FUJITSU Software Systemwalker Desktop Patrol V15 Introducing July 2015 Fujitsu Limited
Using a Client Terminal in an Enterprise The usage scenarios of the client terminal for TPO have expanded In the office By installing the product enterprise-wide, in-house data is managed in batch so information leaks are prevented Sites outside Japan PC operation management is made more efficient and security is enhanced, in operation management across sites Mobile Business continues anywhere, anytime using mobile PCs and smart devices Call center Security of information in workplaces where there is high workforce mobility is enhanced Enhanced security Asset Management An increasing number of client terminals and types brings more security risks, so there are strong requests for "Asset Management" and "Enhanced security 1
Customer Issues (Asset Management) I don't know how many PCs there are in the company, so I can't establish any procurement plans Oh no, the lease contract has expired! Next month, it looks like we'll be having a software audit by company A What FUJITSU Software Systemwalker Desktop Patrol can do: - Easily understand the latest usage status of in-house ICT assets (hardware, software) - Easily understand the current status of ICT assets sourced from a contract by linking them with the contract content. The expiry of the lease is notified in advance. - Easily understand the latest usage status of the licenses for the software I can procure devices according to what is happening in reality I won't fail to notice when a contract is about to expire I don't mind if they do their software audit Peace of mind! 2
Customer Issues (Security) I wonder if I'll be able to apply the patches soundly? A problem with a PC in the business system occurs remotely Is in-house security being maintained? What Software Systemwalker Desktop Patrol can do: - Apply Microsoft security updates automatically - Perform remote operations for remote PCs while looking at the same screen - Control the security settings for PCs and smart devices uniformly for the entire company I can enforce the application of the patches without putting a burden on operations I can do maintenance without having to go out to a remote site! This will also be handy for training I can tighten the security rules regarding the use of in-house PCs Peace of mind! 3
Integrated Management of the ICT Assets Following Lifecycle Management The information system lifecycle, and the ICT asset management requirements Disposal - Discarding the device - Recovery of assigned software licenses Maintenance Lifecycle Management Plan - Understanding device usage - Understanding software license excess or deficiency - Understanding the contract content Installation - Support for device relocation/personnel reshuffles - Changes in PC policy - Remote maintenance Operations - Asset stocktaking management - Retaining PC policy - Patch application/application distribution - Device installation/deployment - Software license allocation - Reflection to asset ledger To retain and manage the ICT assets, a system that is coordinated with the lifecycle will have to be created, from planned purchase of the assets right up until they are discarded 4
Overview of Systemwalker Desktop Patrol Various usage scenarios are supported, following changes in business - Smart device - Virtual desktop - Global (*1) Management meeting Supports Japanese and English Discard device Create monitoring report/issue report Administrator Asset Console Alarm notification Asset Mgmt/Monitoring Automatic detection of unregistered devices Systemwalker Desktop Patrol DB Inventory ICT asset information Apply security patches Distribute software Power saving/security settings Corporate Server Smart Device Relay Server Security patch/virus pattern application status collection Inventory collection Citrix XenDesktop Internet Security patches Distribute business applications Inventory collection Microsoft public site Smart device Systemwalker Desktop Patrol Auto Detection Terminal Client Terminal Systemwalker Desktop Patrol Systemwalker Desktop Patrol *1: Multilingual environment PCs and smart devices can be managed using one Corporate Server 5 Virtual PC Systemwalker Desktop Patrol Thin client terminal New features in V15.1 Smart device Systemwalker Desktop Patrol
An Alarm is Notified for Policy Violations, so Prompt Action is Possible The PC operation status, for example inventory collection status and applied Windows updates, is updated daily Operation status window Understanding the operation status It is possible to gain an understanding of the number of problematic PCs, the departments to which they belong, and the problem points etc. It is possible to gain an understanding of the PC operation status and the problem points at a glance, so policies can easily be drawn up 6
The PC Status and Software Status can be Managed Centrally The PC software and hardware information that fluctuates daily is updated automatically each day The items that are required for software asset management are collected and managed centrally in an Asset Management Ledger Centrally manage using an Asset Management Ledger Corporate Server PC hardware information Automatic inventory collection Installed software information PC with prohibited software installed Client The fluctuating asset information is managed daily, so inappropriate asset use is not missed 7
Supports Software Asset Management that is Compliant with Standards(*1) For the current licenses, register the purchase number, supplier, type/form, licensing agreement, and storage location etc. Compare the number of current licenses with the collected software information to check the license usage status Register current licenses and check the license usage status Current license management New features in V15.1 Installed software is detected using the software dictionary(*2) provided by Fujitsu or SAMAC Registration of current license License usage status display Compare Software assets can be used appropriately *1: International standard ISO/IEC 19770-1:2006, Japanese industrial standard JIS X0164-1:2010 *2: A search condition for automatically determining if software has been installed Understand asset violations and redundancy SAMAC: Association of SAM Assessment & Certification 8
Smart Devices and PCs can be Managed Centrally Asset information of smart devices (Android, ios (*1) ) across multiple carriers is collected periodically List of terminals Smart devices are also managed centrally Details Corporate Server Automatic inventory collection Smart Device Relay Server Wi-Fi Internet Smart devices and PCs can be managed using one Asset Management Ledger *1: Android and ios smart devices are supported - other operating systems will be supported gradually 9
Smart Devices can be Managed Separately By Individually-owned or Company-owned Only some of the asset information can be collected from individually-owned Android devices New features in V15.1 Item collection for individually-owned smart devices Setting and collecting collection items Smart device information Specify in detail what information to collect, such as telephone number, application information, account information, etc. Ownership form Individually-owned smart devices can be managed taking your privacy into consideration 10
The Status of the ICT Assets can be Understood through Periodic Stocktaking Stocktaking of all office devices, for example PCs, printers, and USB devices, is possible The time taken to perform stocktaking is reduced through automatic ICT device collection and automatic detection, so the work load is decreased In stocktaking, the asset ownership is checked The inventory information of the client is collected automatically Stocktake result Information collection through automatic detection of ICT devices Manual registration of information Through the support of efficient stocktaking, the theft and loss of ICT devices is detected Number of devices for which stocktaking is complete 11
Security Patches can be Applied with Certainty Security patches are applied automatically for each application target PC and department The administrator load is reduced, and PC security is retained with certainty Automatic application of security patches Before the security patch is applied After the security patch is applied Patches were not applied on two PCs There are no PCs on which patches were not applied The security patches are applied automatically Because the security patch is applied automatically, omissions in its application and security risks are prevented 12
Security can be Ensured through Security Settings and Audit The PC security settings are applied in batch, so the risk of information leaks is reduced The violation is continuously notified until Action is clicked PC security settings and audit Security settings window Security audit window Security policy violation item User The security policy violation item is displayed. By making the user aware of this, improvements in the retention of security policies and in the user's security consciousness can be achieved 13
Wasteful Power Consumption can be Reduced by a Power-Saving Settings Audit The policy is applied on the in-house PCs in batch, following the power-saving policy of the enterprise When Action is clicked, power-saving that follows the policy is configured automatically Power-saving settings window PC power-saving settings and audit Power-saving settings audit window Power-saving policy violation item After Action is clicked: User The power-saving policy violation item is displayed. By making the user aware of this, improvements in the retention of power-saving policies and in the user's powersaving consciousness can be achieved 14
Problems can be Resolved Quickly by Remote Operations By logging into the PC directly, the policy settings content can be changed while it is being checked, and direct interaction will be possible when a problem occurs PC maintenance through remote operations Checking the user's PC power-saving settings Changing the power-saving settings through a remote operation Administrator User's PC Remote operation The settings can be changed remotely by checking the policy violation status, for example 15
Trademarks - Systemwalker and Interstage are registered trademarks of Fujitsu Limited. - Windows is a registered trademark of Microsoft Corporation in the United States and other countries. - UNIX is a registered trademark of The Open Group in the United States and other countries. - Oracle and Java are registered trademarks of Oracle and/or its affiliates. - IBM is a trademark of International Business Machines Corporation. - Google, the Google logo, Android, the Android logo, Google Play, the Google Play logo, Gmail, and the Gmail logo are trademarks or registered trademarks of Google Inc. - IOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license. - Apple, the Apple logo, and Mac OS are trademarks of Apple Inc., registered in the United States and other countries. - Other company names and product names used in this document are trademarks or registered trademarks of their respective owners. - The company names, system names, product names, and other proprietary names that appear in this document are not always accompanied by trademark symbols ((TM) or (R)). 16
17