Welkom bij Axle-IT au Château! Welkom op kasteel Hooge Vuursche!



Similar documents
Netzwerkvirtualisierung? Aber mit Sicherheit!

NL VMUG UserCon March

Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Shavlik NetChk Protect 7.1

Data Center Connector for vsphere 3.0.0

Streamlining Patch Testing and Deployment

Automated Protection on UCS with Trend Micro Deep Security

McAfee MOVE / VMware Collaboration Best Practices

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

1518 Best Practices in Virtualization & Cloud Security with Symantec

How To Protect Your Cloud From Attack

#ITtrends #ITTRENDS SYMANTEC VISION

Proven LANDesk Solutions

Server & Application Monitor

End to End Security do Endpoint ao Datacenter

McAfee Server Security

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

POD INSTALLATION AND CONFIGURATION GUIDE. EMC CIS Series 1

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

White Paper The Dynamic Nature of Virtualization Security

VMware vcenter Update Manager Administration Guide

Installing and Administering VMware vsphere Update Manager

Symantec IT Management Suite 7.5 powered by Altiris

Copyright 2015 VMdamentals.com. All rights reserved.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage

Confidently Virtualize Business-Critical Applications in Microsoft

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

HP Virtual Controller and Virtual Firewall for VMware vsphere 1-proc SW LTU

RES ONE Automation 2015 Task Overview

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

Microsoft Windows Intune: Cloud-based solution

Effectively Managing Heterogeneous Virtual Environments

Migrating to ESXi: How To

What s New with VMware Virtual Infrastructure

Patch Management Solutions Test

Devising a Server Protection Strategy with Trend Micro

VMware vcenter Update Manager Administration Guide

LANDESK SOLUTION BRIEF. Patch Management

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Devising a Server Protection Strategy with Trend Micro

Data Sheet: Archiving Altiris Server Management Suite 7.0 from Symantec Essential server management: Discover, provision, manage, and monitor

Using the vcenter Orchestrator Plug-In for vsphere Auto Deploy 1.0

Tenable Webcast Summary Managing Vulnerabilities in Virtualized and Cloud-based Deployments

STREAM FRBC

VMware vsphere 5.0 Boot Camp

Patch Management. Module VMware Inc. All rights reserved

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

Data Sheet: Server Management Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

Proven deployments across different Industry verticals; Being used by leading brands

VIRTUALIZATION SECURITY IN THE REAL WORLD

INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT

VMware ESXi 3.5 update 2

System Center 2012 Suite SYSTEM CENTER 2012 SUITE. BSD BİLGİSAYAR Adana

Introducing Arcserve Unified Data Protection

JUNIPER NETWORKS FIREFLY HOST ANTIVIRUS ARCHITECTURE

Limitations of Managing VMware vsphere with MS System Center Virtual Machine Manager 2012

Evaluation of Multi-Hypervisor Management with HotLink SuperVISOR

Copyright 2014 EMC Corporation. All rights reserved. met VMware en EMC. Erik Zandboer Sr. vspecialist Europe West

Vulnerability Management

Total Cloud Protection

Three Ways to Secure Virtual Applications

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

PassTest. Bessere Qualität, bessere Dienstleistungen!

VMware vsphere 5.1 Advanced Administration

Confidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive John_Lally@symantec.

Kaseya IT Automation Framework

Monitoring Best Practices. Rajib Rashid, VP Product Management Nicolas Ponce, Kaseya University Ronny Tunfjord, Upstream Software

Patch and Vulnerability Management Program

Integrated Threat & Security Management.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

How To Protect A Virtual Desktop From Attack

PROSPHERE: DEPLOYMENT IN A VITUALIZED ENVIRONMENT

Reducing the cost and complexity of endpoint management

Shavlik Protect. Installation and Setup Guide

Bitdefender GravityZone Sales Presentation

Vistara Lifecycle Management

MiServer and MiDatabase. Service Level Expectations. Service Definition

SapphireIMS 4.0 Asset Management Feature Specification

POD INSTALLATION AND CONFIGURATION GUIDE. Python Security

Required Software Product List

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

vsphere 6.0 Advantages Over Hyper-V

Protecting the un-protectable Addressing Virtualisation Security Challenges

Transcription:

Welkom bij Axle-IT au Château! Welkom op kasteel Hooge Vuursche!

Programma Welkom (Marius Albracht) IT ontwikkelingen en Axle-IT MSP Services (Marius Albracht & Frank Wils) Shavlik (Barry Kew) Nexthink (Arie Joosse) -----------Pauze---------- IT ontwikkelingen deel 2 en LetMobile Secure Mail (Marius Albracht & Frank Wils) Service Desk (Andrew Brickell) What s new in LANDESK 10 (Frank Wils) Borrel BBQ Einde

IT ontwikkelingen en Axle-IT MSP Services Uw partner in system management oplossingen

30.000+ records gestolen

Growing up a hacker Other Hackers Core Hackers Me Army of Script Kiddies

Malware verdubbelt per jaar

Conclusie? PREVENTION IS FUTILE?

Bufferzone Enter the Buffer Zone Where threats are isolated, and endpoints are secure Protect user endpoints from advanced malware, zero-day threats and drive-by attacks with BUFFERZONE. Now employees can safely use the internet, email and removable media, without putting the enterprise at risk. http://bufferzonesecurity.com/

Ontzorgings-tooling

IT Operation Analysis

Wat IT ervaart en wat de organisatie ervaart Sommige gebruikers kunnen sharepoint niet gebruiken Server is up en de meeste gebruikers hebben geen problemen Network is up en er zijn geen performance klachten

Ontzorgings-services Axle IT Managed Services inrichting / beheer / support Mobile Device Service Mobile Secure E-mail Service (Android, IOs, Windows Phone) Werkplekbeheer Service Aantallen op en af te schalen

Ontzorgings-services Axle IT Managed Services inrichting / beheer / support Werkplekbeheer Service ook op onderdelen: OS services: Images,Uitrol templates,inrichting netwerk Software package en distributie services: Aanmaken en plannen van uitrol taken, Onderhoud en replicatie naar nevenvestigingen Patch en Anti-Virus services: Test, Repair, Autofix

Shavlik Protect Simplified patch management Barry Kew Pre-Sales Manager - EMEA

A word about security 16

86% of reported vulnerabilities come from third-party applications. National Vulnerability Database

Introducing Shavlik Protect Shavlik Protect OS and third-party application patch management Data Center Client Workstations Virtualization Agentless Hypervisor Patch Online and offline patching Snapshot rollback support Physical Agentless Agent Discovery Asset Data On-network and offnetwork patching

Shavlik Protect Features Comprehensive patch management OS and third-party patch Choice of agent or agentless Complete automation Custom patch options Control reboots Ease of use Intuitive interface Manage all patches and assets from a single pain of glass Easy reporting and executive views Flexible reporting options Common IT functions with ITScripts Virtual support Patch online or offline VMs Patch VM templates Take snapshots before patching Get VM information from vcenter Patch hypervisors

Agentless Discovery, Assessment, Remediation Discover machines in your environment quickly and easily Choose from multiple methods of discovery Set credentials on individual group entities or at the group level 20

Discovery and Assessment Monitoring Monitor machines resolved View status of machines scanned View resolution errors 21

Agentless Patch Deployment View machines scanned View missing patches for selected machines Right-click to deploy missing patches or selected patches Schedule assessment and auto deployment of patches to automate the process 22

Virtual Infrastructure Patching Agentless patch for virtualization Keep VMs efficient No additional agents Find rogue VMs Patch offline VMs Insert patch file Isolate VM Boot, install, shut-down Re-enable Patch online VMs Snapshot before patching Patch VM templates Patch Hypervisor (ESXi) Get inventory of VMs with VMware integration