Desktop Management. IT Compliance. http://www.hitachi.co.jp/jp1-e/ Job Management Partner 1 Product & Supported Platform

Similar documents
This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2009, Hitachi, Ltd.

Availability and Integrated Management. Monitoring

Desktop Management. IT Compliance

Introducing FUJITSU Software Systemwalker Centric Manager V15.1.1

FUJITSU Software Systemwalker Desktop Patrol V15 Introducing July 2015 Fujitsu Limited

Attix5 Pro Server Edition

JP1 Version 11 General Catalog

Patch Management SoftwareTechnical Specs

SapphireIMS 4.0 Asset Management Feature Specification

Technical Standards for Information Security Measures for the Central Government Computer Systems

Proven LANDesk Solutions

Managing Remote Access

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Synergy Controller Cloud Storage Features and Benefits

Integrated Systems Management Job Management Partner 1

SMALL BUSINESS OUTSOURCING

Administrator's Guide

System Management. What are my options for deploying System Management on remote computers?

In order to upload a VM you need to have a VM image in one of the following formats:

ManageEngine Desktop Central Training

Did you know your security solution can help with PCI compliance too?

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

Information Technology Solutions. Managed IT Services

Office 365 Windows Intune Administration Guide

Workstation Management

Kaspersky Security Center 10 Getting Started

Reducing the cost and complexity of endpoint management

Core Protection for Virtual Machines 1

IBM Tivoli Endpoint Manager for Lifecycle Management

Synergy Controller Cloud Storage Features and Benefits


Attix5 Pro Server Edition

Getting Started with ESXi Embedded

Agilent Technologies Electronic Measurements Group Computer Virus Control Program

Job Management Partner 1/IT Desktop Management 2 - Asset Console Description

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

User's Manual. Intego VirusBarrier Server 2 / VirusBarrier Mail Gateway 2 User's Manual Page 1

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

Simplify Your Windows Server Migration

Ultra Thin Client TC-401 TC-402. Users s Guide

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

Asset Inventory Reference

IBM Tivoli Endpoint Manager for Lifecycle Management

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

AKCess Pro Server Backup & Restore Manual

For Businesses with more than 25 seats.

StarWind iscsi SAN: Configuring Global Deduplication May 2012

HP Intelligent Management Center Standard Software Platform

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Kaseya Server Instal ation User Guide June 6, 2008

Installing and Configuring vcenter Support Assistant

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

Lumension Endpoint Management and Security Suite

ArCycle vmbackup. for VMware/Hyper-V. User Guide

Datasheet FUJITSU Software Systemwalker Runbook Automation V15

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

PN Connect:Enterprise Secure FTP Client Release Notes Version

QuickStart Guide for Client Management. Version 8.7

System i and System p. Customer service, support, and troubleshooting

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

IBM Tivoli Remote Control

ScoMIS Encryption Service

Comodo Endpoint Security Manager SME Software Version 2.1

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Actualtests.C questions

Patch Management for Red Hat Enterprise Linux. User s Guide

System Planning, Deployment, and Best Practices Guide

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

How To Manage A System Vulnerability Management Program

SapphireIMS 4.0 BSM Feature Specification

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

Customized Cloud Solution

Manuals for This Product

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Information. Product update Recovery. Asset manager. Set console address Create recovery point. Client properties

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

Release Notes for Websense Security v7.2

IBM Maximo Asset Management Essentials

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11

NovaBACKUP. Storage Server. NovaStor / May 2011

IBM Tivoli Endpoint Manager for Security and Compliance

BULLGUARD BAckUp GUIDE

How To Install Acronis Backup & Recovery 11.5 On A Linux Computer

System Requirements and Platform Support Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Administrator Manual Across Personal Edition v6 (Revision: February 4, 2015)

JP1/IT Desktop Management 2 - Agent (For UNIX Systems)

Endpoint Security VPN for Windows 32-bit/64-bit

IBM Endpoint Manager for Lifecycle Management

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Kaseya IT Automation Framework

HP Client Automation Standard Fast Track guide

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Operating Instructions

Delphi 2015 SP1-AP1 System Requirements

At Your Service Repair Centre Installation Guide

GFI LANguard 9.0 ReportPack. Manual. By GFI Software Ltd.

Transcription:

Job Management Partner 1 Product & Supported Platform MONITORING: Availability management Server operation management Integrated management Integrated console Rule management option Management base IT COMPLIANCE: Desktop management AUTOMATION: Job management Job scheduler ERP management Job control script File transfer AS/400 linkage Product category/product name Job Management Partner 1/Performance Management - Web Console Job Management Partner 1/Performance Management - Manager Job Management Partner 1/Performance Management - Base Job Management Partner 1/Performance Management - Remote Monitor for Platform Job Management Partner 1/Performance Management - Remote Monitor for Oracle Job Management Partner 1/Performance Management - Remote Monitor for Microsoft SQL Server Job Management Partner 1/Performance Management - Agent Option for Platform Job Management Partner 1/Performance Management - Agent Option for Virtual Machine Job Management Partner 1/Performance Management - Agent Option for Enterprise Applications Job Management Partner 1/Performance Management - Agent Option for Job Management Job Management Partner 1/Performance Management - Agent Option for Service Response - Export Edition Job Management Partner 1/Performance Management - Analysis View Job Management Partner 1/Performance Management - Analysis Manager Job Management Partner 1/Performance Management - Analysis Adaptor Job Management Partner 1/Integrated Management - View Job Management Partner 1/Integrated Management - Manager Job Management Partner 1/Integrated Management - Event Gateway for Network Node Manager i Job Management Partner 1/Integrated Management - Rule Operation Job Management Partner 1/Base Job Management Partner 1/IT Desktop Management Supported platform, Solaris, AIX, HP-UX, Solaris, AIX, Linux, Linux, Linux, HP-UX, Solaris, AIX, Linux, HP-UX, Solaris, AIX, HP-UX, Solaris, AIX, Solaris, AIX, HP-UX, Solaris, HP-UX, Solaris, AIX Job Management Partner 1/Automatic Job Management System 3 - View Job Management Partner 1/Automatic Job Management System 3 - Manager, HP-UX, Solaris, AIX Job Management Partner 1/Automatic Job Management System 3 - Agent, HP-UX, Solaris, AIX Job Management Partner 1/Automatic Job Management System 3 - Web Operation Assistant Job Management Partner 1/Automatic Job Management System 3 for Enterprise Applications, HP-UX, Solaris, AIX Job Management Partner 1/Automatic Job Management System 2 - Definition Assistant Job Management Partner 1/Script, HP-UX, Solaris, AIX Job Management Partner 1/File Transmission Server/FTP, HP-UX, Solaris, AIX Job Management Partner 1/Open Job Entry for Midrange Computer OS/400 AIX, OS/400 and OS/400 are trademarks of International Business Machines Corporation in the United States, other countries, or both. OS/400 and OS/400 are trademarks of International Business Machines Corporation in the United States, other countries, or both. HP-UX is a product name of Hewlett-Packard Company. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Microsoft, Internet Explorer, SQL Server and are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Oracle and Java are registered trademarks of Oracle and/or its affiliates. UNIX is a registered trademark of The Open Group in the United States and other countries. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. Other company and product names mentioned in this document may be trademarks of their respective owners. Throughout this document Hitachi has attempted to distinguish trademarks from descriptive terms by writing the name with the capitalization style used by the manufacturer, or by writing the name with initial capital letters. Hitachi cannot attest to the accuracy of this. Use of a trademark in this document should not be regarded as affecting the validity of the trademark. Desktop Management http://www.hitachi.co.jp/jp1-e/ Hitachi Asia Ltd. ICT Solutions Business Tel. +65-6535-2100 URL.http://www.hitachi.com.sg/jp Hitachi Asia (Malaysia) Sdn. Bhd. Tel. +60-3-2031-8751 Hitachi Asia (Thailand) Co., Ltd. Tel. +66-2-632-9292 Hitachi Asia Ltd. Ha Noi Office Tel. +84-4-3933-3123 Hitachi Data Systems Corporation System Management Software Group Tel. +1-781-810-6050 URL.http://www.hitachi.co.jp/jp1-us Hitachi Data Systems Limited. Tel. +44 (0)1753 618820 URL.http://www.hitachi.co.jp/jp1-eu Hitachi (China) Information Systems Co., Ltd. Tel. +86-21-64731244(Dir) URL.http://www.jp1.cn Hitachi (China) Information Systems Co., Ltd. Beijing Branch Tel. +86-10-8286-2199 For regarding product/version availability, OS compatibility, etc., please contact your nearest Hitachi office. The availability of certain products described in this brochure may differ depending on region; for details please contact your nearest distributor. Specifications described in this document may change without prior notice. Hitachi (China) Information Systems Co., Ltd. Guangzhou Branch Tel. +86-20-3878-5586 Hitachi (China) Information Systems Co., Ltd. Shenzhen Office Tel. 86-755-8606-9225 LG Hitachi Ltd. Tel. +82-(0)2-705-3758 URL.http://www.lghitachi.co.kr Hitachi, Ltd. Global Account Sales Department 1 Global Business Planning & Operations Divisions Tel. +81-(0)3-5471-3224 URL.http://www.hitachi.co.jp/jp1-e/ CC-E352S 1212 Printed in Japan (H) This brochure has been created using Acrobat PDF format from Adobe Systems Incorporated. All Rights Reserved. Copyright 2012, Hitachi, Ltd.

Desktop Management Job Management Partner 1 Version 9.5 Effective asset management to reinforce your business Managing the enterprise systems of today faces a multitude of challenges such as maintaining compliance to policies, and reinforcement of security measures to increasingly complex risks. Job Management Partner 1 provides a wide array of management functions and a user interface that makes them easily accessible. Job Management Partner 1 enables integrated management of IT assets, enforcement of compliance policies and enhanced system security. Job Management Partner 1's efficient, detailed asset management provides a solid, secure foundation for your business. 1

Responding to diverse needs in IT asset management with a wide array of powerful functions Protect valuable IT assets Contents Job Management Partner 1 V9 Desktop Management Concept and Contents What is Job Management Partner 1? P1 P2 P3 P4 Need to manage IT assets properly and efficiently? Need to gather hardware and software for integrated management of IT assets? Need to fully implement security measures in accordance with security policies? Need to prevent unauthorized PC connections to the company network to minimize security risks? Need to respond quickly to problems and inquiries from remote sites? Desktop Management Job Management Partner 1/IT Desktop Management P5 P12 PC security measures from four perspectives Control connections Control usage Control dissemination Monitor activity P13 P14 2

Job Management Partner 1 Version 9.5 Protect valuable IT assets Job Management Partner 1 provides efficient, integrated management for a wide array of IT assets. Your business can embrace new technologies like virtual desktops, smartphones and tablet computers, and incorporate them into the managed environment. An intuitive user interface and fully-featured menu with detailed management options lower management costs and helps ensure full compliance throughout the company. Protection against security risks provides safeguards for your valuable IT assets. Lower costs Automatic collection of inventory data Automation of software distribution and installation Remote operations Home Administrator Manager Dashboard (Asset management) Dashboard (Security management) Integrated management using a single point of management even in large-scale environments Job Management Partner 1 provides the capability to consolidate multiple management points into a single management server. Utilizing this feature, work can be divided among multiple administrators. Management ranges can be set in the division of management tasks, and the design ensures both system independence and security. Features such as the ability to set up a relay server to distribute network load in a single operation are also included, thus reducing the tasks and workload assigned to the administrator. 3

Job Management Partner 1 Protecting your valuable IT assets Job Management Partner 1 provides integrated management of IT assets and protection against security risks to help enforce compliance throughout the company. Automation Monitoring Ensuring full compliance Software license management Prohibiting use of unauthorized software Retrieving operation logs Tracking of operations Asset management (Management software list) Virtual desktop Inventory Branch A Security measures Full implementation of patch distribution Automatic updating of anti-virus software Rejection of improperly connected PCs and building of quarantine systems Preventing leaks of internal Security management (Operation log list) Virtual desktop Branch B Security diagnostic report Management products supporting IT compliance Asset and distribution management Integrated management of hardware, software and other assets, and full awareness of security status enables effective and efficient use of those assets. With its ability to build quarantine systems, retrieval of operation log (trail records) of PCs and application servers, Job Management Partner 1 helps you attain full compliance to security measures. 4

Desktop Management Potect valuable IT assets Job Management Partner 1 supports lifecycle management of IT assets for diverse business environments including the cloud computing.this helps ensure optimal levels of IT assets while providing full protection against security risks. Job Management Partner 1/IT Desktop Management - Manager Need to manage IT assets effectively and efficiently? IT asset lifecycle management helps provide proper management of a variety of IT assets with minimal labor and costs. The lifecycle refers to the different phases of an asset, starting from planning and budgeting to procurement, introduction and distribution, operation and maintenance, evaluation, and disposal. Integrated management of IT assets for these phases ensures optimal levels of IT assets while providing full protection against security risks. Job Management Partner 1/IT Desktop Management - Manager includes the functions needed in each phase of lifecycle management, such as hardware management, software management, software distribution and security management. Functions enabling an effective understanding of the current status as the starting point provide strong support for managing IT asset lifecycles. Simplified asset management utilizing an integrated user interface In Job Management Partner 1, hardware management, software management, software distribution, security management and other functions essential for IT asset management are provided eliminating the need to install various tools and reducing installation time and costs. Job Management Partner 1 also includes a function for remote control of PCs and servers and a quarantine function for isolating vulnerable PCs. The various functions are integrated in a single location for enabling unified, simple operation. The user interface was developed based on actual operations, providing an intuitive interface learnable in a short time. With this interface, there are no complicated operations with different procedures for each tool. Check IT asset data to understand the current situation Monitoring Understanding the current status using the Home Screen and Summary Reports Viewing the current status on the home screen The first screen displayed after logging in provides an overview of the entire system, including daily changes in the inventory date. This can be used to provide a complete check of daily operations. In addition, all other menus such as assets and security management are accessible from this screen. Has anything changed since yesterday? Home The home screen is a collection of summary panels containing various types of related.the types of panels and their layout on the screen can be customized to specific needs, for example giving priority to screens that needs to be checked daily. Are program updates and other security measures properly in place? Replaceable with summary that you want to check daily Replaceable with summary that you want to check daily Has an important event occurred? Disposal Has an improper installation occurred? Planning/budgeting Home IT asset life cycle Hardware Management Considerations such as mid- to long-term planning and budgeting for IT assets Evaluation Software Management Software IT asset data Manager Procurement and introduction of machines and installation of software Operation and maintenance Security Measures Administrator Machine procurement, introduction and distribution Evaluation based on an analysis of IT asset trends and status from cost and compliance perspectives Current understanding Disposal of IT assets Detailed asset report (Software license costs) Automation Automatic collection of IT asset and security Hardware Software Security Hardware Software Security Centralized management of allocated IT assets from various perspectives Dealing with security risks Agent PC-related management Branch A Agent PC-related management Overview of system status with summary reports Dashboard (Security management) Security diagnostic report (Diagnosis of security status) Detailed asset report (Hardware assets) 5 Branch B Daily summary report Summary reports that can be sent via e-mail on a daily, weekly, and/or monthly basis provide a quick overview of the current system status. You can use this to revise future work plans. The daily summary report enables you to check what events have occurred: IT assets whose status has changed, the status of software licenses, security measures in effect, software distribution status, available database space, and more. Dashboard (Asset management) 6

Desktop Management Potect valuable IT assets Job Management Partner 1 supports lifecycle management of IT assets for diverse business environments including the cloud computing.this helps ensure optimal levels of IT assets while providing full protection against security risks. Job Management Partner 1/IT Desktop Management - Manager Need to manage IT assets effectively and efficiently? IT asset lifecycle management helps provide proper management of a variety of IT assets with minimal labor and costs. The lifecycle refers to the different phases of an asset, starting from planning and budgeting to procurement, introduction and distribution, operation and maintenance, evaluation, and disposal. Integrated management of IT assets for these phases ensures optimal levels of IT assets while providing full protection against security risks. Job Management Partner 1/IT Desktop Management - Manager includes the functions needed in each phase of lifecycle management, such as hardware management, software management, software distribution and security management. Functions enabling an effective understanding of the current status as the starting point provide strong support for managing IT asset lifecycles. Simplified asset management utilizing an integrated user interface In Job Management Partner 1, hardware management, software management, software distribution, security management and other functions essential for IT asset management are provided eliminating the need to install various tools and reducing installation time and costs. Job Management Partner 1 also includes a function for remote control of PCs and servers and a quarantine function for isolating vulnerable PCs. The various functions are integrated in a single location for enabling unified, simple operation. The user interface was developed based on actual operations, providing an intuitive interface learnable in a short time. With this interface, there are no complicated operations with different procedures for each tool. Check IT asset data to understand the current situation Monitoring Understanding the current status using the Home Screen and Summary Reports Viewing the current status on the home screen The first screen displayed after logging in provides an overview of the entire system, including daily changes in the inventory date. This can be used to provide a complete check of daily operations. In addition, all other menus such as assets and security management are accessible from this screen. Has anything changed since yesterday? Home The home screen is a collection of summary panels containing various types of related.the types of panels and their layout on the screen can be customized to specific needs, for example giving priority to screens that needs to be checked daily. Are program updates and other security measures properly in place? Replaceable with summary that you want to check daily Replaceable with summary that you want to check daily Has an important event occurred? Disposal Has an improper installation occurred? Planning/budgeting Home IT asset life cycle Hardware Management Considerations such as mid- to long-term planning and budgeting for IT assets Evaluation Software Management Software IT asset data Manager Procurement and introduction of machines and installation of software Operation and maintenance Security Measures Administrator Machine procurement, introduction and distribution Evaluation based on an analysis of IT asset trends and status from cost and compliance perspectives Current understanding Disposal of IT assets Detailed asset report (Software license costs) Automation Automatic collection of IT asset and security Hardware Software Security Hardware Software Security Centralized management of allocated IT assets from various perspectives Dealing with security risks Agent PC-related management Branch A Agent PC-related management Overview of system status with summary reports Dashboard (Security management) Security diagnostic report (Diagnosis of security status) Detailed asset report (Hardware assets) 5 Branch B Daily summary report Summary reports that can be sent via e-mail on a daily, weekly, and/or monthly basis provide a quick overview of the current system status. You can use this to revise future work plans. The daily summary report enables you to check what events have occurred: IT assets whose status has changed, the status of software licenses, security measures in effect, software distribution status, available database space, and more. Dashboard (Asset management) 6

Protect valuable IT assets Need to gather hardware and software for integrated management of IT assets? Automatic collection of inventory data Inventory data is collected automatically from machines connected to the network and managed from a central location. Inventory data includes such items as hardware, software, and security. Further, when inventory data is updated, such as when software is installed or a patch applied, this updated is automatically applied to the centrally managed data. Available on inventories Hardware : Free hard disk space, installed RAM capacity, etc. Software : Software name, version, manufacturer, etc. Security : Installed patches, anti-virus software (engine, definition file version, resident/non-resident programs), OS settings, etc. User-specific *: PC user name, department, telephone number, employee number, e-mail address, etc. * Can be set as needed Software license management Job Management Partner 1 enables easy understanding of the entire software licensing situation at a glance the number of licenses to allocate and actually install, and the PCs where software has been allocated and actually installed. This can automatically prevent unauthorized installations and license violations by instructing users attempting to install software without an allocated license to obtain a license before installation. Report on surpluses and overuse of licenses The number of installed software programs is automatically totaled and compared to the number of licenses to provide a report on surpluses and overuse of software. The report also identifies those machines running the unlicensed copies of the software. By providing accurate on the use of software, Job Management Partner 1 is valuable not only for system planning, but also for resolving compliance issues. Efficient and appropriate software distribution and installation Job Management Partner 1 enables software to be registered and distributed to target PCs and installed by simply using an installation wizard. It also provides flexibility in utilization, such as the ability to specify the software distributed to each department. Job Management Partner 1 can automatically control the transfer rate and timing of distributions to minimize the load on networks. Compilation of number of owned licenses overages, number of installations, and other license data Detailed asset report (License overage software) Software license usage status window Dashboard (Asset management) The PCs unallocated licenses are displayed Asset management (Management software list) 7

Desktop Management Automation Monitoring License agreement management Job Management Partner 1 can manage license agreement such as the type of software license and its start and termination dates. Because electronic data from scanned agreements can be appended and saved the content of such agreements can be checked at any time, without needing to check against ancillary documents. Understanding cost trends Detailed asset reports providing cost trends regarding hardware and software leasing, rental, maintenance, support, and purchasing can be compiled on a monthly, quarterly, semiannual, and annual basis. These reports can be used as reference data to aid in budget calculations. Efficient inventory management Device data can be automatically collected over the network for periodically confirming the devices connected to the network. The most up-to-date status of IT asset data is constantly maintained by simply registering newly detected devices and changing the owners of existing devices. Peripheral devices without an IP address (such as displays, hard disks, printers, and USB memory) are associated with the PC for registration and management as IT assets. Job Management Partner 1 supports efficient inventory by enabling output of IT asset data for use in checking the actual devices against an IT asset list, even for IT assets that are not connected to the network. Even if the owner of a PC or device is changed due to a change in job position or transfer of control, its existence on the network can still be confirmed. The location of devices on the network can also be easily identified from the IP address and other data. Enables filtering by type of agreement, company, and expiration date. Detailed asset report (Hardware asset costs) Cost trends displayed as a graph Management of in the agreement list Data attachment Shows regarding agreement Asset management (Agreement list) Scheduled costs starting from the current month displayed as a graph Compiled by type of agreement Data compiled on a quarterly, semiannual, and annual basis is also displayed Detailed asset report (Software license costs) 8

Protect valuable IT assets Desktop Management Automation Monitoring Need to fully implement security measures in accordance with security policies? Control of security measures Security policies can be created that prohibit certain operations, maintain operational usage logs and that determine and enforce up to date versions for software, such as antivirus products. Policies can be applied either to individual PC's or at group level to ensure security measures are uniform. Job Management Partner 1 can also show the effectiveness of the applied security measures(security trends) and changes can be implemented simply by updating the defined policies. Main content of security policies Determination of program updates Determination of anti-virus software Determination of operating software Determination of security settings for services Setting of prohibited operations Determination of security settings for OS Setting of operation logs Implementing program updates and anti-virus installations Job Management Partner 1 can help maintain the proper installation of the latest program upgrades and patches, for example, by ensuring automatic updates are enabled. It can also verify details of anti-virus software, including the engine version, definition file version, resident settings, and date and time of last virus scan. Job Management Partner 1 verifies compliance with security measures, and if a problem is found, it can issue a message to request action and can force the distribution and installation of anti-virus software and other programs. Checking the software installation status Job Management Partner 1 can determine the installation status of software and take appropriate action, for example by automatically installing mandatory software or removing prohibited items. This makes it easy to provide a work environment to use only pre-authorized software. Checking the use of prohibited services Job Management Partner 1 can check if prohibited services are running on individual PCs. Efficient patch distribution Job Management Partner 1 provides a list of program updates, such as patches from Microsoft, along with the scripts to install them. They can be packaged in a format that provides one touch distribution when the need arises. This enables trouble-free and complete installation of patches, which are vital for security management of PCs, and reduces the administrative workload. Restricting prohibited operations If prohibited operations are attempted the user can be notified by a pop-up message, or the administrator can be notified by e-mail. Uninstallation of prohibited software can also be controlled remotely by the administrator. Examples of restricting prohibited operations Printing from a PC where printing is not allowed Running prohibited software Use of an unapproved USB memory device Writing to CD/DVD media, and so on Logging operations related to leaks Job Management Partner 1 enables logging of operations related to taking data outside the company, such as uploading data to the Web, sending e-mail, or copying to a USB memory device. Main log data PC startup/stop, logon/logoff, process start/stop File (folder) operations and printing Connection and disconnection of external media Access to Web, uploading, and downloading Sending and receiving by FTP Sending of e-mails with file attachments, saving of files with mail attachments, and so on Checking OS security settings Password settings Job Management Partner 1 can check for password vulnerabilities, such as the use of a PC password identical to the account name, and check the number of days since the password was last changed. Strong password settings can prevent unauthorized access to a PC by guessing a vulnerable password. Screensaver settings Job Management Partner 1 can check whether a screensaver is set, whether it is password protected, the time delay until it is activated, and other options. Full control over the various screensaver settings helps prevent unauthorized PC access when a user leaves their seat. Security diagnostic report The security diagnosis report uses graphs and tables to provide an overall, category-based assessment of security for managed PC's. The security diagnosis report can be displayed for a user selectable period, providing confirmation of the security measures in effect and enabling administrators to take corrective action for PC's with low ratings. ➊ Setting restrictions ➋ Transfer restrictions Restrictions Prohibited software Software X Software Y ➏ Notification of prohibited software use e-mail notification Administrator Dashboard (Security management) If Software A is permitted ➌ User runs the software OK! NG If Software X is prohibited ➌ User runs the software ➍ Allow/prohibit operation is determined automatically ➍ Allow/prohibit operation is determined automatically ➎ Use of software X is allowed Warning message game.exe was stopped because usage is restricted by the administrator. ➎ Use of software X is not allowed Warning Security management (Operation log list) Security diagnostic report 9 10

Protect valuable IT assets Need to prevent unauthorized PC connections to the company network to minimize security risks? Automatic rejection and quarantine of improperly connected PCs Job Management Partner 1 enables the existing network environment to automatically reject unauthorized PCs that attempt illicit connections. These illicit PC's can be rejected without any impact on legitimate users. A treatment serve can be prepared with the latest virus definition files, which are modified frequently, to enable the building of a quarantine system that rejects connection and provides treatment for PCs with inadequate security measures. PCs that are not up to date with the required security policies can be quarantined until the proper policies are applied to reduce the security risks within the company. Need to respond quickly to problems and inquiries from remote sites? Remote operation for remote maintenance and Help Desk support Managed PCs and servers can be operated remotely, enabling a quick recovery response in case of failure at a remote location while at the same time reducing travel expenses. Also, Job Management Partner 1 supports Help Desk with product operation procedures and fixes when problems occur. Remote operation using Intel vpro TM technology Job Management Partner 1 is capable of remote control of Intel vpro TM machines with remote KVM functions* and PCs with VNC* servers installed. Even if the PC at the connection site cannot be started due to a corrupted OS, HDD failure, or other cause, the administrator PC drive can be used to examine the fault and to recover the OS image and reinstall. * KVM: Function for remote operation of a keyboard, display (video), and mouse * VNC: Virtual Network Computing Leak prevention in remote operations A PC at a remote site can be accessed using remote operation without displaying the activity on its screen (black screen). If remote operations are stopped in non-display mode, or someone tries to cancel non-display mode, the remote PC is automatically locked thus preventing display of sensitive. Speeding up remote operation Functions are provided to speed up remote operations by reducing the number of colors in bitmaps, compressing data transfers, turning off desktop wallpaper, rendering using bitmap cache, and more. This allows operations to be performed smoothly even over low speed connections. Inside company Manager Treatment server Administrator Treatment Outside company Connection is blocked Network monitoring server PC carried into company (Unauthorized PC) Agent Vulnerable PC Connection is blocked 11

Desktop Management Automation Monitoring Enterprise support for desktop management Multi-tenant support for efficient management IT asset management of multiple companies (tenants) in a cloud environment requires independence of systems and establishing security. Job Management Partner 1/IT Desktop Management Manager enables integrated management of the IT asset management from multiple companies using a single manager machine, and at the same time, allows multi-tenant IT asset management capable of separating management between different companies. IT asset management servers that were once required for each company can now be integrated into a single server to reduce costs. Limitations are imposed on settings and browsing scope to prevent a tenant from viewing from another tenant. Independence of systems and establishment of security are provided, enabling high-efficiency management. This multi-tenant IT asset management can be used not only for multiple companies, but also for different sites or departments within the same company by dividing them into tenant units. For example, if administrators within a company are distributed at multiple sites, the IT asset management server for all sites can be integrated into a single server, and management roles can be divided with one administrator responsible for the entire set of IT assets and other administrators responsible for the IT assets of the respective site. This system prevents mixing of between tenants despite the use of an integrated server, enabling reduced management workloads and provides fewer opportunities for operational mistakes. Management of all departments Setting management ranges for each administrator Operation scope Branch A Setting management ranges for each administrator Operation scope Branch B Company administrator Manager IT asset data Other responsible departments can also be added to the operation scope Branch A administrator Management using a single manager Branch B administrator Sales office administrator Relay servers for providing enhanced scalability Job Management Partner 1/IT Desktop Management Manager enables integrated management using a single manager even in large-scale environments with many management points. However, as the number of management points increases, the load on the network also increases when collecting inventory data and distributing programs and data. In these situations, a relay server can be installed between the manager and agent for distributing the load on the network. This enables reduced traffic between the manager and agent when distributing the same program or data to a large number of agents at the same time. The operation logs for each agent can also be distributed and stored on the relay server which enables browsing the logs without reducing performance. Configuring multiple relay servers in a network segment provides further stability and redundancy, while maintaining centralized control. Changes to the network are easily accomplished by modifying a single definitions file. Even in a large scale environment with many management points, Job Management Partner 1 presents a modest workload for administrators providing efficient system management. Administrator Manager IT asset data Management using a single manager Operation log Operation log Automatic collection of IT assets Relay server Agent Agent Relay server Branch A Branch B 12

In recent years a growing number of data leaks have occurred bringing to the attention a wide range of security and compliance issues. Appropriate measures must be in place to address the risks of important data being taken outside the company, usage of personal PCs for work, virus infections, and more. To help maintain the health and integrity of the company, Job Management Partner 1 supports PC security measures from the four perspectives of control connections, control usage, control dissemination, and monitor activity. Inside company Control connections Company LAN Unauthorized PC PC that violates policy Server Unauthorized software Control usage Cannot run Information leakage Use of authorized software Travel location/remote site Control dissemination Carrying out of internal Information 13

PC security measures from four perspectives Automation Monitoring Control connections - PCs that violate policies and unauthorized PCs are rejected from the network. Control usage - Running of unauthorized software can be blocked. Control dissemination - Copying and printing to removable media is prohibited. Monitor activity - Complete tracking of when, where, who, what, and how operations were performed is possible. Saving of confidential data to personal PC is blocked PCs that violate policy and unauthorized PCs are not allowed to connect to the company LAN Log and warnings Unauthorized software cannot run Monitor activity Operation log list Cannot copy to unauthorized media Operation tracking window Cannot print to an unauthorized 14