landesk software confidential usg isoc billy nelson, landesk sales engineer

16
LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

Upload: julianna-ramsey

Post on 18-Dec-2015

220 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIAL

USG ISOC

Billy Nelson, LANDESK Sales Engineer

Page 2: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK 5 Pillars of Excellence

Inventory Remote Control Workflow Automation Software Distribution Software License Monitoring OS Deployment & Imaging Profile Migration Power Management HP Hardware Management BIOS, TPM, SoftPaq Update, Alerting, Battery Check, Power Manager, Connection Manager, Etc… Executive Dashboarding

Systems Management

Patch Management Windows, Mac, Linux, & 3rd Party Patches Workflow Automation Spyware Prevention/Removal Application Blacklisting Application Whitelisting Ext Device Management Encryption & Blocking Host Intrusion Prevention Antivirus Management Software Firewall Compliance Auditing FISMA, NIST, PCI, Etc… Executive Dashboarding

Security Management

Pink Verified on… ALL 15 ITIL Disciplines Workflow Automation Self Service Service Catalog Incident Management Problem Management Change Management Configuration Management Knowledge Management Service Level Management Password Management Event Management Executive Dashboarding

Service Management Asset ManagementMobile Device Management

Discovery State Management Software License Detection Workflow Automation Vendor Integration Warranty Management Contract Management Request Management Barcoding / RFID Web Console SNMP Device Management Printers, Switches, Etc… Executive Dashboarding

Discovery iOS & Android Support Blackberry Reporting UnManaged Device Blocking Policy Enforcement Policy Verification Device Provisioning Device Wiping Application Advertisement Link Management

Page 3: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Data Protection

Disadvantage:

• Encryption only on system level - no awareness of user or type of data

• Only available for Desktops and Laptops

• System administration significantly impacted

• No separation of system and security administration

• No protection against copy onto external media

Full Disk Encryption

Complete encryption of hard disk, including boot and system files

File & Folder Encryption

Files and Folders specifically selected by the user are encrypted

Disadvantage:

• Security dependent on user behavior

• Temporary application files can leak information

• No central administration or key recovery

• Impossible to enforce or prove compliance

• Data automatically encrypted based on policies

• Encryption awareness of users, groups, systems and data types

• System remains accessible for system administration

• Central Administration for all devices and storage media with automated key escrow for guaranteed recovery

• Automatic detection and enforced protection of external media

LANDesk’s Data-Centric Encryption

Page 4: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Data Protection

BitLocker Management

• Single management platform for all endpoint encryption solutions

• Recovery key management for BitLocker protected systems

• Centralised reporting for compliance & audit

Policy-Based Encryption

• Flexible, easy deployment• Minimal impact to

Operations / Ecosystem• Transparent to end-users• Easily segregate data on

multi-user systems• Fastest recovery• Highest levels of

certification• Dell Data Protection

• LANDesk Data Protection

External Media Protection

• Protects data leaving the system (Most common loss vector)

• No proprietary formatting• Access on UnShielded

(e.g. Home) PC’s, without SW download

• Configurable policies – by user, and by device

• Protects without harming productivity

Policy-Based Encryption

External Media Encryption

BitLocker Management

Page 5: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Anti Virus

Kaspersky AV Robust client LANDesk Antivirus 9.5 is based on Kaspersky Endpoint Security 8. It is

the full Kaspersky Endpoint Security 8 product with the exception of Firewall and Endpoint Control, as these features overlap with existing LANDesk products. It is re-skinned with the LANDesk look and additional integration work has been done in order to take advantage of the capabilities of LANDesk Management Suite.

Page 6: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Anti Virus

Page 7: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Mobility Management

Simplified enrollment with Active Directory and automated certificate provisioning• Enable your device users to download, install and activate device management capabilities.

Zero-touch management • Provide administrator updates without intervention from users.

Jailbreak/rooting detection reporting • Determine if a device is compliant, if action should be taken or policies should be

distributed. Hosted solution

• Reduces cost and management overhead.• Integrates with LANDESK Management Suite for seamless reporting.

Page 8: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Mobility Management

Find my phone and location history Remote lock and wipe Extended hardware and software inventory Configure WiFi Connections BYOD Management Because Bill Moore hates the term

Sneak Peek? Application Wrapping for application remote control….

Page 9: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Patch Manager

OS Patching• Microsoft• Linux• Apple

Application Patching• Browsers• Plugins• Apple • Adobe• Microsoft

Page 10: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Patch Manager

Hardware Vendor Updates• Drivers• SoftPaqs• BIOS

Anti-Virus Software Updates HP BIOS Management Can be fully automated

Page 11: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

What Else?

Application Whitelisting/Blacklisting Real time Inventory and Monitoring External Device Management Software Firewall Security Compliance and Auditing Hardware Independent Imaging Software Distribution

Page 12: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Service Desk

Pink Elephant Verified to be compliant with all 15 ITIL Practices and standards

Change Management (Standard, Major, and Emergency)• Workflows customized according the to the type of change

Incident Reporting• Customized Workflows according to problem type\affected users\systems

Problem Reporting• Customized Workflows according to problem type\affected users\systems• Able to link incidents with problems

Page 13: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Service Desk

Service Catalog• Create menu of available services\applications\hardware• Custom workflows can automate almost any request

Self Help Portal• Enable users to open incident tickets without calling the help desk• Enable users to request software\hardware without calling the help desk

Automated workflows can resolve many requests without having to involve a tech at all• On-Boarding new hires with precision and predictable outcomes

System integration with LANDESK Management Suite (LDMS)• Allow for remote control from LANDESK Service Desk• Allow for opening a service request from LDMS

AD Integration for easy end user and technical staff access and roles management

Page 14: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Data Analytics

Extend the management suite inventory Life cycle state management Incorporate AD Info into device inventory and vice versa Automatically sync devices and warranty information Bring purchase information into the inventory Inventory printers, switches, and routers Automatically bring warranty information into the inventory for printers

Page 15: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

LANDESK Cloud Services Appliance

Inventory devices outside of your network Patch devices in the wild Deploy applications Remote control Transfer files Initiate remote control sessions to unmanaged devices in the wild

Page 16: LANDESK SOFTWARE CONFIDENTIAL USG ISOC Billy Nelson, LANDESK Sales Engineer

LANDESK SOFTWARE CONFIDENTIALLANDESK SOFTWARE CONFIDENTIAL

Stump the CHUMP!

Q&A

Thank you