices (depending on the privacy settings).