Intelligent End User Compute Strategy Ted Smith Nigel Brown
Introduction Microserve Technical Service Managed Services Professional Services BCNet provider of Desktops, notebooks, tablets, displays, print Largest EUC Partner in Western Canada Manage and provide technical services to 120,000+ systems (BC and AB) 300 employees 150 field technicians 2014 deployed 35,000 systems Dell, HP, Lenovo, Acer, Asus, Apple, and Microsoft Surface 2
Intelligent End User Compute Strategy Why are we here? You can t secure what you can t manage, you can t manage what you don t know about, and you can t resolve an issue if you have no visibility to it 3
Intelligent End User Compute Strategy Change our Approach and Strategy for End User Computing Results: 1. Lower costs Desktop and End User Support Technology 2. Improve Asset Optimization Smart Provisioning Hardware Licensing 3. Improve User Satisfaction and Productivity 4
Intelligent End User Compute Strategy What has changed in 15 years? Expecting a different out come? 5
Intelligent End User Compute Strategy Vast Majority of cost is labor and time 15 20% of cost is technology 6
Intelligent End User Compute Strategy What has changed in 15 years? Use of Devices has grown dramatically A computer on every desk and every home Bill Gates, Microsoft 1980 How about everyone will have 3,4,5 devices and use them anywhere, anytime. 2013-15 Device Shipments continue to grow 3.5% CAGR 7
Intelligent End User Compute Strategy Time for a New Approach Manage the User Experience not just the Technology 8
Microserve UX Unprecedented visibility Extensive actionable analytics Reduce Helpdesk Calls Reduce downtime and time to problem resolution Optimize hardware and software assets Improve Operations Enhance security Reduce costs 9
Microserve UX Managed User Experience Boss s Machine? unhappy users Time to upgrade 07/05/2015 10 10
Microserve UX Cost per Ticket Cost per Incident Cost per Service Request First Contact Resolution Time to Resolution Call Abandonment Rate A New KPI Calls Eliminated 11
Microserve UX 12
Microserve UX Customer use cases ID Application Crash across Enterprise Patch Management Issue ID systems crashing frequently Rationalized Licensed Applications 13
Broad Endpoint Support VDI Apple OS X ios Android 14
Security intelligence Cross Platform Security Multi platform support: Windows, VDI, OS X, ios (Citrix, Android and Linux in plan) Reduce attack surface area Remediation of BHO s Identification of application sprawl and proliferation Behavioral Analytics and risk scoring to identify zero day exploits and APTs Intrusion Forensic Analysis Improved incident response due to root cause analysis When did malware first enter the enterprise? What else changed at that time? What other systems were infected? Have network patterns changed? Did a policy violation cause the problem? 15
Security intelligence Malware & Suspicious Binary Detection Compliance Monitoring Discover malware in real time, unlike AV. Beyond black and white, malware/non malware and identify suspicious binaries to investigate Suspicion scores Low, Med, High Compare behaviors on your systems to other Ziften customer systems Enhanced Compliance capabilities Discover missing or outdated security applications (not just a/v) Determine if users are running unauthorized or unlicensed software zflow Alerting on Network Compliance (combines unique client Meta Data with NetFlow data to provide true end to end security visibility) What applications and processes were active at the time of an incident? Which users were active on a system? 16
Security intelligence Vulnerability Assessment Operations Provides real time alerts as well as comprehensive analytics of any system in the enterprise that is running a vulnerable application. Leverage Knowledge Cloud to report which systems are running vulnerable applications Alerts when vulnerable apps are detected postpatch management Enables enterprises to understand how devices and applications are performing and ensure end users get the most from their devices. You can t secure what you can t manage Our light weight agent has negligible overhead and network traffic end users will be more satisfied 17
Server Architecture & Knowledge Cloud 18
Flexible Deployment Options 19
Agent Performance Statistics Agent Sized Compressed 744 KB Agent Sized Installed 1.9 MB RAM Usage Ziften.exe: Working Set: ~14 MB; Private Bytes: ~6 MB Ziften.Proxy.exe: Working Set: ~2 MB Private Bytes: ~1 MB Local Persistent File Size 1MB Network Overhead/Protobuf Size ~500KB/day 20
Complement existing desktop management Ideal complement to tools such as SCCM Our solution provides unique and rich data extending beyond what SCCM can provide 21
Complement existing desktop management 22
Thank you for your time! Questions & Discussion 23