Unified Endpoint Management & Security C/Mac /Mobile Devices CenterBeam specializes in endpoint management and security an essential IT responsibility, but one that doesn t add value to your core business so you gain highly specialized expertise without investing in the time and training to achieve this skillset in house. CenterBeam frees our internal IT staff from day-today issues, enabling them instead to focus on strategic business projects. - Gregory J. Lozinak, EV & COO, Waterton Residential All CenterBeam services are based on industry best practices, and we have ITIL certified personnel on staff. Additionally, we take on the R&D portion of endpoint management, researching new technologies and platforms. Business Benefits Cost certainty (scale up/down to meet your business needs) Always current capabilities (ability to add new users, support diverse/new operating systems, leverage best-in-breed tools) Enhance security posture 24x7 monitoring, incident management & remediation Asset tracking & reporting via an online dashboard Around the clock access to subject matter experts for your staff erformance optimization (keep all endpoints working at optimal speed) Easily distribute software applications Options Datarotection (streaming offsite backup and recovery) DataDefense (disk encryption and remote wipe capability) Mobile Device Management - unified platform for managing a diverse fleet of mobile devices End User Helpdesk 24x7 support for your employees Unified Endpoint Management Core Components CenterBeam s Unified Endpoint Management and Security services combine a robust, reliable IT infrastructure, proactive management capabilities and automated processes, all working seamlessly in the background to protect all endpoints that access your network. Endpoint Security (C/Mac) Your Cs/Macs are under constant attack from the Internet and the threats are coming faster and increasingly automated and more distributed. For an internal IT team, it s on ongoing battle to keep up, and this likely isn t what you want your team spending their time on. Instead, you can leverage CenterBeam experience and tools to secure Cs/Macs in your environment. CenterBeam Corerotection Suite (CS), made up of best in breed technologies, CenterBeam CS is a combination of the TrendMicro antivirus and malware platform managed through IBM s Tivoli Endpoint Manager built on BigFix technology. helps ensure your Cs/Macs are kept current with virus and spyware definition updates and critical security patches. The result is faster, smarter endpoint protection. CenterBeam delivers a unified endpoint management and security solution that enables your team to view the health of all managed endpoints on your network from a single pane of glass. As threats emerge, CenterBeam CS enables rapid remediation, protection and reporting on endpoints in real-time. By automating time-intensive tasks across complex networks, you can control costs while reducing risk and supporting your compliance requirements. CenterBeam CS can be deployed in days for any network size or configuration, providing a very rapid return on investment. Anti-Malware (Anti-Virus/Spyware) rotection Workstations are kept current with the latest anti-malware definitions through weekly proactive updates and immediate critical updates. revent damage from viruses, trojans, worms and other new malware variants, including blended threats. Identify and completely remove discovered spyware, including hidden rootkits (a collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network, mask the fact that the system is compromised, and much more).
2 FIG 1. Example of what a user sees when a site is blocked. Web Reputation has identified this site as dangerous. Web Reputation CenterBeam CS proactively protects against web-based malware, data theft, lost productivity, and reputation damage. Web Reputation secures clients, on and off the network, by blocking endpoints from accessing malicious web pages or downloading malware. Security distinctions for websites include: Safe: The latest tests indicate this URL contains no malicious software and shows no signs of fraud. Suspicious: This URL has been compromised before, or has some association with spam email messages. Dangerous: The latest tests indicate this URL contains malicious software or could defraud visitors. Untested atch Management CenterBeam s privileged relationship with Microsoft allows us priority access to critical patches and updates, new BigFix is used to manage patch distribution to all CenterBeam managed systems. software and Microsoft support. Critical Microsoft patches and periodic software upgrades are tested and automatically distributed to your user community with no disruption to your service. We do not release any patch until it has passed our Quality Assurance testing. Most critical patches are fully tested and released within 48 hours. CenterBeam deploys critical security patches as identified by Microsoft Technet. Event Notification - Notify Only If there are any incidents, CenterBeam s Incident Response Team will notify you of the situation. CenterBeam Self-Healing A set of automated tasks and policies that identify and remediate failed components of CenterBeam s Core rotection Suite. For example if anti-virus services are stopped, CenterBeam Self-Healing will restart them. If for any reason the automated actions fail, CenterBeam engineering teams are notified to take corrective action. Asset Tracking System hardware and OS versions are dynamically inventoried nightly for all managed systems. You have 24x7 access and visibility to this information via CenterBeam s online dashboard from anywhere, anytime. This system information about CU, installed RAM, HDD size, installed OS and S level, etc. is available at your fingertips to make decisions relative to hardware procurement and replacement. Incident Management & Remediation CenterBeam is constantly monitoring the health of your endpoints to ensure optimum performance. CenterBeam engineers are notified of any issues and alert your internal IT staff. Whenever CenterBeam can act to engineer issues out of the environment on the backend, we take the initiative to do so. In the event that option does not exist, recommendations are issued based on the results of troubleshooting and analysis by CenterBeam s highly certified staff. Software Distribution CenterBeam has the ability to deploy custom software to your endpoints using configuration management software. Software deployment packages are developed, tested and distributed throughout your environment regardless of the physical location of those endpoints. Automated Hard Drive Defragmentation (Cs) As part of CenterBeam s Endpoint Management and Security for Cs, CenterBeam disk CenterBeam leverages Diskeeper 2012 rofessional to increase system performance and improve system boot times. defragmentation keeps Cs running like new, extending their useful life. Most C users have experienced the frustration of a Microsoft Windows machine becoming progressively slower over time, especially as more software is installed on the machine. CenterBeam eliminates this experience by preventing files from fragmenting at the Windows level. Continuous Configuration Management Ongoing assurance that security levels are maintained and workstations are stable and optimized through use of our
3 proprietary CenterBeam Continuous Configuration (C3) tool, which automatically makes adjustments should critical aspects of a user s system fall out of compliance with standards. 24x7 Staffed Helpdesk Live IT level support is available for your internal IT team around the clock as part of the service. Optionally, CenterBeam offers 24x7 end user support to keep your users productive while minimizing distractions from your team s strategic initiatives. Visibility & Control CenterBeam s service provides you visibility into the state of your managed endpoints through an online dashboard. This way, you can know the health of all your endpoints, at anytime, from anywhere. Reporting You ll have access to a variety of reports for all your services from a single pane of glass no need to login to multiple dashboards. CenterBeam has the ability to develop specialized ad-hoc or custom scheduled reports. The development of reports are done at an hourly billing rate. However, once the report has been created, the regular running and delivery will be provided to your organization at no additional fee. In addition, CenterBeam Core rotection Suite (CS) collects information relative to installed applications, not just hardware, allowing CenterBeam to assist in the area of software reporting, better managing software deployments and upgrades, etc. Supported latforms Windows, Windows Vista, Windows 7, MAC OS 10.4, MAC OS 10.5, MAC OS 10.6 and MAC OS 10.7. Endpoint Offerings for C/Mac SaaS Anti-Malware rotection SaaS atch Management SaaS CenterBeam Self-Healing Tools SaaS Asset Tracking (Dashboard) Event Notification (Notify Only) Event Management (Receive, Log, Classify & Track) Incident Management & Remediation SaaS Software Distribution SaaS Automated Hard Drive Defragmentation CenterBeam Continuous Configuration (C3) 24x7 Staffed Monitoring as a Service (MaaS) 24x7 Staffed Helpdesk w/case Tracking & Reporting) SOC 2 (AT-101) Certified CenterBeam s controls on security procedures, policies and best practices are certified annually by independent third party auditors. CenterBeam s controls are based on the COSO framework, which is the same control framework SO compliance is based on. This enables easy integration into your existing audit procedures. CenterBeam employs Service Organization Control (SOC) 2,which reports on controls at a serviceorganization relevant to security, availability, processing integrity,confidentiality or privacy (commonly known as trust principles). SOC 2 certification requires selection of at least two trust principles, and CenterBeam has selected the criteria for Security and Availability as the guidance for our SOC 2 audit, as published in TS Section 100. Security + Management Data rotection (Streaming Offsite Backup & Recovery) * * Data Defense (Data Encryption & Destruction - C only) * * Web Content Filtering * * * Optional Security SOC 2 reports are performed using the AICA Guide: Reporting on Controls at a Service Organizations Relevant to Security and Availability and are intended for use by stakeholders (customers, regulators, business partners, suppliers, directors) of the service organization that have a thorough understanding of the service organization and its internal controls. SOC 2 reports provide key information to stakeholders: Oversight of the organization Vendor management program Internal corporate governance and risk management processes Regulatory oversight
4 Similar to SOC 1 (SSAE-16), there are two types of reports: Type 2 is report on management s description of a service organization s system and the suitability of the design and operating effectiveness of controls; and Type 1 is report on management s description of a service organization s system and the suitability of the design of controls. (These reports may be restricted in use). Optional Services Data rotection (Optional) Streaming Off-site Backup & Recovery Cs and Macs on CenterBeam s Data rotection service are backed up daily utilizing the Connected Backup Solution, gaining the ability to quickly restore either individual files or entire systems. Individual files can be restored in minutes, while an entire system can usually be restored within 24 hours. You can choose to backup as many or as few C/Macs as you need. CenterBeam Data rotection provides the highest levels of security available. All data is encrypted at the desktop using government-level 128-bit, Advanced Encryption Standard (AES). Enterprise data remains encrypted both during transmission and storage. CenterBeam Data rotection provides these solutions: Backup: Scheduled and automatic disk to disk backup is transparent to users and fast, even over dial up connections Recovery: Users can recover lost files quickly and easily, whenever and wherever needed MyRoam: Web-based access portal lets users access their backed up data anywhere without IT support intervention DataDefense (Optional for Cs) Data Encryption & Destruction CenterBeam s DataDefense, powered by Beachhead Solutions, is an innovative approach to data encryption that provides compliance without impacting the productivity of employees. DataDefense enables organizations to enforce encryption of sensitive data on their inventory of Cs quickly, easily, and without significant IT burden or user impact. It also provides the capability to destroy data (permanently or recoverably) remotely if an unauthorized individual gains access to that data. Because DataDefense is delivered and managed through secure internet communications (via the cloud), compliance can be achieved in literally one day. There is no need to locally install encryption on each C and there is no investment or support necessary for IT hardware/software infrastructure. In addition, users have no involvement in the operation of the tool, so they continue to operate their computers in exactly the same manner. You can choose to protect as many or as few Cs as you need. CenterBeam s DataDefense provides your organization with robust security features including: C use and data monitoring, roactive enforcement of your C security policy, Ability to remotely change security policy, and An automatic response when threats to data security are detected Mobile Device Management (Optional) CenterBeam s Mobile Device Management (MDM) is a unified platform for managing a diverse fleet of mobile devices and tablets together with traditional endpoints. Until recently, IT typically issued and supported one mobile device platform. But now, workers increasingly expect to be treated as a consumer, with the ability to choose how they access the company network based on their smartphone and tablet preference. With this bring your own device (BYOD) revolution, it is more important than ever to integrate device management into your enterprise management structure. Taking a holistic approach and managing mobile devices alongside your servers, desktops and laptops ensures consistent application of your corporate security policies across all endpoints that access your network. By leveraging a single Mobile Device Management (MDM) platform, your IT team gains the ability to support a diverse fleet of devices and easily implement a BYOD strategy. MDM Functionality The MDM service allows a company s Authorized Technical Contact (ATC) to manage all phones and tablets that access the corporate network and consistently apply corporate security policies to mobile devices whether they are employee owned or corporate issued.
5 The MDM service uses the same platform and infrastructure CenterBeam utilizes to manage desktops, laptops, and servers as part of its Unified Endpoint Management service delivering a single-pane-of-glass view to easily manage a fleet of endpoints without the need to deploy multiple, separate systems. olicy & Security Management: Manage password policies, device encryption, jailbreak and root detection Management Actions: Selective wipe, full wipe, deny email access, remote lock Application Management: Application inventory, recommended app deployment, app categorization Enterprise Access Management: Manage access to enterprise resources including email, VN, and Wi-Fi Location Services: Optionally track device locations for corporate devices Supported Mobile latforms Devices can be managed using agent functionality on the device that give a wide-range of management and security functionality. For Android/Windows Mobile, the agent is a BigFix Agent variant. For Apple ios, management is done using Apple s MDM AIs that are natively supported by Apple. Supported devices include: Apple ios 4.1+,5.1+ (includes ihone, iad, and iod Touch) NOTE: Apple ios 4.0 and ios 5.0 are not supported due to known syncing issues with these two versions. Android (ARM) versions 2.2, 2.3.x, 3.x, 4.x (includes phones and tablets) Windows Mobile 5.x, 6.x NOTE: Not all functionality available on all platforms. BlackBerry users are supported on a separate service, CenterBeam Hosted BlackBerry Service. 24x7 Helpdesk for your users (Optional) Offloading the day to day end user helpdesk issues to CenterBeam allows your internal IT more time to focus on business driving applications and projects. CenterBeam s Customer Care team is available around the clock, 365 days a year, to address any support issues your users may experience. Our primary goal is to get your users up and productive as soon as possible. CenterBeam s customer care personnel are highly trained desktop engineers who would generally be considered Level 2 support agents. This means the very first person you talk to will likely be able to resolve your issue. And if not, Customer Care can engage a CenterBeam subject matter expert or escalate to the defined resource within your organization. With CenterBeam as your helpdesk, you can expect: 24x7 support, 365 days a year Calls answered by desktop engineers, not a dispatch service Improved fix time through remote diagnosis and repair Mixed environment support (C, Mac, mobile devices) How to support for Microsoft applications A fixed monthly rate, regardless of call volume Access to subject matter experts North American-based support team 3rd party end user satisfaction measurement CenterBeam s Level 2 support is performed by Customer Care team leads, and Level 3 support is supplied by our engineering team, who have senior-level expertise in every aspect of an IT environment, including: Active Directory, e-mail, C & Mac technology, server technology, computer backups and recovery, server backups and recovery, security and networks. Helpdesk certification levels include: Microsoft Certified Trainer (MCT) Microsoft Certified Desktop Support Technician (MCDST) Microsoft Certified IT rofessional (MCIT) Enterprise Support Technician (Vista) Microsoft Certified rofessional (MC, MC +I) Microsoft Certified Systems Administrator (MCSA) Microsoft Certified Systems Engineer (MCSE, MCSE +I) Cisco Certified Security rofessional (CCS) Apple Certified Support rofessional 10.6
6 CenterBeam Service ortfolio Contact Us CenterBeam can help you define your business priorities and align technology to meet your requirements. For over 13 years, CenterBeam has been simplifying IT for our customers so they don t lose any cycles on day to day IT operations. CenterBeam offers a broad service portfolio with single vendor accountability to boost your IT performance and security. We re here to fill any IT gaps and deliver a consistent, integrated service no matter where the bits and pieces of your infrastructure reside in the cloud, on-premise or in a combination hybrid model. With CenterBeam, you can expect an IT partner that will remain engaged throughout the service lifecycle to make sure you are implemented correctly, your users are productive, and help you with any changes you need along the way. To learn more, call 1-855-665-9136 or www.earthlinkbusiness.com/itservices/endpoint-management-security/ 2012 CenterBeam, Inc. CenterBeam and the CenterBeam logo are registered trademarks of CenterBeam, Inc. All other brand names are the property of their respective owners. Microsoft and Active Directory are registered trademarks of Microsoft Corporation in the United States and/or other countries. H and OpenView are registered trademarks of Hewlett-ackard Co. IBM and BigFix are registered trademarks of International Business Machines Corporation. Iron Mountain, Digital Iron Mountain and LiveVault are either registered trademarks or trademarks of Iron Mountain Inc. Dell is a trademark of Dell Inc. Trend Micro is a registered trademark of Trend Micro Corporation. SolarWinds and Orion are registered trademarks of SolarWinds. B/E/1212 www.centerbeam.com