CONTENTS. Abstract... 2. Need for Desktop Management... 2. What should typical Desktop Management Software do?... 2. Securing Desktops...



Similar documents
ManageEngine Desktop Central Training

Desktop Central Managing Windows Computers in WAN

Desktop Central Managing Windows Computers in WAN

Information Technology Solutions

MSP Center Plus Features Checklist

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

RES ONE Automation 2015 Task Overview

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Service Catalog. it s Managed Plan Service Catalog

Introduction. PCI DSS Overview

How To Achieve Pca Compliance With Redhat Enterprise Linux

Managed Service Plans

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

White Paper. Managed IT Services as a Business Solution

Managed Services. Maximize your productivity!

Information Technology Services

Module BITadd (BIT Active Directory Design)

Vulnerability. Management

PCI Data Security Standards (DSS)

Maximizing Configuration Management IT Security Benefits with Puppet

Scalability in Log Management

This policy applies to all instances of LANDesk client software installed on Creighton-owned hardware that are connected to JAYNet.

CA IT Client Manager Asset Inventory and Discovery

Cloud Security Who do you trust?

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

THE BLUENOSE SECURITY FRAMEWORK

Proactive. Professional. IT Support and Remote Network Monitoring.

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

ManageEngine ServiceDesk Plus - MSP Training Agenda

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Service Level Agreement

Analyzing Logs For Security Information Event Management

E-SPIN's Planning, Deploying and Managing Microsoft System Center Configuration Manager (7 Day)

IT Security & Compliance. On Time. On Budget. On Demand.

Streamlining Patch Testing and Deployment

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

See all, manage all is the new mantra at the corporate workplace today.

System Management. What are my options for deploying System Management on remote computers?

SapphireIMS 4.0 Asset Management Feature Specification

Best Practices for Implementing Software Asset Management

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

LEARNING SOLUTIONS website milner.com/learning phone

Best Practices in Lifecycle Management: Comparing KACE, Altiris, LANDesk, and Microsoft SCCM

End-user Security Analytics Strengthens Protection with ArcSight

How IT Can Aid Sarbanes Oxley Compliance

Unifying IT How Dell Is Using BMC

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Evaluation guide. Evaluator s guide to getting the maximum benefit out of a GFI LanGuard trial

Symantec Virtual Machine Management 7.1 User Guide

xassets Hosted Services Microsoft SAM Assist Audits with xassets

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

ViaMonstra Configuration Manager 2012 Project plan and success criteria s

10 Hidden IT Risks That Might Threaten Your Law Firm

Installation Guide For Exchange Reporter Plus

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

Using WMI Scripts with BitDefender Client Security

Configuring and Managing Microsoft System Center Essentials 2010

Kaseya IT Automation Framework

3 Easy Steps to Get Started

Moving beyond Virtualization as you make your Cloud journey. David Angradi

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

BEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors

Patch Management Policy

MSP Service Matrix. Servers

How To Use An Inventory And License Management Tool In A Microsoft Inventory Program

AllianceIT Managed Services

Cloud Security Who do you trust?

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Nine Steps to Smart Security for Small Businesses

Bringing the Cloud into Focus. A Whitepaper by CMIT Solutions and Cadence Management Advisors

Implementing HIPAA Compliance with ScriptLogic

COURSE 20410C: INSTALLING AND CONFIGURING WINDOWS SERVER 2012

Implementing and Supporting Microsoft Windows XP Professional

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

Installing and Configuring Windows 7 Client

WhitePaper. Private Cloud Computing Essentials

Best Practices for Information Security and IT Governance. A Management Perspective

Transcription:

CONTENTS Abstract... 2 Need for Desktop Management... 2 What should typical Desktop Management Software do?... 2 Securing Desktops... 3 Standardization... 4 Troubleshooting... 4 Auditing IT Assets... 5 Assistance to Regulatory Compliance... 5 Automation... 6 How Enterprises Solve the Problem Today... 7 Small Enterprises... 7 Medium Enterprises... 7 Large Enterprises... 8 Solutions Available in the Market... 8 Software Based Solution... 9 Software as a Service (SaaS)... 9 Outsourcing to MSPs... 9 Conclusion...10 1

Abstract Enterprises that rely on computers for their businesses face numerous challenges in managing their desktops. This whitepaper targets the IT Administrators and IT Managers in discussing the importance of desktop management and how a desktop management solution should assist them in efficiently managing their desktops. The traditional way the enterprises approach these challenges today and the pros and cons of these approaches have also been dealt with. The options available for enterprises in solving these challenges are also discussed. Need for Desktop Management Today, computers have become an integral part of every business, be it manufacturing, retail, BPO, hospital, hotel and so on. This means, the business growth is completely dependent on how well the computers are managed. Desktop Management essentially involves keeping up-to-date details of the hardware and software assets, standardizing desktop and application settings, deploying software applications, patching the computers, troubleshooting, and more. Considering the increase in number of computers, their high dependency for the business activities, and the wide range of management activities, an automated desktop management solution is inevitable, which would otherwise cost high both in terms of money and administrators time. What should typical Desktop Management Software do? A typical desktop management solution should help enterprises with the following: Securing Desktops: Protect desktop from various security threats like vulnerability attacks, data thefts, etc. 2

Standardization: Having same version of OS and Applications across the network helps administrators to easily maintain and troubleshoot them. Troubleshooting: Help administrators to troubleshoot day-to-day problems in user computers. Auditing IT Assets: Effectively manage their software and hardware assets and enable auditing their IT assets. Assistance to Regulatory Compliance: Assist organizations in meeting regulatory compliance like HIPAA, SOX, etc. Automation: Automating regular Desktop Management Activities like Software Deployment, Disk Defragmentation, cleaning up the temp folder, etc. Let us look in more details on these requirements Securing Desktops New threats are discovered every day and keeping software up-to-date is one of the easiest ways to protect the desktops. While most of the external threats can be prevented by installing up-to-date patches of OS and applications, enterprises should also adopt necessary measures to protect sensitive data by enforcing strict security restrictions. Some of the important tasks in protecting the computers include: Keep the computers with up-to-date patches installed Update the Anti-Virus/Anti-Spyware programs to keep themselves protected from new virus/spyware Upgrade operating systems and software applications to the latest service pack Apply security restrictions by enforcing appropriate security policies. 3

Prevent data theft by disabling USB drives in servers and the likes. Monitor and repair automatically when the configurations are altered by the users. Standardization Standardization enables administrators easily troubleshoot and maintain desktops in their network. Typically, large organizations achieve standardization by taking a snapshot of the OS and applications and deploy them to all the desktops in the network. Some of the standardization tasks include: Imaging operating systems and applications and deploy to new systems Standardized configuration of all the windows applications across the network. Enforce standardized power schemes and settings to save power consumptions. Manage desktop settings and user profiles Troubleshooting Today, businesses are spread across the geographies to expand their reach and to increase their competitive advantage. This has resulted in having more mobile workforce and remote offices operating from different locations. Troubleshooting these desktops remotely is time consuming in the absence of a remote connection. Ability to establish a remote connection will help administrators to troubleshoot and fix the problems from a central location. 4

Auditing IT Assets Keeping track of assets and licenses is the key in managing desktops and to ensure compliance. Business needs force administrators to provide admin privileges to some users. This may bring in lot of unwanted, prohibited software installations in the enterprise network. Organizations should keep a check on all these software to avoid consequences that may arise later. In managing the assets, the administrators should be able to perform the following tasks: Keep up-to-date details of software and hardware assets. Keep track of the commercial software with their usage statistics that helps organizations ascertain the requirements and decide on license renewals. Manage the software licenses to ensure compliance Ability to prevent users from installing prohibited software in the network and automatically uninstall if any prohibited software is detected. Alert on specific events: when a new software/hardware is detected, underlicensed software is detected, prohibited software found in the network, etc. Ability to generate reports on the assets based on specific criteria for auditing. Assistance to Regulatory Compliance Most businesses deal with user or client data, which has to be well protected. In view of the public interest, government enforces certain regulations based on the business verticals. Enterprises need to comply with these regulations to achieve data privacy. 5

Some of the regulations gaining more attention include, Health Insurance Portability And Accountability (HIPPA), Sarbanes-Oxley (SOX), Payment Card Industry Data Security Standard (PCI DSS), and Gramm-Leach-Bliley Act (GLBA). The Desktop Management solution should assist organizations in complying with these regulatory bodies. It should allow enterprises to secure the data and provide reports on compliance. Automation Automating regular desktop activities is the key in increasing administrator productivity. The tool should allow automation at various levels ranging from simple configuration to complex software deployment and also provide execution status reports. Some of the common automation tasks include: Automated deployment for patches as and when the patches are made available Scheduled imaging of OS and deployment at periodic intervals Scheduled deployment for software applications to the users and computers Monitor and repair the configuration changes made by users to comply with company policies Schedule periodic hard disk maintenance like Disk Defrag, Check Disk, etc. Schedule shutdown of computers in an effort to save power consumption. Support running user-defined scripts in achieving any specific task. 6

How Enterprises Solve the Problem Today Let us see how enterprises meet these challenges currently. The categorization is based on the following: Small Enterprises Less than 100 employees Medium Enterprises Less than 500 employees Large Enterprises Greater than 500 employees Small Enterprises Small businesses may only not have a dedicated IT Support staff. IT support is done on ad hoc basis by general administration staff. Being generalist, the IT support may be done in non-standard way; will be a quick and dirty fix in most cases. This may not work in the long run and can lead to serious problems. No need for a dedicated team for desktop management No fixed cost for procuring and commissioning a solution Labor-intensive and Error-prone; may not scale when the organizations grow. Loss in business productivity in the event of problem Medium Enterprises Medium enterprises have a limited dedicated IT staff for handling their IT supports. Most medium businesses have point products or use other free tools in handing the 7

day-to-day requests. These tools are acquired as and when the need arises and hence they end up using several tools, each for a specific use. Lower cost involved in procuring point products. No integration between the tools use different tool for different activity Loss in employee productivity Large Enterprises Large Enterprises will have a dedicated team handling all the desktop management activities and preferably have a complete desktop management solution from one among the big 4, like Altiris, LANDesk, etc. A single integrated solution for all their needs. Need a dedicated hardware for commissioning the solution Cost of the software and on maintenance is very high. Solutions Available in the Market Primarily, there are three alternatives available for enterprises to meet the desktop management challenges: Software based solution Software as a Service (SaaS) Outsourcing to MSPs 8

Software Based Solution Businesses can procure and deploy software in their network for managing their desktops. Best Suited For: Medium & Large Enterprises 1. Cost-effective 1. Initial investment required to procure and commission the software 2. Software Maintenance required like upgrade and backup Software as a Service (SaaS) This is an emerging model, where a service provider will host the application and licenses it to customers for using it on demand. Best Suited For: Small & Medium Enterprises 1. No initial investment is required 2. Software maintenance is taken care by the software provider 1. Need internet connectivity with sufficient bandwidth 2. Recurring cost every year Outsourcing to MSPs There is yet another model wherein the businesses can completely outsource the desktop management activities to a Managed Service Provider (MSP). Best Suited For: Small enterprises 1. No dedicated IT Staff is required 2. No initial investment 3. No software maintenance 9

1. Need internet connectivity with sufficient bandwidth 2. Recurring cost every year Conclusion Desktop Management is important for businesses of all sizes. With the increasing number of desktops it is impossible for companies to manage them manually. In the current economic times, no organization can afford to lose anything, be it data, money, or productivity. And at the same time they cannot also spend too high to manage their desktops. They need to find a mid-way between the two where they can be spending less in meeting their Desktop Management challenges. Companies must analyze the available alternatives and choose the best option that suits them. About ManageEngine Desktop Central Desktop Central is complete Windows desktop management software that provides Software Deployment, Patch Management, Asset Management, Remote Desktop Sharing, Service Pack Deployment, Configurations, Active Directory Reports, User Logon Reports and Windows System Tools. With its network-neutral architecture, the administrator can easily manage any windows networks like Active Directory, Workgroup, or other directory services. It automates regular desktop management activities like installing software, patches, and service packs, standardize the desktops by applying uniform configurations such as wallpapers, shortcuts, printer, etc., secures the desktops by restricting USB, applying security policies, etc., and enables auditing with complete hardware/software inventories, license compliance details, detecting prohibited software usage, etc. For more details of Desktop Central, visit http://www.desktopcentral.com/. ZOHO Corp. 4900, Hopyard Rd., Suite 310, Pleasanton, CA 94588, USA. Phone: +1-925-924-9500 http://www.desktopcentral.com Fax : +1-925-924-9600 2009 ZOHO Corp. All Rights Reserved. For queries on product: desktopcentral-support@manageengine.com 10