landesk software confidential usg isoc billy nelson, landesk sales engineer
TRANSCRIPT
LANDESK SOFTWARE CONFIDENTIAL
USG ISOC
Billy Nelson, LANDESK Sales Engineer
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK 5 Pillars of Excellence
Inventory Remote Control Workflow Automation Software Distribution Software License Monitoring OS Deployment & Imaging Profile Migration Power Management HP Hardware Management BIOS, TPM, SoftPaq Update, Alerting, Battery Check, Power Manager, Connection Manager, Etc… Executive Dashboarding
Systems Management
Patch Management Windows, Mac, Linux, & 3rd Party Patches Workflow Automation Spyware Prevention/Removal Application Blacklisting Application Whitelisting Ext Device Management Encryption & Blocking Host Intrusion Prevention Antivirus Management Software Firewall Compliance Auditing FISMA, NIST, PCI, Etc… Executive Dashboarding
Security Management
Pink Verified on… ALL 15 ITIL Disciplines Workflow Automation Self Service Service Catalog Incident Management Problem Management Change Management Configuration Management Knowledge Management Service Level Management Password Management Event Management Executive Dashboarding
Service Management Asset ManagementMobile Device Management
Discovery State Management Software License Detection Workflow Automation Vendor Integration Warranty Management Contract Management Request Management Barcoding / RFID Web Console SNMP Device Management Printers, Switches, Etc… Executive Dashboarding
Discovery iOS & Android Support Blackberry Reporting UnManaged Device Blocking Policy Enforcement Policy Verification Device Provisioning Device Wiping Application Advertisement Link Management
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Data Protection
Disadvantage:
• Encryption only on system level - no awareness of user or type of data
• Only available for Desktops and Laptops
• System administration significantly impacted
• No separation of system and security administration
• No protection against copy onto external media
Full Disk Encryption
Complete encryption of hard disk, including boot and system files
File & Folder Encryption
Files and Folders specifically selected by the user are encrypted
Disadvantage:
• Security dependent on user behavior
• Temporary application files can leak information
• No central administration or key recovery
• Impossible to enforce or prove compliance
• Data automatically encrypted based on policies
• Encryption awareness of users, groups, systems and data types
• System remains accessible for system administration
• Central Administration for all devices and storage media with automated key escrow for guaranteed recovery
• Automatic detection and enforced protection of external media
LANDesk’s Data-Centric Encryption
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Data Protection
BitLocker Management
• Single management platform for all endpoint encryption solutions
• Recovery key management for BitLocker protected systems
• Centralised reporting for compliance & audit
Policy-Based Encryption
• Flexible, easy deployment• Minimal impact to
Operations / Ecosystem• Transparent to end-users• Easily segregate data on
multi-user systems• Fastest recovery• Highest levels of
certification• Dell Data Protection
• LANDesk Data Protection
External Media Protection
• Protects data leaving the system (Most common loss vector)
• No proprietary formatting• Access on UnShielded
(e.g. Home) PC’s, without SW download
• Configurable policies – by user, and by device
• Protects without harming productivity
Policy-Based Encryption
External Media Encryption
BitLocker Management
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Anti Virus
Kaspersky AV Robust client LANDesk Antivirus 9.5 is based on Kaspersky Endpoint Security 8. It is
the full Kaspersky Endpoint Security 8 product with the exception of Firewall and Endpoint Control, as these features overlap with existing LANDesk products. It is re-skinned with the LANDesk look and additional integration work has been done in order to take advantage of the capabilities of LANDesk Management Suite.
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Anti Virus
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Mobility Management
Simplified enrollment with Active Directory and automated certificate provisioning• Enable your device users to download, install and activate device management capabilities.
Zero-touch management • Provide administrator updates without intervention from users.
Jailbreak/rooting detection reporting • Determine if a device is compliant, if action should be taken or policies should be
distributed. Hosted solution
• Reduces cost and management overhead.• Integrates with LANDESK Management Suite for seamless reporting.
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Mobility Management
Find my phone and location history Remote lock and wipe Extended hardware and software inventory Configure WiFi Connections BYOD Management Because Bill Moore hates the term
Sneak Peek? Application Wrapping for application remote control….
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Patch Manager
OS Patching• Microsoft• Linux• Apple
Application Patching• Browsers• Plugins• Apple • Adobe• Microsoft
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Patch Manager
Hardware Vendor Updates• Drivers• SoftPaqs• BIOS
Anti-Virus Software Updates HP BIOS Management Can be fully automated
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
What Else?
Application Whitelisting/Blacklisting Real time Inventory and Monitoring External Device Management Software Firewall Security Compliance and Auditing Hardware Independent Imaging Software Distribution
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Service Desk
Pink Elephant Verified to be compliant with all 15 ITIL Practices and standards
Change Management (Standard, Major, and Emergency)• Workflows customized according the to the type of change
Incident Reporting• Customized Workflows according to problem type\affected users\systems
Problem Reporting• Customized Workflows according to problem type\affected users\systems• Able to link incidents with problems
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Service Desk
Service Catalog• Create menu of available services\applications\hardware• Custom workflows can automate almost any request
Self Help Portal• Enable users to open incident tickets without calling the help desk• Enable users to request software\hardware without calling the help desk
Automated workflows can resolve many requests without having to involve a tech at all• On-Boarding new hires with precision and predictable outcomes
System integration with LANDESK Management Suite (LDMS)• Allow for remote control from LANDESK Service Desk• Allow for opening a service request from LDMS
AD Integration for easy end user and technical staff access and roles management
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Data Analytics
Extend the management suite inventory Life cycle state management Incorporate AD Info into device inventory and vice versa Automatically sync devices and warranty information Bring purchase information into the inventory Inventory printers, switches, and routers Automatically bring warranty information into the inventory for printers
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
LANDESK Cloud Services Appliance
Inventory devices outside of your network Patch devices in the wild Deploy applications Remote control Transfer files Initiate remote control sessions to unmanaged devices in the wild
LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL
Stump the CHUMP!
Q&A
Thank you