SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Introduction to Symantec
Endpoint Management
Andrew Blackham
Pre-Sales Specialist
Introduction to Symantec Endpoint Management

1
Common IT challenges
“How do I manage users who
rarely connect to the
corporate network?”

“How do I manage all the new
devices and software coming
into my environment?”

“How can I make sure we
are not over or under
buying software licenses
and are in compliance
with our license
agreements?”

“How do I protect my corporate
assets and network from
vulnerabilities?”

Introduction to Symantec Endpoint Management

2
How does Symantec solve
these challenges?

Introduction to Symantec Endpoint Management

3
Manage anywhere across remote sites and users
Symantec Endpoint Management
IT Realities
• By 2015, over 37% of the
global workforce will be
mobile
• Companies with greater than
2,500 employees operate, on
average, more than 60
locations

Introduction to Symantec Endpoint Management

• Securely manage users anywhere on the
internet and eliminate the need for
dedicated VPN or leased lines

• Easily support and manage distributed
locations regardless of bandwidth
constraints
• Maximize administrator to managed
device ratios

4
Easily manage diverse platforms
Symantec Endpoint Management
IT Realities
• 46% of corporations now issue
Macs to employees
• BYO devices to grow from 65%
in 2013 to 72% in 2017
• Linux market share expected
to double by 2016

Introduction to Symantec Endpoint Management

• Manage all devices from a single
console, with a singular experience
• Broad systems OS Support for
Windows®, Mac®, Linux®, and Unix®
• Native Mac imaging
• Support for VMware® and Hyper-V®
• Broad mobile OS support for
iOS®, Android™, Windows
Mobile®, Blackberry®, webOS™

5
End-to-end software management
Symantec Endpoint Management
IT Realities
• 65% of enterprises were
audited in the past 12 months
• Top vendors to audit
customers include
IBM®, Adobe®, Oracle®, Micro
soft®, and SAP®

• Common data model provides a single
place for purchases/contracts, single
definition of software, single interface for
different users
• Advanced reporting supports financial
costs, departmental expense for
chargeback, alerts on renewal
activities, and trending over time
• Automatic harvesting processes
• Single click application virtualization
• Deploy, update, and run SEP

Introduction to Symantec Endpoint Management

6
Broad patch management
Symantec Endpoint Management
IT Realities
• Only 2 out of the 25 top
vulnerable applications are
Microsoft products
• 5,291 vulnerabilities reported
for 2012
• Top 5 exploited vulnerabilities
are several years old with
patches available

Introduction to Symantec Endpoint Management

• Support for multiple platforms and over
50 non-Microsoft applications –
including all browsers and plug-ins

• Routine analysis and compliance
enforcement of applied patches
• Advanced analytic reporting and metrics
• Automation routines to simplify process
• Integration with Symantec’s endpoint
security, compliance and data loss
solutions

7
Data insight for faster remediation and planning
Symantec Endpoint Management
IT Realities

• Easily access and share business data

• Data exists in multiple
databases

• Measure improvement with key
performance indicators (KPIs)

• Creating reports can be
extremely time consuming

• Analyze trends over time

• Reports are often inaccurate
and quickly out of date
• Managers frequently want
reports at a moment’s notice

Introduction to Symantec Endpoint Management

• Powerful on-the-fly reporting and charts
• Fast remediation with
dynamic, actionable summaries

8
Endpoint Management Customer Jobs

Introduction to Symantec Endpoint Management

9
Symantec Endpoint Management
IT Management Suite
Client Management
•
•
•
•
•
•
•

Server Management
•
•
•
•
•
•
•

Provisioning
Inventory
Software management
Patch management
Application virtualization
Remote management
Reporting and analytics

Asset Management
•
•
•
•
•

Provisioning
Inventory
Software management
Patch management
VM management
Server monitoring
Reporting and analytics

Asset tracking
Barcode scanning
Contract management
Compliance
Reporting and analytics

Complementary Solutions
Mobile Management

Data Loss Prevention

Endpoint Protection

Encryption

Introduction to Symantec Endpoint Management

10
Strong endpoint management global footprint

90 of the
Fortune 100

10 of top 10
Information
Technology
Companies

Introduction to Symantec Endpoint Management

10 of top 10
Healthcare
Companies

8 of top 10
Global Financial
Institutions

11
Analyst & industry accolades
Best Management Suite
Altiris IT Management Suite
November 2012

Symantec Positioned as a Leader in The
Forrester Wave™: Enterprise Client
Management Suites, Q2 2012

“Symantec has made a significant

Application Virtualization
Symantec Workspace Virtualization
January 2013

splash in this Wave, earning a
position as a Leader with longestablished strengths in core and
extended client management

License Management (ITMS)
Software Distribution (DS)
Drive Imaging (Ghost)
January 2013

functionality”
– Forrester, 2012

Source: May 2012 The Forrester Wave™: Enterprise
Client Management Suites, Q2 2012

Introduction to Symantec Endpoint Management

Remote Client Management (CMS)
Patch Management (ITMS)
January 2013

Asset Management (ITMS)
Drive Imaging (CMS)
Overall Migration (CMS)
January 2013

12
Thank You!

Embrace Choice
Andrew Blackham
Introduction to Symantec Endpoint Management

13
Client Management Suite Capabilities
Deployment
Inventory
Software
Management
Patch Management
Workspace
Virtualization
pcAnywhere
Real–Time
Management
Out of Band
Management
IT Analytics
Process Automation
Symantec Endpoint
Protection Integration

Capture and deploy disk images, migrate data and system configurations, and change operating
system settings.
Gather inventory data about computers, users, operating systems, and installed software
applications, and monitor and/or deny the usage of applications.
Distribute software and ensure that the correct software gets installed, remains installed, and
runs without interference from other software.
Assess, prioritize and deploy updates for common operating systems and applications to ensure
that managed computers are protected on an on-going basis.
Virtualize applications to reduce application conflicts, testing requirements and support calls.
Resolve help desk issues or stay productive while you work away from your office by providing
secure, remote access to computers.
View detailed real-time information about a managed computer and remotely perform various
administrative tasks, such as restart a computer, reset a password, and terminate a process.
Discover computers with ASF, DASH, and Intel AMT in your environment and configure the
computers for out-of-band management.
Explore data, analyze trends and track IT performance without advanced knowledge of databases
or third-party reporting tools
Create and implement automated processes that link together people, process and technology,
including the ability to create end-users forms and communicate between disparate technologies
Inventory client systems for common endpoint protection products, migrate and rollout Symantec
Endpoint Protection agents, troubleshoot agent problems and report on status and outbreaks.

Introduction to Symantec Endpoint Management

14
Asset Management Suite Capabilities
Asset Management

Lets you track and manage the physical, contractual and financial data associated with the IT assets in your
environment.

Configuration
Management Database
Solution (CMDB)

Lets you model configuration items, resources, and the relationships between them in a single central
database.

Barcode

Leverage barcode scanners for a more accurate way of gathering and verifying asset information in the field.

Process Automation

Lets you create and implement automated processes that link together people, process and technology,
including the ability to create end-user forms and communicate between disparate technologies.

IT Analytics Solution

Lets you explore data, analyze trends and track IT performance without advanced knowledge of databases
or third-party reporting tools.

Data Connector

Lets you transfer data between external data sources and the configuration management database (CMDB).

Introduction to Symantec Endpoint Management

15
Server Management Suite Capabilities
Deployment

Improve the consistency and quality of server configurations. It delivers the comprehensive deployment
capabilities that include image-based or scripted operating system installation and ongoing provisioning.

Inventory

Identify the devices that are found in your network, and aggregates inventory data across all of your
Windows, UNIX, and Linux assets.

Virtual Machine
Management

View virtual resources across Hyper-V and VMware platforms, and perform virtual machine specific tasks
such as creating virtual machines, modifying settings and changing the power state of a virtual machine.

Software Management

Distribute software and ensure that the correct software gets installed, remains installed, and runs
without interference from other software.

Patch Management

Assess, prioritize and deploy updates for common operating systems and applications to ensure that
managed computers are protected on an on-going basis.

Monitor

Proactively monitor the critical components of your network. You can increase the network uptime with
the self-healing remediation tasks that are configured before the critical events occur.

Real–Time
Management

Manage a single server in real time. View detailed real-time information and remotely perform various
administrative tasks, such as restart a computer, reset a password, terminate a process, and more.

IT Analytics

Explore data, analyze trends and track IT performance without advanced knowledge of databases or thirdparty reporting tools

Process Automation

Create and implement automated processes that link together people, process and technology, including
the ability to create end-users forms and communicate between disparate technologies

Introduction to Symantec Endpoint Management

16
Server Management Suite Provisioning Capabilities
Feature

Description

OS Install

Imaging, scripting, or a combination of the two, bare-metal, re-imaging

Configuration

BIOS, RAID, user/network settings, drives, services, location

Jobs, Tasks

Out of the box, sample, and custom jobs

Scripts, Tokens

Task sequencing, decision logic, standard and custom tokens, event chaining

PXE

Zero-touch provisioning / management, bare-metal deployment

HW OEM Integration

HP, Dell, IBM, FSC, SUN specific jobs, installation, drivers, white papers

Blade Rack/Enclosure

Physical mapping, rip-&-replace logic (re-provisioning)

Virtualization

VM imaging, VMware jobs, Virtual Center integration, ESX scripted install

iLO, DRAC, WOL

Remote management, In-Band and Out-of-Band

Packaging

Application and configuration packaging

Multicast

Distributed multicast for imaging, network layout agnostic

Console

Central console, security roles, drag and drop, wizards

Multiple OS

Production: Windows, Linux, Mac, Solaris; Pre-OS: WinPE, Linux, DOS

API

C#, Web Services, COM, and CLI API sets for customization and extensibility

Introduction to Symantec Endpoint Management

17

Weitere ähnliche Inhalte

Was ist angesagt?

Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlSymantec
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...Symantec
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsAlienVault
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationQualys
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideAlienVault
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
 
SPS Enterprise Family
SPS Enterprise FamilySPS Enterprise Family
SPS Enterprise FamilySymantec
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Can Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster successCan Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster successSymantec
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 

Was ist angesagt? (20)

Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
A Symantec Advisory Guide Migrating to Symantec™ Validation and ID Protection...
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
Avoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediationAvoid Meltdown from the Spectre - How to measure impact and track remediation
Avoid Meltdown from the Spectre - How to measure impact and track remediation
 
Open Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's GuideOpen Source IDS Tools: A Beginner's Guide
Open Source IDS Tools: A Beginner's Guide
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
SPS Enterprise Family
SPS Enterprise FamilySPS Enterprise Family
SPS Enterprise Family
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Can Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster successCan Symantec reboot its own blockbuster success
Can Symantec reboot its own blockbuster success
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 

Andere mochten auch

Symantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product PositioningSymantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product PositioningSalesChannel International
 
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec
 
Symantec Next Generation Network Protection
Symantec Next Generation Network ProtectionSymantec Next Generation Network Protection
Symantec Next Generation Network ProtectionSymantec
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionSymantec
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365Symantec
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own DeviceMicrosoft
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017InvestorSymantec
 
This is the Microsoft Cloud
This is the Microsoft CloudThis is the Microsoft Cloud
This is the Microsoft CloudMicrosoft
 

Andere mochten auch (8)

Symantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product PositioningSymantec Endpoint Protection - Product Positioning
Symantec Endpoint Protection - Product Positioning
 
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's GuideSymantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
 
Symantec Next Generation Network Protection
Symantec Next Generation Network ProtectionSymantec Next Generation Network Protection
Symantec Next Generation Network Protection
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
 
Bring Your Own Device
Bring Your Own DeviceBring Your Own Device
Bring Your Own Device
 
Symantec investor presentation february 2017
Symantec investor presentation february 2017Symantec investor presentation february 2017
Symantec investor presentation february 2017
 
This is the Microsoft Cloud
This is the Microsoft CloudThis is the Microsoft Cloud
This is the Microsoft Cloud
 

Ähnlich wie Introduction to Symantec Endpoint Management75.pptx

Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
Tools of noc
Tools of nocTools of noc
Tools of nocmunawarul
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringAmit Gatenyo
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaSftculotta27
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits Parallels Inc
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits Parallels Inc
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendorsapprize360
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesAmit Gatenyo
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilitiesshaun_raghavan
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device ManagementIBM Danmark
 
Software Developement Services in Mumbai
Software Developement Services in MumbaiSoftware Developement Services in Mumbai
Software Developement Services in Mumbaiolatechsolutionsltd
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isvPandu W Sastrowardoyo
 
A Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareA Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareDevLabs Global
 
Web & Mobile Application Development Company
Web & Mobile Application Development CompanyWeb & Mobile Application Development Company
Web & Mobile Application Development CompanySMACSoftwaresGmbH
 

Ähnlich wie Introduction to Symantec Endpoint Management75.pptx (20)

Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Tools of noc
Tools of nocTools of noc
Tools of noc
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
Enterprise Management with Microsoft Technologies
Enterprise Management with Microsoft TechnologiesEnterprise Management with Microsoft Technologies
Enterprise Management with Microsoft Technologies
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 
Accel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure CapabilitiesAccel Frontline Remote Infrastructure Capabilities
Accel Frontline Remote Infrastructure Capabilities
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 
Software Developement Services in Mumbai
Software Developement Services in MumbaiSoftware Developement Services in Mumbai
Software Developement Services in Mumbai
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Indonesia new default short msp client presentation partnership with isv
Indonesia new default short msp client presentation   partnership with isvIndonesia new default short msp client presentation   partnership with isv
Indonesia new default short msp client presentation partnership with isv
 
A Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring SoftwareA Comprehensive Guide to Choosing the Best Network Monitoring Software
A Comprehensive Guide to Choosing the Best Network Monitoring Software
 
Web & Mobile Application Development Company
Web & Mobile Application Development CompanyWeb & Mobile Application Development Company
Web & Mobile Application Development Company
 

Mehr von Arrow ECS UK

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.Arrow ECS UK
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow ECS UK
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow ECS UK
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class LinkArrow ECS UK
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS UK
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internetArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow ECS UK
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow ECS UK
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow ECS UK
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow ECS UK
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMArrow ECS UK
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow ECS UK
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewArrow ECS UK
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Arrow ECS UK
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateArrow ECS UK
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the CompetitionArrow ECS UK
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersArrow ECS UK
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelArrow ECS UK
 

Mehr von Arrow ECS UK (20)

Grow your future with leasing.
Grow your future with leasing.Grow your future with leasing.
Grow your future with leasing.
 
Arrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education PartnerArrow are No.1 Juniper Networks Authorised Education Partner
Arrow are No.1 Juniper Networks Authorised Education Partner
 
Arrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training CentreArrow are No.1 Check Point Training Centre
Arrow are No.1 Check Point Training Centre
 
Arrow Live Class Link
Arrow Live Class LinkArrow Live Class Link
Arrow Live Class Link
 
Arrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business PartnersArrow ECS Social Media for Business Partners
Arrow ECS Social Media for Business Partners
 
2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet2014 ofcom communications_market_report_internet
2014 ofcom communications_market_report_internet
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald PresentationArrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
Arrow IBM MSP & ISV Jam - Jonathan MacDonald Presentation
 
Arrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart SimmonsArrow IBM MSP & ISV Jam - Stuart Simmons
Arrow IBM MSP & ISV Jam - Stuart Simmons
 
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonaldArrow IBM MSP & ISV Jam - Jonathan MacDonald
Arrow IBM MSP & ISV Jam - Jonathan MacDonald
 
Arrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian FrenchArrow IBM MSP & ISV Jam - Ian French
Arrow IBM MSP & ISV Jam - Ian French
 
Arrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David FearneArrow IBM MSP & ISV Jam - David Fearne
Arrow IBM MSP & ISV Jam - David Fearne
 
Arrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete StoryArrow IBM MSP & ISV Jam - The Complete Story
Arrow IBM MSP & ISV Jam - The Complete Story
 
Helping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBMHelping Innovators to Innovate, Arrow ECS and IBM
Helping Innovators to Innovate, Arrow ECS and IBM
 
Arrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV JamArrow and IBM, MSP & ISV Jam
Arrow and IBM, MSP & ISV Jam
 
IBM Business Analytics Marketing Overview
IBM Business Analytics Marketing OverviewIBM Business Analytics Marketing Overview
IBM Business Analytics Marketing Overview
 
Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...Gain maximum benefit from Channel Technical Professionals and the technical p...
Gain maximum benefit from Channel Technical Professionals and the technical p...
 
IBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan templateIBM - Full year Go-to-market plan template
IBM - Full year Go-to-market plan template
 
How to Win against the Competition
How to Win against the CompetitionHow to Win against the Competition
How to Win against the Competition
 
Align IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business PartnersAlign IBM with your business for IBM Business Partners
Align IBM with your business for IBM Business Partners
 
Working with the IBM Business Analytics Channel
Working with the IBM Business Analytics ChannelWorking with the IBM Business Analytics Channel
Working with the IBM Business Analytics Channel
 

Introduction to Symantec Endpoint Management75.pptx

  • 1. Introduction to Symantec Endpoint Management Andrew Blackham Pre-Sales Specialist Introduction to Symantec Endpoint Management 1
  • 2. Common IT challenges “How do I manage users who rarely connect to the corporate network?” “How do I manage all the new devices and software coming into my environment?” “How can I make sure we are not over or under buying software licenses and are in compliance with our license agreements?” “How do I protect my corporate assets and network from vulnerabilities?” Introduction to Symantec Endpoint Management 2
  • 3. How does Symantec solve these challenges? Introduction to Symantec Endpoint Management 3
  • 4. Manage anywhere across remote sites and users Symantec Endpoint Management IT Realities • By 2015, over 37% of the global workforce will be mobile • Companies with greater than 2,500 employees operate, on average, more than 60 locations Introduction to Symantec Endpoint Management • Securely manage users anywhere on the internet and eliminate the need for dedicated VPN or leased lines • Easily support and manage distributed locations regardless of bandwidth constraints • Maximize administrator to managed device ratios 4
  • 5. Easily manage diverse platforms Symantec Endpoint Management IT Realities • 46% of corporations now issue Macs to employees • BYO devices to grow from 65% in 2013 to 72% in 2017 • Linux market share expected to double by 2016 Introduction to Symantec Endpoint Management • Manage all devices from a single console, with a singular experience • Broad systems OS Support for Windows®, Mac®, Linux®, and Unix® • Native Mac imaging • Support for VMware® and Hyper-V® • Broad mobile OS support for iOS®, Android™, Windows Mobile®, Blackberry®, webOS™ 5
  • 6. End-to-end software management Symantec Endpoint Management IT Realities • 65% of enterprises were audited in the past 12 months • Top vendors to audit customers include IBM®, Adobe®, Oracle®, Micro soft®, and SAP® • Common data model provides a single place for purchases/contracts, single definition of software, single interface for different users • Advanced reporting supports financial costs, departmental expense for chargeback, alerts on renewal activities, and trending over time • Automatic harvesting processes • Single click application virtualization • Deploy, update, and run SEP Introduction to Symantec Endpoint Management 6
  • 7. Broad patch management Symantec Endpoint Management IT Realities • Only 2 out of the 25 top vulnerable applications are Microsoft products • 5,291 vulnerabilities reported for 2012 • Top 5 exploited vulnerabilities are several years old with patches available Introduction to Symantec Endpoint Management • Support for multiple platforms and over 50 non-Microsoft applications – including all browsers and plug-ins • Routine analysis and compliance enforcement of applied patches • Advanced analytic reporting and metrics • Automation routines to simplify process • Integration with Symantec’s endpoint security, compliance and data loss solutions 7
  • 8. Data insight for faster remediation and planning Symantec Endpoint Management IT Realities • Easily access and share business data • Data exists in multiple databases • Measure improvement with key performance indicators (KPIs) • Creating reports can be extremely time consuming • Analyze trends over time • Reports are often inaccurate and quickly out of date • Managers frequently want reports at a moment’s notice Introduction to Symantec Endpoint Management • Powerful on-the-fly reporting and charts • Fast remediation with dynamic, actionable summaries 8
  • 9. Endpoint Management Customer Jobs Introduction to Symantec Endpoint Management 9
  • 10. Symantec Endpoint Management IT Management Suite Client Management • • • • • • • Server Management • • • • • • • Provisioning Inventory Software management Patch management Application virtualization Remote management Reporting and analytics Asset Management • • • • • Provisioning Inventory Software management Patch management VM management Server monitoring Reporting and analytics Asset tracking Barcode scanning Contract management Compliance Reporting and analytics Complementary Solutions Mobile Management Data Loss Prevention Endpoint Protection Encryption Introduction to Symantec Endpoint Management 10
  • 11. Strong endpoint management global footprint 90 of the Fortune 100 10 of top 10 Information Technology Companies Introduction to Symantec Endpoint Management 10 of top 10 Healthcare Companies 8 of top 10 Global Financial Institutions 11
  • 12. Analyst & industry accolades Best Management Suite Altiris IT Management Suite November 2012 Symantec Positioned as a Leader in The Forrester Wave™: Enterprise Client Management Suites, Q2 2012 “Symantec has made a significant Application Virtualization Symantec Workspace Virtualization January 2013 splash in this Wave, earning a position as a Leader with longestablished strengths in core and extended client management License Management (ITMS) Software Distribution (DS) Drive Imaging (Ghost) January 2013 functionality” – Forrester, 2012 Source: May 2012 The Forrester Wave™: Enterprise Client Management Suites, Q2 2012 Introduction to Symantec Endpoint Management Remote Client Management (CMS) Patch Management (ITMS) January 2013 Asset Management (ITMS) Drive Imaging (CMS) Overall Migration (CMS) January 2013 12
  • 13. Thank You! Embrace Choice Andrew Blackham Introduction to Symantec Endpoint Management 13
  • 14. Client Management Suite Capabilities Deployment Inventory Software Management Patch Management Workspace Virtualization pcAnywhere Real–Time Management Out of Band Management IT Analytics Process Automation Symantec Endpoint Protection Integration Capture and deploy disk images, migrate data and system configurations, and change operating system settings. Gather inventory data about computers, users, operating systems, and installed software applications, and monitor and/or deny the usage of applications. Distribute software and ensure that the correct software gets installed, remains installed, and runs without interference from other software. Assess, prioritize and deploy updates for common operating systems and applications to ensure that managed computers are protected on an on-going basis. Virtualize applications to reduce application conflicts, testing requirements and support calls. Resolve help desk issues or stay productive while you work away from your office by providing secure, remote access to computers. View detailed real-time information about a managed computer and remotely perform various administrative tasks, such as restart a computer, reset a password, and terminate a process. Discover computers with ASF, DASH, and Intel AMT in your environment and configure the computers for out-of-band management. Explore data, analyze trends and track IT performance without advanced knowledge of databases or third-party reporting tools Create and implement automated processes that link together people, process and technology, including the ability to create end-users forms and communicate between disparate technologies Inventory client systems for common endpoint protection products, migrate and rollout Symantec Endpoint Protection agents, troubleshoot agent problems and report on status and outbreaks. Introduction to Symantec Endpoint Management 14
  • 15. Asset Management Suite Capabilities Asset Management Lets you track and manage the physical, contractual and financial data associated with the IT assets in your environment. Configuration Management Database Solution (CMDB) Lets you model configuration items, resources, and the relationships between them in a single central database. Barcode Leverage barcode scanners for a more accurate way of gathering and verifying asset information in the field. Process Automation Lets you create and implement automated processes that link together people, process and technology, including the ability to create end-user forms and communicate between disparate technologies. IT Analytics Solution Lets you explore data, analyze trends and track IT performance without advanced knowledge of databases or third-party reporting tools. Data Connector Lets you transfer data between external data sources and the configuration management database (CMDB). Introduction to Symantec Endpoint Management 15
  • 16. Server Management Suite Capabilities Deployment Improve the consistency and quality of server configurations. It delivers the comprehensive deployment capabilities that include image-based or scripted operating system installation and ongoing provisioning. Inventory Identify the devices that are found in your network, and aggregates inventory data across all of your Windows, UNIX, and Linux assets. Virtual Machine Management View virtual resources across Hyper-V and VMware platforms, and perform virtual machine specific tasks such as creating virtual machines, modifying settings and changing the power state of a virtual machine. Software Management Distribute software and ensure that the correct software gets installed, remains installed, and runs without interference from other software. Patch Management Assess, prioritize and deploy updates for common operating systems and applications to ensure that managed computers are protected on an on-going basis. Monitor Proactively monitor the critical components of your network. You can increase the network uptime with the self-healing remediation tasks that are configured before the critical events occur. Real–Time Management Manage a single server in real time. View detailed real-time information and remotely perform various administrative tasks, such as restart a computer, reset a password, terminate a process, and more. IT Analytics Explore data, analyze trends and track IT performance without advanced knowledge of databases or thirdparty reporting tools Process Automation Create and implement automated processes that link together people, process and technology, including the ability to create end-users forms and communicate between disparate technologies Introduction to Symantec Endpoint Management 16
  • 17. Server Management Suite Provisioning Capabilities Feature Description OS Install Imaging, scripting, or a combination of the two, bare-metal, re-imaging Configuration BIOS, RAID, user/network settings, drives, services, location Jobs, Tasks Out of the box, sample, and custom jobs Scripts, Tokens Task sequencing, decision logic, standard and custom tokens, event chaining PXE Zero-touch provisioning / management, bare-metal deployment HW OEM Integration HP, Dell, IBM, FSC, SUN specific jobs, installation, drivers, white papers Blade Rack/Enclosure Physical mapping, rip-&-replace logic (re-provisioning) Virtualization VM imaging, VMware jobs, Virtual Center integration, ESX scripted install iLO, DRAC, WOL Remote management, In-Band and Out-of-Band Packaging Application and configuration packaging Multicast Distributed multicast for imaging, network layout agnostic Console Central console, security roles, drag and drop, wizards Multiple OS Production: Windows, Linux, Mac, Solaris; Pre-OS: WinPE, Linux, DOS API C#, Web Services, COM, and CLI API sets for customization and extensibility Introduction to Symantec Endpoint Management 17

Hinweis der Redaktion

  1. ReferencesWorldwide Mobile Worker Population 2011–2015 Forecast, IDC Research, December 2011 US Census Bureau, Economic Census 2007Cloud Enabled Management (CEM) will help with the management of remote and disconnected users, as well as branch office scenarios. The goal of the feature is to allow admins to manage endpoints over Internet even if the management servers (SMP and site servers) are not accessible directly. CEM does not require you to expose your management servers directly to the internet nor does it require the use of a VPN . As long as your users have internet connectivity, you can mange them.CEM was specifically designed with tight security considerations in mind. The goal was to make a very secure solution that would not put the SMP server and site servers at risk even if the pieces sitting in the DMZ of organization get attacked or, in the worst case, taken over. By placing a management gateway in the DMZ multiple computers or sites can communicate securely over the internet back to a Symantec management server secured inside the corporate firewall. This provides flexibility and cost savings for customers as it removes the need for leased lines or dedicated VPN networks. CEM places an Internet Gateway (IG) in the DMZ to facilitate client server communications. Each agent is issued a certificate that the IG can use to validate communications from authorized devices. Once a device has been authenticated, the gateway acts as a communications broker between the agent, the SMP, and PS’s. Only authenticated (authorized) connections are allowed to communicate to the NS. If a client is trusted (i.e. it has a valid and recognized certificate), the Internet Gateway routes the connection to the server on the internal network as requested by the client. A single Internet Gateway can serve Agents reporting to any number of SMP servers. The Certification Authority from each SMP server needs to be made available to the Internet Gateway for this to work. In cases where there are agents reporting to multiple notification servers (e.g. A Managed Server provider who has separate notification servers for each of their clients), the Internet Gateway is intelligent enough to be able to route communications to the appropriate notification server.Also in 7.5 is an iOS app that can be run from the admins Apple iPad. The ITMS Admin provides quick connectivity to a scaled down console with lightening fast response times. This enables IT admins to quickly see summary group data as well as device specific data that conveys the status of devices within the scope of the IT admin’s environment. Information such as Patch compliance, status of software delivery jobs, and status of AV/malware protection of endpoints is quick and simple using the ITMS Admin app.
  2. Referenceshttp://blogs.wsj.com/cio/2012/04/03/macs-invade-the-enterprise/46% of corporations now issue Macs to employeesForrester’s new report, titled “Apple Infiltrates The Enterprise And Reshapes The Markets For Personal Devices At Work” surveyed more than 3,300 IT professionals in North America and Western Europe and found that 46 percent of enterprises were issuing Macs to employees. Those employees receiving Macs tend to be “senior in rank, higher paid, younger, and in emerging markets,” and managers are much more likely to have Apple products than regular employees. Notably, only 36 percent of small businesses reported issuing Macs in 2011, and that number is stagnant from 2010.Additionally, with enterprises’ growing acceptance of bring your own device (BYOD), there is an increase in consumer-owned devices in the computing world. Gartner forecasts that computing devices bought by consumers will grow from 65 percent in 2013 to 72 percent in 2017. This signifies the growing importance of designing for the consumer inside the enterprise.In an interview with Computerworld, Gartner analyst Carolina Milanesi says a major OS shift is coming. By 2015, she predicts, devices running Apple operating systems will overtake those running Windows. Last year, shipments of products running Windows still handily outnumbered those running Mac OS and iOS, by 347 million to 213 million, according to figures from Gartner published Monday. The lead will be slashed to 23 million in 2014, and the Apple OSes will likely outnumber Windows devices in 2015, said Carolina Milanesi, research vice president at Gartner.Symantec provides full featured support for Windows, Mac, Linux, UNIX and virtual platforms, and integration with our mobile management solutions to ensure consistent support for tablets and smartphones. We understand that systems management is undergoing a evolution with architectural options and end user dynamics and we are aggressively helping customers adjust to an era of user empowerment using the tools and applications they need to be productive.Symantec treats all platforms equally and aggressively supports new OS versions as they are released.
  3. ReferencesSoftware Vendor Auditing Trends: What to Watch for and How to Respond, Gartner Research, May 2012The Software Vendors That Are Auditing Now and What to Do About It, Gartner Research, January 2012Symantec helps organizations manage their systems more effectively and save time and money by eliminating unnecessary purchases and wasted resources. By leveraging an integrated Software Management framework, IT can break down communication barriers and tie together all functions from delivery, metering, contract management, and license harvesting. A Forrester research study found that Symantec customers save millions through penalty avoidance savings from software vendor’s audits, avoiding over-licensing of software, and automating the auditing of physical assets. As a result, Symantec enables executive leadership to permanently control software spend by making software asset management efficient and accurate.Symantec can help in the following situations:Reaction from a true-up. Executives mandated to control software spend. Account for legacy software by discovering and populating a database.Prepare for true-up. Discover excess software before paying for it.Invoke the five basic tenets of software reclaim: 1. Inventory licenses, 2. Match installed against purchases, 3. Measure actual usage, 4. Determine license entitlements, 5.Make reclaim decisions.Implement application streaming to treat desktop licenses as though they were concurrent, thereby proactively solving the problem for all future software.
  4. ReferencesSymantec Internet Threat Security Report, Volume 18http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_appendices_v18_2012_221284438.en-us.pdfSymantec is first and foremost a security company and the reason our endpoint security and management products work together is to ensure a well-managed endpoint is a secure endpoint. Symantec’s smarter patch management also helps you focus your time and energy on verifying the patches that present the most risk to your organization with a predefine patch verification and rollout process with a full audit trail for accountability. We help organizations follow six best practices for patch management:Automate your patching and include third party apps – We patch Windows, OS X and Linux and over 50 third party applications and help to create rules that automatically patch systems and applications without constant oversight. In-depth reporting and routine audits – With advanced analytics you can see the state of your patch management at any point in time and know exactly which systems are in need of attention.Testing and rollback – We can help you stage the rollout to your patches and we can leverage our industry leading backup tools in case need to roll them back. Maintenance windows – No one wants downtime, but avoiding patch rollouts can lead to just that if you don’t make time for patching. We can help ensure that every system has a monthly maintenance window, and provide an allowance for emergency patches for zero-day issues.Require all new systems be fully patched – We can help you ensure that any new system is full patched before it gets to production. Vulnerability scans and intelligence - It may not sound like it's a part of patch management, but it will help you find new systems that need patching, and others that fall out of compliance. Using Symantec’s control compliance capabilities and security intelligence you can make more proactive decisions and stay on top of what truly matters.
  5. IT reporting.  We've all seen the mess. Data from one system trying to combine with data from another system.  Employees running around working to get reports ready for the weekly or monthly meetings. Symantec can help you start to simplify IT reporting.1.  Only report data that drives decisions. Using our robust it analytics you can select the right information at the right time based on up to date information in a single database. 2.  Automate – Leverage the answers to drive decisions and take actions as well as track key indicators.Where can I build in my process a check point, a control point, some place, log, event where a bit gets flipped that can be  tracked automatically.3.  Skip the Middle Man - Don’t have people pass on data that is not important to them unless they are the only source of that data.    Have the data all go directly to the point where it is valuable.    This minimizes the data points that a given person in the chain has to report. We can aggregate data across multiple management systems to provide you with a consolidated view. 4.  Do Just the Right Amount of Work - Remember that one size does NOT fit all.  With that in mind, when tackling a new report recipient, ask what information would help make decisions for which that team is responsible and report only that information.  Quickly and efficiently build ad-hoc reports based on future requests.
  6. This slide helps illustrate the comprehensiveness of the customer jobs addressed by Symantec Endpoint Management solutions and how the User is at the center of everything we do.
  7. Use this slide to reinforce our install base. This is a counterpart to the Microsoft argument. You can also pull out the recent Gartner quote “Microsoft System Center 2012 Configuration Manager holds between 50% and 60% of the client management tool market; however, we have found that successful adoption of the product is lower than this.” We have strong success in IT, pharma and across finance – banks, insurance, etc.
  8. Illustrate our strengths in the recent analyst reports. Gartner Magic ™ Quadrant for Client Management Tools Terrence CosgroveClient Management Suite (CMS) is one of the most complete and comprehensive client management products in the market.Symantec remained one of the most frequently considered vendors in 2011. It scored well on the Visionaries scale because it is investing in product capabilities that will help organizations manage an increasingly diverse set of applications and devices.The Forrester Wave™: Enterprise Client Management Suites, Q2 2012 David K. JohnsonSymantec has made a significant splash in this Wave, earning a position as a Leader with long-established strengths in core and extended client management functionality — particularly OS management, software management, and patch. Symantec delivers well-integrated mobile device management capabilities and essential Mac support.Reinforce our core strengths in deployment and patch through recent awards.