SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Copyright © 2023 HCL Software Limited
HCL BigFix
The Endpoint
Management Platform
2
Endpoint Security is a Universal Challenge
In 2023, there are
about 3.5 million
unfulfilled
cybersecurity jobs
Skills
shortage
Regulatory fines
can cost millions
for large global
brands
Compliance
mandates
Nearly 1/3 of all
detected
vulnerabilities
remain
unremediated
after a year
Long remediation
times
A typical
organization
uses 14 endpoint
management tools
Too many tools
And agents
No consolidated
single manage-
ment view of all
endpoints
increases security
risk
Lack of
visibility
Endpoint Security
is essential, but
challenging
“things” to secure personal data records stolen lost to cybercrime
3
Top Reasons Customers Buy BigFix
Consolidate tools for reduced
cost, complexity and risk
Accelerate Zero Trust and
other security initiatives
Keep all endpoints
continuously patched and
compliant
Remediate vulnerabilities
faster to maintain business
continuity
Reduce annual software costs
while fostering use of current,
most secure, software versions
Securely Manage
“Work From Anywhere”
Initiatives
Industry’s Broadest Array of Automation
and Out-Of-The Box Content
4
The Economic Impact of BigFix
Addressing endpoint management challenges drives tangible value
No consolidated single
Management view of
all endpoints increases
security risk
Lack of
visibility
In 2023, there are about
3.5 million unfulfilled
cybersecurity jobs
Skills
shortage
Regulatory fines can
cost millions for large
global brands
Compliance
mandates
Nearly 1/3 of all
detected vulnerabilities
remain unremediated
after a year
Long remediation
times
A typical organization
uses 14 endpoint
management tools
Too many tools
And agents
Endpoint
Management
Challenges
BigFix delivers
Economic Impact
One skillset leveraged
across all OS platforms
and device types
Simplified staffing,
fewer specialists
Reduced staffing
costs
Eliminates configuration
drift, remediation effort,
and noncompliance
fines
Continuous
compliance
enforcement
Fewer fines for
noncompliance
Prioritize and speed
vulnerability remediation
across the fleet of
endpoints
Fast remediation of
vulnerabilities
Reduce security risk
A single endpoint
management solution
reduces tool sprawl
and IT complexity
Single agent and
platform
Reduced IT spend
A unified view simplifies
management and
control and reduces
risk
Consolidated view
of all endpoints
Improve visibility
and control
Internet/Firewall Connected
Corporate/Remote Offices/
ATM/PoS/Desktops etc.
Real-time visibility, scalability, and ease of use
Lightweight infrastructure
• Use existing systems as relays
• Built-in redundancy
• Support / secure roaming endpoints
• Single Port (52311)
• API Servers for extension to Cloud and
Mobile
Cloud-based content delivery
• Highly extensible
• Automatic, on-demand
functionality
• 500K+ Published Fixlets.
• New content added daily + community.
(BigFix.me)
• To BigFix Server Only!
Single server and console
• Highly secure
and scalable
• Aggregates data,
analyzes and reports
• Pushes out pre-defined / custom
policies
• Can be on WAN or Cloud
Flexible policy language (Fixlets)
• Thousands of out-of-the-box policies
• Best practices for operations and security
• Simple custom policy authoring
• Highly extensible/applicable across all
platforms
• Use Relevance, PowerShell and others
Intelligent agent
• Performs multiple functions
• Continuous self-assessment and
policy enforcement
• Minimal system impact
(< 2% CPU)
• Approximately 15MB Ram
• API Registration
Content Repository
BigFix Server
Relay
WAN Connected
Relay
Open Architecture
• Rest API
• ServiceNow
• Qualys
• Tenable
• Carbon Black
• Ansible
• Rapid7
• Splunk, etc.
MCM API
MCM/API
Server(s)
Remote Users
Laptops / Mobile
New Challenge of 2023:
Blocking Threats Before the Attack
6
60%
of breaches occur because a patch was
available for known vulnerability but not
applied
60days
for an organization to remediate critical
vulnerabilities
<15days
for attackers to exploit a discovered
vulnerability
IT Ops needs to get ahead
of the latest threats
Align IT with security
Automate Vulnerability
Remediation
7
Endpoint Management for Every Part of Your Organization
Support for 100 operating
systems and variants
Integrations with ServiceNow, Tenable,
Qualys, Nutanix, IBM, VMWare, AWS,
Google Cloud, Azure and others
User Workspace
Management
Deep automation for clients
and mobile to easily solve the
latest user endpoint demands
in the market
Secure Infrastructure
Automation
Intelligent automation
of servers and cloud assets
Security & risk management
compliance
Software Asset
Management
Software cost management
License optimization
Software auditing
CyberFOCUS Security
Management
Help alignment of security
and operations
Help C-suite balance
security and business
Prove cyber risk reduction
8
Support for 100 operating
systems and variants
Integrations with ServiceNow, Tenable,
Qualys, Nutanix, IBM, VMWare, AWS,
Google Cloud, Azure and others
Secure Infrastructure
Automation
Intelligent automation
of servers and cloud assets
Security & risk management
compliance
Software Asset
Management
Software cost management
License optimization
Software auditing
CyberFOCUS Security
Management
Help alignment of security
and operations
Help C-suite balance
security and business
Prove cyber risk reduction
Improve
management and
control of end user
computing devices
including laptops,
desktops, phones
and tablets while
enabling
self-service IT.
Provides
• Total User Workspace
Management
• User self-service
• User experience management
• CyberFOCUS Analytics
• Fast Vulnerability remediation
• Enforced compliance
• Remote desktop control
BigFix Lifecycle
BigFix Compliance
BigFix Mobile
Endpoint Management for Every Part of Your Organization
9
Support for 100 operating
systems and variants
Integrations with ServiceNow, Tenable,
Qualys, Nutanix, IBM, VMWare, AWS,
Google Cloud, Azure and others
User Workspace
Management
Deep automation for clients
and mobile to easily solve the
latest user endpoint demands
in the market
Software Asset
Management
Software cost management
License optimization
Software auditing
CyberFOCUS Security
Management
Help alignment of security
and operations
Help C-suite balance
security and business
Prove cyber risk reduction
Endpoint Management for Every Part of Your Organization
Provides
• Effective patch management
• Intelligent server automation
• OS updates and deployment
• CyberFOCUS Analytics
• Continuous compliance
• Remote control
• Ready-to-deploy content
BigFix Lifecycle
BigFix Compliance
Improves security
and control of on-
prem and cloud
servers running
Windows, UNIX and
Linux using a single
comprehensive
management
platform.
Endpoint Management for Every Part of Your Organization
10
Support for 100 operating
systems and variants
Integrations with ServiceNow, Tenable,
Qualys, Nutanix, IBM, VMWare, AWS,
Google Cloud, Azure and others
User Workspace
Management
Deep automation for clients
and mobile to easily solve the
latest user endpoint demands
in the market
Secure Infrastructure
Automation
Intelligent automation
of servers and cloud assets
Security & risk management
compliance
CyberFOCUS Security
Management
Help alignment of security
and operations
Help C-suite balance
security and business
Prove cyber risk reduction
Optimizing software
cost management
through inventorying
licenses, tracking
usage and delivering
audit-ready reports.
Provides
• Software catalog with
100,000+ titles
• Software usage reporting
• Identification of over
deployed titles
• Identification and optional
removal of risky and
unauthorized software
BigFix Inventory
Endpoint Management for Every Part of Your Organization
11
Support for 100 operating
systems and variants
Integrations with ServiceNow, Tenable,
Qualys, Nutanix, IBM, VMWare, AWS,
Google Cloud, Azure and others
User Workspace
Management
Deep automation for clients
and mobile to easily solve the
latest user endpoint demands
in the market
Secure Infrastructure
Automation
Intelligent automation
of servers and cloud assets
Security & risk management
compliance
Software Asset
Management
Software cost management
License optimization
Software auditing
CyberFOCUS Security
Management
Help alignment of security
and operations
Help C-suite balance
security and business
Prove cyber risk reduction
Aligns of security and
operations to remediate
vulnerabilities faster,
ensure compliance
across the enterprise and
better manage security
and risk across all
endpoints in the
enterprise.
Provides
• Insights for Vuln Remediation
• CISA KEV Analyzer
• MITRE APTs Vuln Simulator
• Protection Level Agreements
BigFix Lifecycle
BigFix Compliance
BigFix Remediate
BigFix Resolve
12
BigFix CyberFOCUS Technology
The industry’s first vulnerability
remediation solution that combines threat
intelligence-based CVE prioritization,
prescriptive analytics and the broadest
device coverage to help organizations
stay protected ahead of emerging
threats.
13
Typical Vulnerability Remediation using current tools
Vulnerability Remediation using BigFix
Current
• IT is at the end of the
process
• Research and Fixes are
manual tasks taking
weeks
• Management activities
organized by OS
• Remediations are
prioritized manually
• WEEKS / MONTHS
BigFix
• Automates correlation and research
• Automates Fixlet creation
• Activities are OS-independent
• Speeds patching and vulnerability remediation
• Allows IT Ops to stay ahead of the threat
• HOURS / DAYS
14
BigFix Insights for Vulnerability Remediation
15
BigFix Compliance
Enables organizations to achieve continuous compliance
of security and regulatory policies effectively
Continuous assessment
Continuously assesses each endpoint’s
security configurations to get real-time
compliance status
Modern Client Management
Extends visibility and control to
Windows 10 and macOS endpoints
using a modern approach
Insights for Vulnerability Remediation
Correlates vulnerabilities discovered by
3rd party tools with BigFix remediation
content to bridge the Sec/Ops gap
Endpoint Protection Management
Monitors deployment health of various
endpoint protection tools and
remediates deployment issues quickly
Rich Policy Contents
20,000+ Out-of-the-box checks for
60+ operating systems and
middleware applications based
on CIS, DISA STIG and PCI
Automatic Remediation
Automatically remediates
configuration drifts to re-enforce
policy and reduce attack surface
Comprehensive Analytics &
Reporting
Assesses and reports on current
status and historical trend of security
configuration, patch and vulnerability
postures
Add Shadow
16
Insights for Vulnerability Remediation
Correlates vulnerabilities discovered by
3rd party tools with BigFix remediation
content to bridge the Sec/Ops gap
Modern Client Management
Extends visibility and control to
Windows 10 and macOS endpoints
using a modern approach
Provision
• OS provisioning
• Bare metal & OS re-imaging
• Complex application deployment
Service
• Secure remote control
• From any endpoint to any endpoint
(over the internet)
• BigFix in-place upgrade (windows
upgrade)
Manage
• Software distribution
• Patch management
• Configuration and Patch
• Power Management
• End user self-service application
• Task sequencing and automation
e.g. clustered server patching
Analyze
An open data analytics platform
providing insights, historical and trend
reports
Secure
• Continuous configuration
compliance
• Secure computer disposal (disk
overwrite NIST)
BigFix Lifecycle
Enables organizations to discover, manage and support
devices of all types
Add Shadow
17
Identify unused software
Usage reports to identify systems
where software can be removed to
reduce security exposures
Identify unmanaged software
Inventory data and newly discovered
system reports to verify if assets are
properly managed or unauthorized.
Identify unmanaged software
Whitelist/Backlist filtering of inventory
data to identify systems where
unauthorized software is deployed or
unauthorized processes are running
Reduce overspending
Detailed, real-time, current inventory
and usage reports to eliminate under
used or unnecessary licenses and
reduce maintenance costs
Reduce audit risk and cost
• Identify unlicensed computers.
• Associate software inventory with
hardware data to avoid software
license exposures
Reduce true-up costs
Accurate inventory data in support of
purchasing and procurement tools and
processes
BigFix Inventory
Maintain software audit readiness and mitigate security risks with
software compliance and usage management
Add Shadow
BigFix Remediate
Extends the power of BigFix Patch with the industry’s fastest vulnerability remediation to
align security and IT operations and shrink the enterprise attack surface
Multiplatform patch
Patch nearly 100 different operating
systems and variants with one platform
Insights for Vulnerability Remediation
Correlates vulnerabilities from Tenable
and Qualys to bridge the Sec/Ops gap
and reduce attack surface
CyberFOCUS analytics
• Advanced Persistent Threat (APT)
Mapping and a Vulnerability
Remediation Simulator
• CISA Known Exploited Vulnerability
Exposure Analyzer
• Protection Level Agreements
Fixlet library
More than 500,000 Fixlets are
available on bigfix.com with more
being added daily.
Extended patch content
Ready-to-deploy patch content for
popular 3rd party application
developed and tested by HCL BigFix
Add Shadow
BigFix Mobile
Modern Management for a Mobile Workforce
Enroll
Enroll corporate or BYOD devices with
Zero touch or end user initiated Over-
the-air enrollment.
Manage
• Easily manage several hundred OS
configuration settings and
applications
• Easily deploy Applications from
Google Playstore and Apple
Appstore
Service
Remotely wipe, or lock a lost or stolen
device to protect corporate data, and
provide an on-screen message so that
it can be retrieved
Secure
Set passcode policies, restrictions
policies, OS update policies or
manage application blacklist and
whitelisting, camera and print
settings, etc. Retire
Easily decommission corporate
applications and data on personal
devices that are no longer authorized
20
A Recognized Leader
Gartner Peer Insights for UEM Quadrant Knowledge Systems
BigFix Technology Alliance Program
Certified integrations support by HCL and the partner
22
Top Reasons Partners Engage BigFix
Increased Productivity =
Increased Profitability
On Demand Technical
Enablement and Sales Support
Thought Leadership to Align
IT and Security
New, Profitable
Implementation, XaaS and
MSP Services
Management Consulting for
Protection Level Agreements
Scales to all size customers
and industries

Weitere ähnliche Inhalte

Ähnlich wie HCL BigFix - DNUG Stammtisch Salzburg

IBM Multicloud Management on the OpenShift Container Platform
IBM Multicloud Management on theOpenShift Container PlatformIBM Multicloud Management on theOpenShift Container Platform
IBM Multicloud Management on the OpenShift Container PlatformMichael Elder
 
Bigfix Multicloud Management
Bigfix Multicloud ManagementBigfix Multicloud Management
Bigfix Multicloud ManagementHCLSoftware
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Sverige
 
Slides zum Impulsreferat: HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: HCL BigFix  - DNUG Stammtisch KarlsruheSlides zum Impulsreferat: HCL BigFix  - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: HCL BigFix - DNUG Stammtisch KarlsruheDNUG e.V.
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company PresentationRapidScale
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerEnrique Gustavo Dutra
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
AWS Webcast - Datacenter Migration to AWS
AWS Webcast - Datacenter Migration to AWSAWS Webcast - Datacenter Migration to AWS
AWS Webcast - Datacenter Migration to AWSAmazon Web Services
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device ManagementIBM Danmark
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 

Ähnlich wie HCL BigFix - DNUG Stammtisch Salzburg (20)

IBM Multicloud Management on the OpenShift Container Platform
IBM Multicloud Management on theOpenShift Container PlatformIBM Multicloud Management on theOpenShift Container Platform
IBM Multicloud Management on the OpenShift Container Platform
 
Bigfix Multicloud Management
Bigfix Multicloud ManagementBigfix Multicloud Management
Bigfix Multicloud Management
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
 
Slides zum Impulsreferat: HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: HCL BigFix  - DNUG Stammtisch KarlsruheSlides zum Impulsreferat: HCL BigFix  - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: HCL BigFix - DNUG Stammtisch Karlsruhe
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
GE iFIX
GE iFIXGE iFIX
GE iFIX
 
Ibm linux one
Ibm linux one Ibm linux one
Ibm linux one
 
Ibm linux one
Ibm linux one Ibm linux one
Ibm linux one
 
Ibm linux one
Ibm linux one Ibm linux one
Ibm linux one
 
AWS Webcast - Datacenter Migration to AWS
AWS Webcast - Datacenter Migration to AWSAWS Webcast - Datacenter Migration to AWS
AWS Webcast - Datacenter Migration to AWS
 
Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 

Mehr von DNUG e.V.

Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...DNUG e.V.
 
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...DNUG e.V.
 
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch SalzburgSlides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch SalzburgDNUG e.V.
 
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...DNUG e.V.
 
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...DNUG e.V.
 
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch KarlsruheSlides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch KarlsruheDNUG e.V.
 
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...DNUG e.V.
 
Entwicklung mit Volt MX und Co. | Teil 1
Entwicklung mit Volt MX und Co. | Teil 1Entwicklung mit Volt MX und Co. | Teil 1
Entwicklung mit Volt MX und Co. | Teil 1DNUG e.V.
 
HCL Nomad - DNUG Stammtisch Salzburg.pdf
HCL Nomad - DNUG Stammtisch Salzburg.pdfHCL Nomad - DNUG Stammtisch Salzburg.pdf
HCL Nomad - DNUG Stammtisch Salzburg.pdfDNUG e.V.
 
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien DNUG e.V.
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien DNUG e.V.
 
DACHNUG50 MX_Workshop.pdf
DACHNUG50 MX_Workshop.pdfDACHNUG50 MX_Workshop.pdf
DACHNUG50 MX_Workshop.pdfDNUG e.V.
 
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdfDACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdfDNUG e.V.
 
DACHNUG50 CNX0 Workshop.pdf
DACHNUG50 CNX0 Workshop.pdfDACHNUG50 CNX0 Workshop.pdf
DACHNUG50 CNX0 Workshop.pdfDNUG e.V.
 
DACHNUG50 What's new in CCB - V3.3.pdf
DACHNUG50 What's new in CCB - V3.3.pdfDACHNUG50 What's new in CCB - V3.3.pdf
DACHNUG50 What's new in CCB - V3.3.pdfDNUG e.V.
 
DACHNUG50 presentation 15 June 2023.pdf
DACHNUG50 presentation 15 June 2023.pdfDACHNUG50 presentation 15 June 2023.pdf
DACHNUG50 presentation 15 June 2023.pdfDNUG e.V.
 
DACHNUG50 Pointsharp overview_web_A4.pdf
DACHNUG50 Pointsharp overview_web_A4.pdfDACHNUG50 Pointsharp overview_web_A4.pdf
DACHNUG50 Pointsharp overview_web_A4.pdfDNUG e.V.
 
DACHNUG50 OnTime for Domino.pdf
DACHNUG50 OnTime for Domino.pdfDACHNUG50 OnTime for Domino.pdf
DACHNUG50 OnTime for Domino.pdfDNUG e.V.
 
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdfDACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdfDNUG e.V.
 
DACHNUG50 Erfolgreiche Digitalisierung Notes Anwendungen mit Low Code L”sung ...
DACHNUG50 Erfolgreiche Digitalisierung Notes Anwendungen mit Low Code L”sung ...DACHNUG50 Erfolgreiche Digitalisierung Notes Anwendungen mit Low Code L”sung ...
DACHNUG50 Erfolgreiche Digitalisierung Notes Anwendungen mit Low Code L”sung ...DNUG e.V.
 

Mehr von DNUG e.V. (20)

Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
 
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 3 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
 
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch SalzburgSlides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
Slides zum Impulsreferat: HCL UDP - DNUG Stammtisch Salzburg
 
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (2) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
 
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
Slides (1) zu Teil 2 der Veranstaltungsreihe Anwendungsentwicklung mit Volt M...
 
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch KarlsruheSlides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
Slides zum Impulsreferat: NIS2 & HCL BigFix - DNUG Stammtisch Karlsruhe
 
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
Slides zum Impulsreferat: NIS2 - Was steckt konkret dahinter? - DNUG Stammtis...
 
Entwicklung mit Volt MX und Co. | Teil 1
Entwicklung mit Volt MX und Co. | Teil 1Entwicklung mit Volt MX und Co. | Teil 1
Entwicklung mit Volt MX und Co. | Teil 1
 
HCL Nomad - DNUG Stammtisch Salzburg.pdf
HCL Nomad - DNUG Stammtisch Salzburg.pdfHCL Nomad - DNUG Stammtisch Salzburg.pdf
HCL Nomad - DNUG Stammtisch Salzburg.pdf
 
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
HCL Domino 14 - Leap 1.1.2 - DNUG Stammtisch Wien
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien
 
DACHNUG50 MX_Workshop.pdf
DACHNUG50 MX_Workshop.pdfDACHNUG50 MX_Workshop.pdf
DACHNUG50 MX_Workshop.pdf
 
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdfDACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
DACHNUG50 Domino REST API - Konzepte und Hintergruende.pdf
 
DACHNUG50 CNX0 Workshop.pdf
DACHNUG50 CNX0 Workshop.pdfDACHNUG50 CNX0 Workshop.pdf
DACHNUG50 CNX0 Workshop.pdf
 
DACHNUG50 What's new in CCB - V3.3.pdf
DACHNUG50 What's new in CCB - V3.3.pdfDACHNUG50 What's new in CCB - V3.3.pdf
DACHNUG50 What's new in CCB - V3.3.pdf
 
DACHNUG50 presentation 15 June 2023.pdf
DACHNUG50 presentation 15 June 2023.pdfDACHNUG50 presentation 15 June 2023.pdf
DACHNUG50 presentation 15 June 2023.pdf
 
DACHNUG50 Pointsharp overview_web_A4.pdf
DACHNUG50 Pointsharp overview_web_A4.pdfDACHNUG50 Pointsharp overview_web_A4.pdf
DACHNUG50 Pointsharp overview_web_A4.pdf
 
DACHNUG50 OnTime for Domino.pdf
DACHNUG50 OnTime for Domino.pdfDACHNUG50 OnTime for Domino.pdf
DACHNUG50 OnTime for Domino.pdf
 
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdfDACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
DACHNUG50 Interpretation-von-Event-Logs-aus-CNX-mit-Hilfe-von-Domino.pdf
 
DACHNUG50 Erfolgreiche Digitalisierung Notes Anwendungen mit Low Code L”sung ...
DACHNUG50 Erfolgreiche Digitalisierung Notes Anwendungen mit Low Code L”sung ...DACHNUG50 Erfolgreiche Digitalisierung Notes Anwendungen mit Low Code L”sung ...
DACHNUG50 Erfolgreiche Digitalisierung Notes Anwendungen mit Low Code L”sung ...
 

Kürzlich hochgeladen

Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 

Kürzlich hochgeladen (20)

Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 

HCL BigFix - DNUG Stammtisch Salzburg

  • 1. Copyright © 2023 HCL Software Limited HCL BigFix The Endpoint Management Platform
  • 2. 2 Endpoint Security is a Universal Challenge In 2023, there are about 3.5 million unfulfilled cybersecurity jobs Skills shortage Regulatory fines can cost millions for large global brands Compliance mandates Nearly 1/3 of all detected vulnerabilities remain unremediated after a year Long remediation times A typical organization uses 14 endpoint management tools Too many tools And agents No consolidated single manage- ment view of all endpoints increases security risk Lack of visibility Endpoint Security is essential, but challenging “things” to secure personal data records stolen lost to cybercrime
  • 3. 3 Top Reasons Customers Buy BigFix Consolidate tools for reduced cost, complexity and risk Accelerate Zero Trust and other security initiatives Keep all endpoints continuously patched and compliant Remediate vulnerabilities faster to maintain business continuity Reduce annual software costs while fostering use of current, most secure, software versions Securely Manage “Work From Anywhere” Initiatives Industry’s Broadest Array of Automation and Out-Of-The Box Content
  • 4. 4 The Economic Impact of BigFix Addressing endpoint management challenges drives tangible value No consolidated single Management view of all endpoints increases security risk Lack of visibility In 2023, there are about 3.5 million unfulfilled cybersecurity jobs Skills shortage Regulatory fines can cost millions for large global brands Compliance mandates Nearly 1/3 of all detected vulnerabilities remain unremediated after a year Long remediation times A typical organization uses 14 endpoint management tools Too many tools And agents Endpoint Management Challenges BigFix delivers Economic Impact One skillset leveraged across all OS platforms and device types Simplified staffing, fewer specialists Reduced staffing costs Eliminates configuration drift, remediation effort, and noncompliance fines Continuous compliance enforcement Fewer fines for noncompliance Prioritize and speed vulnerability remediation across the fleet of endpoints Fast remediation of vulnerabilities Reduce security risk A single endpoint management solution reduces tool sprawl and IT complexity Single agent and platform Reduced IT spend A unified view simplifies management and control and reduces risk Consolidated view of all endpoints Improve visibility and control
  • 5. Internet/Firewall Connected Corporate/Remote Offices/ ATM/PoS/Desktops etc. Real-time visibility, scalability, and ease of use Lightweight infrastructure • Use existing systems as relays • Built-in redundancy • Support / secure roaming endpoints • Single Port (52311) • API Servers for extension to Cloud and Mobile Cloud-based content delivery • Highly extensible • Automatic, on-demand functionality • 500K+ Published Fixlets. • New content added daily + community. (BigFix.me) • To BigFix Server Only! Single server and console • Highly secure and scalable • Aggregates data, analyzes and reports • Pushes out pre-defined / custom policies • Can be on WAN or Cloud Flexible policy language (Fixlets) • Thousands of out-of-the-box policies • Best practices for operations and security • Simple custom policy authoring • Highly extensible/applicable across all platforms • Use Relevance, PowerShell and others Intelligent agent • Performs multiple functions • Continuous self-assessment and policy enforcement • Minimal system impact (< 2% CPU) • Approximately 15MB Ram • API Registration Content Repository BigFix Server Relay WAN Connected Relay Open Architecture • Rest API • ServiceNow • Qualys • Tenable • Carbon Black • Ansible • Rapid7 • Splunk, etc. MCM API MCM/API Server(s) Remote Users Laptops / Mobile
  • 6. New Challenge of 2023: Blocking Threats Before the Attack 6 60% of breaches occur because a patch was available for known vulnerability but not applied 60days for an organization to remediate critical vulnerabilities <15days for attackers to exploit a discovered vulnerability IT Ops needs to get ahead of the latest threats Align IT with security Automate Vulnerability Remediation
  • 7. 7 Endpoint Management for Every Part of Your Organization Support for 100 operating systems and variants Integrations with ServiceNow, Tenable, Qualys, Nutanix, IBM, VMWare, AWS, Google Cloud, Azure and others User Workspace Management Deep automation for clients and mobile to easily solve the latest user endpoint demands in the market Secure Infrastructure Automation Intelligent automation of servers and cloud assets Security & risk management compliance Software Asset Management Software cost management License optimization Software auditing CyberFOCUS Security Management Help alignment of security and operations Help C-suite balance security and business Prove cyber risk reduction
  • 8. 8 Support for 100 operating systems and variants Integrations with ServiceNow, Tenable, Qualys, Nutanix, IBM, VMWare, AWS, Google Cloud, Azure and others Secure Infrastructure Automation Intelligent automation of servers and cloud assets Security & risk management compliance Software Asset Management Software cost management License optimization Software auditing CyberFOCUS Security Management Help alignment of security and operations Help C-suite balance security and business Prove cyber risk reduction Improve management and control of end user computing devices including laptops, desktops, phones and tablets while enabling self-service IT. Provides • Total User Workspace Management • User self-service • User experience management • CyberFOCUS Analytics • Fast Vulnerability remediation • Enforced compliance • Remote desktop control BigFix Lifecycle BigFix Compliance BigFix Mobile Endpoint Management for Every Part of Your Organization
  • 9. 9 Support for 100 operating systems and variants Integrations with ServiceNow, Tenable, Qualys, Nutanix, IBM, VMWare, AWS, Google Cloud, Azure and others User Workspace Management Deep automation for clients and mobile to easily solve the latest user endpoint demands in the market Software Asset Management Software cost management License optimization Software auditing CyberFOCUS Security Management Help alignment of security and operations Help C-suite balance security and business Prove cyber risk reduction Endpoint Management for Every Part of Your Organization Provides • Effective patch management • Intelligent server automation • OS updates and deployment • CyberFOCUS Analytics • Continuous compliance • Remote control • Ready-to-deploy content BigFix Lifecycle BigFix Compliance Improves security and control of on- prem and cloud servers running Windows, UNIX and Linux using a single comprehensive management platform.
  • 10. Endpoint Management for Every Part of Your Organization 10 Support for 100 operating systems and variants Integrations with ServiceNow, Tenable, Qualys, Nutanix, IBM, VMWare, AWS, Google Cloud, Azure and others User Workspace Management Deep automation for clients and mobile to easily solve the latest user endpoint demands in the market Secure Infrastructure Automation Intelligent automation of servers and cloud assets Security & risk management compliance CyberFOCUS Security Management Help alignment of security and operations Help C-suite balance security and business Prove cyber risk reduction Optimizing software cost management through inventorying licenses, tracking usage and delivering audit-ready reports. Provides • Software catalog with 100,000+ titles • Software usage reporting • Identification of over deployed titles • Identification and optional removal of risky and unauthorized software BigFix Inventory
  • 11. Endpoint Management for Every Part of Your Organization 11 Support for 100 operating systems and variants Integrations with ServiceNow, Tenable, Qualys, Nutanix, IBM, VMWare, AWS, Google Cloud, Azure and others User Workspace Management Deep automation for clients and mobile to easily solve the latest user endpoint demands in the market Secure Infrastructure Automation Intelligent automation of servers and cloud assets Security & risk management compliance Software Asset Management Software cost management License optimization Software auditing CyberFOCUS Security Management Help alignment of security and operations Help C-suite balance security and business Prove cyber risk reduction Aligns of security and operations to remediate vulnerabilities faster, ensure compliance across the enterprise and better manage security and risk across all endpoints in the enterprise. Provides • Insights for Vuln Remediation • CISA KEV Analyzer • MITRE APTs Vuln Simulator • Protection Level Agreements BigFix Lifecycle BigFix Compliance BigFix Remediate BigFix Resolve
  • 12. 12 BigFix CyberFOCUS Technology The industry’s first vulnerability remediation solution that combines threat intelligence-based CVE prioritization, prescriptive analytics and the broadest device coverage to help organizations stay protected ahead of emerging threats.
  • 13. 13 Typical Vulnerability Remediation using current tools Vulnerability Remediation using BigFix Current • IT is at the end of the process • Research and Fixes are manual tasks taking weeks • Management activities organized by OS • Remediations are prioritized manually • WEEKS / MONTHS BigFix • Automates correlation and research • Automates Fixlet creation • Activities are OS-independent • Speeds patching and vulnerability remediation • Allows IT Ops to stay ahead of the threat • HOURS / DAYS
  • 14. 14 BigFix Insights for Vulnerability Remediation
  • 15. 15 BigFix Compliance Enables organizations to achieve continuous compliance of security and regulatory policies effectively Continuous assessment Continuously assesses each endpoint’s security configurations to get real-time compliance status Modern Client Management Extends visibility and control to Windows 10 and macOS endpoints using a modern approach Insights for Vulnerability Remediation Correlates vulnerabilities discovered by 3rd party tools with BigFix remediation content to bridge the Sec/Ops gap Endpoint Protection Management Monitors deployment health of various endpoint protection tools and remediates deployment issues quickly Rich Policy Contents 20,000+ Out-of-the-box checks for 60+ operating systems and middleware applications based on CIS, DISA STIG and PCI Automatic Remediation Automatically remediates configuration drifts to re-enforce policy and reduce attack surface Comprehensive Analytics & Reporting Assesses and reports on current status and historical trend of security configuration, patch and vulnerability postures Add Shadow
  • 16. 16 Insights for Vulnerability Remediation Correlates vulnerabilities discovered by 3rd party tools with BigFix remediation content to bridge the Sec/Ops gap Modern Client Management Extends visibility and control to Windows 10 and macOS endpoints using a modern approach Provision • OS provisioning • Bare metal & OS re-imaging • Complex application deployment Service • Secure remote control • From any endpoint to any endpoint (over the internet) • BigFix in-place upgrade (windows upgrade) Manage • Software distribution • Patch management • Configuration and Patch • Power Management • End user self-service application • Task sequencing and automation e.g. clustered server patching Analyze An open data analytics platform providing insights, historical and trend reports Secure • Continuous configuration compliance • Secure computer disposal (disk overwrite NIST) BigFix Lifecycle Enables organizations to discover, manage and support devices of all types Add Shadow
  • 17. 17 Identify unused software Usage reports to identify systems where software can be removed to reduce security exposures Identify unmanaged software Inventory data and newly discovered system reports to verify if assets are properly managed or unauthorized. Identify unmanaged software Whitelist/Backlist filtering of inventory data to identify systems where unauthorized software is deployed or unauthorized processes are running Reduce overspending Detailed, real-time, current inventory and usage reports to eliminate under used or unnecessary licenses and reduce maintenance costs Reduce audit risk and cost • Identify unlicensed computers. • Associate software inventory with hardware data to avoid software license exposures Reduce true-up costs Accurate inventory data in support of purchasing and procurement tools and processes BigFix Inventory Maintain software audit readiness and mitigate security risks with software compliance and usage management Add Shadow
  • 18. BigFix Remediate Extends the power of BigFix Patch with the industry’s fastest vulnerability remediation to align security and IT operations and shrink the enterprise attack surface Multiplatform patch Patch nearly 100 different operating systems and variants with one platform Insights for Vulnerability Remediation Correlates vulnerabilities from Tenable and Qualys to bridge the Sec/Ops gap and reduce attack surface CyberFOCUS analytics • Advanced Persistent Threat (APT) Mapping and a Vulnerability Remediation Simulator • CISA Known Exploited Vulnerability Exposure Analyzer • Protection Level Agreements Fixlet library More than 500,000 Fixlets are available on bigfix.com with more being added daily. Extended patch content Ready-to-deploy patch content for popular 3rd party application developed and tested by HCL BigFix Add Shadow
  • 19. BigFix Mobile Modern Management for a Mobile Workforce Enroll Enroll corporate or BYOD devices with Zero touch or end user initiated Over- the-air enrollment. Manage • Easily manage several hundred OS configuration settings and applications • Easily deploy Applications from Google Playstore and Apple Appstore Service Remotely wipe, or lock a lost or stolen device to protect corporate data, and provide an on-screen message so that it can be retrieved Secure Set passcode policies, restrictions policies, OS update policies or manage application blacklist and whitelisting, camera and print settings, etc. Retire Easily decommission corporate applications and data on personal devices that are no longer authorized
  • 20. 20 A Recognized Leader Gartner Peer Insights for UEM Quadrant Knowledge Systems
  • 21. BigFix Technology Alliance Program Certified integrations support by HCL and the partner
  • 22. 22 Top Reasons Partners Engage BigFix Increased Productivity = Increased Profitability On Demand Technical Enablement and Sales Support Thought Leadership to Align IT and Security New, Profitable Implementation, XaaS and MSP Services Management Consulting for Protection Level Agreements Scales to all size customers and industries