Intelligent End User Compute Strategy. Ted Smith Nigel Brown



Similar documents
End-user Security Analytics Strengthens Protection with ArcSight

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Endpoint Threat Detection without the Pain

How To Protect A Virtual Desktop From Attack

Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session # Ana Mccollum Enterprise Management, Product Management

Citrix XenDesktop & XenApp

Concierge SIEM Reporting Overview

Altiris IT Management Suite 7.1 from Symantec

Trend Micro. Advanced Security Built for the Cloud

Complete Managed Services. Proposal for managed services for the City of Tontitown

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

IBM Endpoint Manager Product Introduction and Overview

Endpoint protection for physical and virtual desktops

McAfee Server Security

Desktop Virtualization Solutions Simplified Appliance

Remote control/problem resolution

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Unifying IT How Dell Is Using BMC

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Securing and Monitoring BYOD Networks using NetFlow

Remote Control/Problem Resolution

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Protecting the un-protectable Addressing Virtualisation Security Challenges

Endpoint protection for physical and virtual desktops

Virtual Desktop Infrastructure

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

LHRIC Network Support - Additional Service Features

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Extreme Networks Security Analytics G2 Vulnerability Manager

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Appendix D to DIR Contract No. DIR-SDD SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for <DIR CUSTOMER> END USER SERVICES

Modular Network Security. Tyler Carter, McAfee Network Security

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

IBM Endpoint Manager for Mobile Devices

2014 Teradici Corporation.

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

CV - Xavier Clinquart

The Modern Service Desk: How Advanced Integration, Process Automation, and ITIL Support Enable ITSM Solutions That Deliver Business Confidence

Cisco Advanced Malware Protection for Endpoints

IBM Security IBM Corporation IBM Corporation

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

The Time has come for A Single View of IT. Sridhar Iyengar March 2011

Symantec Endpoint Protection

Security Intelligence Services.

Cisco Advanced Malware Protection for Endpoints

HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES

Altiris IT Management Suite 7.1 from Symantec

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Kaseya IT Automation Framework

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

Customers award top satisfaction scores to IBM System x x86 servers. August 2014 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C.

Kaspersky Security for Mobile

Secure Cloud-Ready Data Centers Juniper Networks

Altiris Client Management Suite

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk

EnCase Endpoint Security Product Overview

SourceFireNext-Generation IPS

Continuous Monitoring for the New IT Landscape. July 14, 2014 (Revision 1)

The Incident Response Playbook for Android and ios

Maximizing Your Desktop and Application Virtualization Implementation

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

TrustDefender Mobile Technical Brief

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

SECURITY BEGINS AT THE ENDPOINT

Meet the BYOD, Computing Anywhere Challenge: Planning and License Management for Desktop Virtualization

Simplifying Desktop Mgmt With Novell ZENworks

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage

Security Analytics for Smart Grid

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

Symantec Endpoint Protection Datasheet

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

Compliance series Guide to meeting requirements of USGCB

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Advanced Threats: The New World Order

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Unlimited Server 24/7/365 Support

E-Guide. Sponsored By:

Transcription:

Intelligent End User Compute Strategy Ted Smith Nigel Brown

Introduction Microserve Technical Service Managed Services Professional Services BCNet provider of Desktops, notebooks, tablets, displays, print Largest EUC Partner in Western Canada Manage and provide technical services to 120,000+ systems (BC and AB) 300 employees 150 field technicians 2014 deployed 35,000 systems Dell, HP, Lenovo, Acer, Asus, Apple, and Microsoft Surface 2

Intelligent End User Compute Strategy Why are we here? You can t secure what you can t manage, you can t manage what you don t know about, and you can t resolve an issue if you have no visibility to it 3

Intelligent End User Compute Strategy Change our Approach and Strategy for End User Computing Results: 1. Lower costs Desktop and End User Support Technology 2. Improve Asset Optimization Smart Provisioning Hardware Licensing 3. Improve User Satisfaction and Productivity 4

Intelligent End User Compute Strategy What has changed in 15 years? Expecting a different out come? 5

Intelligent End User Compute Strategy Vast Majority of cost is labor and time 15 20% of cost is technology 6

Intelligent End User Compute Strategy What has changed in 15 years? Use of Devices has grown dramatically A computer on every desk and every home Bill Gates, Microsoft 1980 How about everyone will have 3,4,5 devices and use them anywhere, anytime. 2013-15 Device Shipments continue to grow 3.5% CAGR 7

Intelligent End User Compute Strategy Time for a New Approach Manage the User Experience not just the Technology 8

Microserve UX Unprecedented visibility Extensive actionable analytics Reduce Helpdesk Calls Reduce downtime and time to problem resolution Optimize hardware and software assets Improve Operations Enhance security Reduce costs 9

Microserve UX Managed User Experience Boss s Machine? unhappy users Time to upgrade 07/05/2015 10 10

Microserve UX Cost per Ticket Cost per Incident Cost per Service Request First Contact Resolution Time to Resolution Call Abandonment Rate A New KPI Calls Eliminated 11

Microserve UX 12

Microserve UX Customer use cases ID Application Crash across Enterprise Patch Management Issue ID systems crashing frequently Rationalized Licensed Applications 13

Broad Endpoint Support VDI Apple OS X ios Android 14

Security intelligence Cross Platform Security Multi platform support: Windows, VDI, OS X, ios (Citrix, Android and Linux in plan) Reduce attack surface area Remediation of BHO s Identification of application sprawl and proliferation Behavioral Analytics and risk scoring to identify zero day exploits and APTs Intrusion Forensic Analysis Improved incident response due to root cause analysis When did malware first enter the enterprise? What else changed at that time? What other systems were infected? Have network patterns changed? Did a policy violation cause the problem? 15

Security intelligence Malware & Suspicious Binary Detection Compliance Monitoring Discover malware in real time, unlike AV. Beyond black and white, malware/non malware and identify suspicious binaries to investigate Suspicion scores Low, Med, High Compare behaviors on your systems to other Ziften customer systems Enhanced Compliance capabilities Discover missing or outdated security applications (not just a/v) Determine if users are running unauthorized or unlicensed software zflow Alerting on Network Compliance (combines unique client Meta Data with NetFlow data to provide true end to end security visibility) What applications and processes were active at the time of an incident? Which users were active on a system? 16

Security intelligence Vulnerability Assessment Operations Provides real time alerts as well as comprehensive analytics of any system in the enterprise that is running a vulnerable application. Leverage Knowledge Cloud to report which systems are running vulnerable applications Alerts when vulnerable apps are detected postpatch management Enables enterprises to understand how devices and applications are performing and ensure end users get the most from their devices. You can t secure what you can t manage Our light weight agent has negligible overhead and network traffic end users will be more satisfied 17

Server Architecture & Knowledge Cloud 18

Flexible Deployment Options 19

Agent Performance Statistics Agent Sized Compressed 744 KB Agent Sized Installed 1.9 MB RAM Usage Ziften.exe: Working Set: ~14 MB; Private Bytes: ~6 MB Ziften.Proxy.exe: Working Set: ~2 MB Private Bytes: ~1 MB Local Persistent File Size 1MB Network Overhead/Protobuf Size ~500KB/day 20

Complement existing desktop management Ideal complement to tools such as SCCM Our solution provides unique and rich data extending beyond what SCCM can provide 21

Complement existing desktop management 22

Thank you for your time! Questions & Discussion 23