FUJITSU Software Systemwalker Desktop Patrol V15 Introducing July 2015 Fujitsu Limited



Similar documents
Introducing FUJITSU Software Systemwalker Centric Manager V15.1.1

Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED

Cisco WAAS Optimized for Citrix XenDesktop

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

JP1 Version 11: Example Configurations

Device Lifecycle Management

SapphireIMS 4.0 Asset Management Feature Specification

Introducing FUJITSU Software Systemwalker Operation Manager V13.8.0

Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses

[BRING YOUR OWN DEVICE POLICY]

SUMMIT ASSET MANAGEMENT DATASHEET

Desktop Management. IT Compliance. Job Management Partner 1 Product & Supported Platform

Datasheet Fujitsu Cloud Infrastructure Management Software V1

Administrator's Guide

IBM Endpoint Manager for Mobile Devices

Microsoft Client Licensing in Virtual Desktop Environments

Reducing the cost and complexity of endpoint management

Enterprise solution comparison chart

Managing and Securing the Mobile Device Invasion IBM Corporation

IBM Endpoint Manager for Core Protection

Kaspersky Security for Mobile

NETWRIX IDENTITY MANAGEMENT SUITE

2X SecureRemoteDesktop. Version 1.1

Managed Service Plans

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

What are the benefits of Cloud Computing for Small Business?

How To Write A Mobile Device Policy

Remote Desktop Solution, (RDS), replacing CITRIX Home Access

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

IBM Tivoli Endpoint Manager for Lifecycle Management

Complete Patch Management

Compatibility Matrix BES12. September 16, 2015

IBM Tivoli Endpoint Manager for Lifecycle Management

Hi! I m Andy and I m a school ICT technician. We ve been using NetSupport School here for a while now and I want to tell you how it works for us...

Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15

How To Manage A System Vulnerability Management Program

Symantec Mobile Management 7.1

Symantec Mobile Management Suite

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

Module 12. Configuring and Managing Storage Technologies. Contents:

Sizing and Deployment of the SAP Business One Cloud Landscape. SAP Business One Cloud Landscape Workshop

Job Management Partner 1/IT Desktop Management 2 - Asset Console Description

Cloud Managed Printing

SOFTWARE ASSET MANAGEMENT

ManageEngine Desktop Central Training

A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools

Server based computing An introduction to server based computing, its advantages and how it works.

Matrix42. License Compliance of Virtual Workplaces

Cisco Mobile Collaboration Management Service

Best Practices for Enterprise Mobile Printing

BT Lancashire Services

ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT. uniflow canon.com.au/business

Why Digital Certificates Are Essential for Managing Mobile Devices

An Overview of the SAP Business One Cloud Landscape. SAP Business One Cloud Landscape Workshop

IBM United States Software Announcement , dated February 3, 2015

DATA PROJECTOR XJ-A147/XJ-A247/XJ-A257 XJ-M146/XJ-M156 XJ-M246/XJ-M256. XJ-A Series. XJ-M Series. Network Function Guide

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Documentation Road Map

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

DeviceLock Virtual DLP: Overview & Scenarios

PrinterOn Print Management Overview

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment

WhitePaper. Private Cloud Computing Essentials

Symantec IT Management Suite 7.5 powered by Altiris

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

VPN Configuration Guide. Parallels Remote Desktop for Mac

How To Install The Sap Business Explorer 7.X 2.X (Sap) On A Windows 7.30 Computer (Windows 7)

Kaseya 2. User Guide. Version 7.0. English

Patch Management SoftwareTechnical Specs

Compatibility Matrix BES10. April 27, Version 10.2 and later

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

IBM Endpoint Manager for Lifecycle Management

Symantec Mobile Management 7.1

See all, manage all is the new mantra at the corporate workplace today.

IBM Tivoli Remote Control

Virtualization of CBORD Odyssey PCS and Micros 3700 servers. The CBORD Group, Inc. January 13, 2007

Why you need an Automated Asset Management Solution

VMware Virtual Desktop Manager User Authentication Guide

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

Take Back Control in IT. Desktop & Server Management (DSM)

Agent vs. Agent-less auditing

Kaseya IT Automation Framework

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Cloud Backup and Recovery for Endpoint Devices

User Guide. BES12 Self-Service

Transcription:

FUJITSU Software Systemwalker Desktop Patrol V15 Introducing July 2015 Fujitsu Limited

Using a Client Terminal in an Enterprise The usage scenarios of the client terminal for TPO have expanded In the office By installing the product enterprise-wide, in-house data is managed in batch so information leaks are prevented Sites outside Japan PC operation management is made more efficient and security is enhanced, in operation management across sites Mobile Business continues anywhere, anytime using mobile PCs and smart devices Call center Security of information in workplaces where there is high workforce mobility is enhanced Enhanced security Asset Management An increasing number of client terminals and types brings more security risks, so there are strong requests for "Asset Management" and "Enhanced security 1

Customer Issues (Asset Management) I don't know how many PCs there are in the company, so I can't establish any procurement plans Oh no, the lease contract has expired! Next month, it looks like we'll be having a software audit by company A What FUJITSU Software Systemwalker Desktop Patrol can do: - Easily understand the latest usage status of in-house ICT assets (hardware, software) - Easily understand the current status of ICT assets sourced from a contract by linking them with the contract content. The expiry of the lease is notified in advance. - Easily understand the latest usage status of the licenses for the software I can procure devices according to what is happening in reality I won't fail to notice when a contract is about to expire I don't mind if they do their software audit Peace of mind! 2

Customer Issues (Security) I wonder if I'll be able to apply the patches soundly? A problem with a PC in the business system occurs remotely Is in-house security being maintained? What Software Systemwalker Desktop Patrol can do: - Apply Microsoft security updates automatically - Perform remote operations for remote PCs while looking at the same screen - Control the security settings for PCs and smart devices uniformly for the entire company I can enforce the application of the patches without putting a burden on operations I can do maintenance without having to go out to a remote site! This will also be handy for training I can tighten the security rules regarding the use of in-house PCs Peace of mind! 3

Integrated Management of the ICT Assets Following Lifecycle Management The information system lifecycle, and the ICT asset management requirements Disposal - Discarding the device - Recovery of assigned software licenses Maintenance Lifecycle Management Plan - Understanding device usage - Understanding software license excess or deficiency - Understanding the contract content Installation - Support for device relocation/personnel reshuffles - Changes in PC policy - Remote maintenance Operations - Asset stocktaking management - Retaining PC policy - Patch application/application distribution - Device installation/deployment - Software license allocation - Reflection to asset ledger To retain and manage the ICT assets, a system that is coordinated with the lifecycle will have to be created, from planned purchase of the assets right up until they are discarded 4

Overview of Systemwalker Desktop Patrol Various usage scenarios are supported, following changes in business - Smart device - Virtual desktop - Global (*1) Management meeting Supports Japanese and English Discard device Create monitoring report/issue report Administrator Asset Console Alarm notification Asset Mgmt/Monitoring Automatic detection of unregistered devices Systemwalker Desktop Patrol DB Inventory ICT asset information Apply security patches Distribute software Power saving/security settings Corporate Server Smart Device Relay Server Security patch/virus pattern application status collection Inventory collection Citrix XenDesktop Internet Security patches Distribute business applications Inventory collection Microsoft public site Smart device Systemwalker Desktop Patrol Auto Detection Terminal Client Terminal Systemwalker Desktop Patrol Systemwalker Desktop Patrol *1: Multilingual environment PCs and smart devices can be managed using one Corporate Server 5 Virtual PC Systemwalker Desktop Patrol Thin client terminal New features in V15.1 Smart device Systemwalker Desktop Patrol

An Alarm is Notified for Policy Violations, so Prompt Action is Possible The PC operation status, for example inventory collection status and applied Windows updates, is updated daily Operation status window Understanding the operation status It is possible to gain an understanding of the number of problematic PCs, the departments to which they belong, and the problem points etc. It is possible to gain an understanding of the PC operation status and the problem points at a glance, so policies can easily be drawn up 6

The PC Status and Software Status can be Managed Centrally The PC software and hardware information that fluctuates daily is updated automatically each day The items that are required for software asset management are collected and managed centrally in an Asset Management Ledger Centrally manage using an Asset Management Ledger Corporate Server PC hardware information Automatic inventory collection Installed software information PC with prohibited software installed Client The fluctuating asset information is managed daily, so inappropriate asset use is not missed 7

Supports Software Asset Management that is Compliant with Standards(*1) For the current licenses, register the purchase number, supplier, type/form, licensing agreement, and storage location etc. Compare the number of current licenses with the collected software information to check the license usage status Register current licenses and check the license usage status Current license management New features in V15.1 Installed software is detected using the software dictionary(*2) provided by Fujitsu or SAMAC Registration of current license License usage status display Compare Software assets can be used appropriately *1: International standard ISO/IEC 19770-1:2006, Japanese industrial standard JIS X0164-1:2010 *2: A search condition for automatically determining if software has been installed Understand asset violations and redundancy SAMAC: Association of SAM Assessment & Certification 8

Smart Devices and PCs can be Managed Centrally Asset information of smart devices (Android, ios (*1) ) across multiple carriers is collected periodically List of terminals Smart devices are also managed centrally Details Corporate Server Automatic inventory collection Smart Device Relay Server Wi-Fi Internet Smart devices and PCs can be managed using one Asset Management Ledger *1: Android and ios smart devices are supported - other operating systems will be supported gradually 9

Smart Devices can be Managed Separately By Individually-owned or Company-owned Only some of the asset information can be collected from individually-owned Android devices New features in V15.1 Item collection for individually-owned smart devices Setting and collecting collection items Smart device information Specify in detail what information to collect, such as telephone number, application information, account information, etc. Ownership form Individually-owned smart devices can be managed taking your privacy into consideration 10

The Status of the ICT Assets can be Understood through Periodic Stocktaking Stocktaking of all office devices, for example PCs, printers, and USB devices, is possible The time taken to perform stocktaking is reduced through automatic ICT device collection and automatic detection, so the work load is decreased In stocktaking, the asset ownership is checked The inventory information of the client is collected automatically Stocktake result Information collection through automatic detection of ICT devices Manual registration of information Through the support of efficient stocktaking, the theft and loss of ICT devices is detected Number of devices for which stocktaking is complete 11

Security Patches can be Applied with Certainty Security patches are applied automatically for each application target PC and department The administrator load is reduced, and PC security is retained with certainty Automatic application of security patches Before the security patch is applied After the security patch is applied Patches were not applied on two PCs There are no PCs on which patches were not applied The security patches are applied automatically Because the security patch is applied automatically, omissions in its application and security risks are prevented 12

Security can be Ensured through Security Settings and Audit The PC security settings are applied in batch, so the risk of information leaks is reduced The violation is continuously notified until Action is clicked PC security settings and audit Security settings window Security audit window Security policy violation item User The security policy violation item is displayed. By making the user aware of this, improvements in the retention of security policies and in the user's security consciousness can be achieved 13

Wasteful Power Consumption can be Reduced by a Power-Saving Settings Audit The policy is applied on the in-house PCs in batch, following the power-saving policy of the enterprise When Action is clicked, power-saving that follows the policy is configured automatically Power-saving settings window PC power-saving settings and audit Power-saving settings audit window Power-saving policy violation item After Action is clicked: User The power-saving policy violation item is displayed. By making the user aware of this, improvements in the retention of power-saving policies and in the user's powersaving consciousness can be achieved 14

Problems can be Resolved Quickly by Remote Operations By logging into the PC directly, the policy settings content can be changed while it is being checked, and direct interaction will be possible when a problem occurs PC maintenance through remote operations Checking the user's PC power-saving settings Changing the power-saving settings through a remote operation Administrator User's PC Remote operation The settings can be changed remotely by checking the policy violation status, for example 15

Trademarks - Systemwalker and Interstage are registered trademarks of Fujitsu Limited. - Windows is a registered trademark of Microsoft Corporation in the United States and other countries. - UNIX is a registered trademark of The Open Group in the United States and other countries. - Oracle and Java are registered trademarks of Oracle and/or its affiliates. - IBM is a trademark of International Business Machines Corporation. - Google, the Google logo, Android, the Android logo, Google Play, the Google Play logo, Gmail, and the Gmail logo are trademarks or registered trademarks of Google Inc. - IOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license. - Apple, the Apple logo, and Mac OS are trademarks of Apple Inc., registered in the United States and other countries. - Other company names and product names used in this document are trademarks or registered trademarks of their respective owners. - The company names, system names, product names, and other proprietary names that appear in this document are not always accompanied by trademark symbols ((TM) or (R)). 16

17