SlideShare ist ein Scribd-Unternehmen logo
1 von 15
IT Briefing Series



5 Best Practices for
Network Discovery & Management
in 2013
SPEAKERS




Ray Barber                  Danny Jerman
Product Marketing Manager   Senior Consultant

Kaseya                      Kaseya



                                                www.kaseya.com
AGENDA


•   Introductions
•   5 Best Practices Discussion
•   Recap
•   Q&A




                                  www.kaseya.com
The Correct Terminology




                          www.kaseya.com
Good Practice #1 - DISCOVER


Discover the Current State and Health
of Your IT Infrastructure




                                   www.kaseya.com
Good Practice #2 – MANAGE


Manage and Control a Constantly
Changing IT Environment

• Avoid the ‘Picasso’ effect
• Driving consistent approach
• Managing risk


                                  www.kaseya.com
Good Practice #3 – ACCESS



Quickly & Securely Gain Access to
Machines, Domains, Users, Devices




                                 www.kaseya.com
Good Practice #4 – AUTOMATE
     MONITORING & REMEDIATION

Automate monitoring and
remediation of issues - before they
impact operations




                                   www.kaseya.com
Good Practice #5 – AUTOMATE
DEPLOYMENT & SECURITY




                              www.kaseya.com
OUR VISION




“Providing Enterprise-Class IT Systems
     Management for Everybody”


                                   www.kaseya.com
CORE PRINCIPLES




               Discover




    Validate              Manage




               Automate




                                   www.kaseya.com
CONSOLIDATED DISCOVERY




                  N
                  M
                  A
                  P



         Multiple Scan Methods




                                 www.kaseya.com
GOOD PRACTICE

100’s of Pre-Defined Views, Maintenance Routines and Policies

• Device Views by Type
   – By OS Type/Ver
   – Exchange, SQL, IIS, etc
• Maintenance Routines
   – PC and Server Maintenance
• Monitor Sets
   –   Application Events/Logs
   –   Hardware Thresholds
   –   Up/Down Faults
   –   Servers, Database, Exchange and Domains
   –   3rd Party Backup, Security and Network Infrastructure


                                                               www.kaseya.com
UNIFIED MANAGEMENT

                                                                                           Automate the State of
    Discover the State of IT                  Manage the State of IT
                                                                                                   IT
    •   Systems                               • Scheduling                                 • Reporting
    •   Assets                                • Procedures                                 • Dashboards
    •   Mobile Devices                        • API/Messaging                              • Interactive Data Views
    •   Network Devices


           IT Configuration Management                                             Business Continuity
•    Remote Management         •   Image Deployment             •   Image Backup                 •   File & Folder Backup
•    Software Deployment       •   Desktop Migration            •   Image Virtualization
•    Power Management          •   Mobile Device Management


                   Asset Management                                                  Service Delivery
•    Network Discover & AD     •   Asset Management             •   Service Desk/Ticketing       •   Policy Compliance
• Hardware/Software            •   Virtual Machine Management   •   Policy Management            •   Time Tracking
                                                                •   Service Billing


                           Security                                                Systems Monitoring
•    AntiVirus                 •   Patch Management             •   Systems Checks & Alerts      •   Agent-less Monitoring
•    AntiMalware               •   Software Updates             •   Agent Monitoring             •   Log Monitoring
                                                                •   Enterprise Monitoring

                                                                                                             www.kaseya.com
Join Us:
Sign Up for a Demo Today!

Contact us:
+61(0)2 9293 7900
sales@kaseya.com

Learn more:
www.kaseya.com.au

Weitere ähnliche Inhalte

Was ist angesagt?

BusinessPort's AgilityBMS 1 Minute Demo
BusinessPort's AgilityBMS 1 Minute DemoBusinessPort's AgilityBMS 1 Minute Demo
BusinessPort's AgilityBMS 1 Minute DemoAVEVA
 
yIMS your information, your value
yIMS your information, your valueyIMS your information, your value
yIMS your information, your valueGruppo MAASI
 
ServiceNow Lightening
ServiceNow LighteningServiceNow Lightening
ServiceNow LighteningNorman Close
 
CentriLogic Advanced Technology Services
CentriLogic Advanced Technology ServicesCentriLogic Advanced Technology Services
CentriLogic Advanced Technology ServicesCentriLogic
 
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAPSAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAPKeneos
 
Steve Davis: Federalconference.com: Alfresco based Armedia Case Management So...
Steve Davis: Federalconference.com: Alfresco based Armedia Case Management So...Steve Davis: Federalconference.com: Alfresco based Armedia Case Management So...
Steve Davis: Federalconference.com: Alfresco based Armedia Case Management So...Alfresco Software
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)johndorian555
 

Was ist angesagt? (8)

BusinessPort's AgilityBMS 1 Minute Demo
BusinessPort's AgilityBMS 1 Minute DemoBusinessPort's AgilityBMS 1 Minute Demo
BusinessPort's AgilityBMS 1 Minute Demo
 
Closing the Loop
Closing the LoopClosing the Loop
Closing the Loop
 
yIMS your information, your value
yIMS your information, your valueyIMS your information, your value
yIMS your information, your value
 
ServiceNow Lightening
ServiceNow LighteningServiceNow Lightening
ServiceNow Lightening
 
CentriLogic Advanced Technology Services
CentriLogic Advanced Technology ServicesCentriLogic Advanced Technology Services
CentriLogic Advanced Technology Services
 
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAPSAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
SAPience.be User Day 13 - Keneos - Be mobile, stay safe go for mobility with SAP
 
Steve Davis: Federalconference.com: Alfresco based Armedia Case Management So...
Steve Davis: Federalconference.com: Alfresco based Armedia Case Management So...Steve Davis: Federalconference.com: Alfresco based Armedia Case Management So...
Steve Davis: Federalconference.com: Alfresco based Armedia Case Management So...
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
 

Ähnlich wie Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!

Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingKaseya
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPTTaking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPTqualisystems
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network MayhemPacketTrap Msp
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
How eBMS can help you
How eBMS can help youHow eBMS can help you
How eBMS can help youBert Myburgh
 
Imran Zahid Hussain Dalvi
Imran Zahid Hussain DalviImran Zahid Hussain Dalvi
Imran Zahid Hussain DalviImran Dalvi
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudCloudHesive
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk ManagementPinewood
 
Cloud os and management overview of windows server 2012 and system center 2...
Cloud os and management   overview of windows server 2012 and system center 2...Cloud os and management   overview of windows server 2012 and system center 2...
Cloud os and management overview of windows server 2012 and system center 2...☁️Carl Nakamura [MSFT]☁️
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016 Scott Carlson
 
AWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWSAWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWSCloudHesive
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updatedSyntax Inc.
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAmazon Web Services
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 

Ähnlich wie Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013! (20)

Retail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance BriefingRetail IT 2013: Data Security & PCI Compliance Briefing
Retail IT 2013: Data Security & PCI Compliance Briefing
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPTTaking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
 
Pci Req
Pci ReqPci Req
Pci Req
 
Mindshare Managed It Services Intro V.1
Mindshare Managed It Services Intro V.1Mindshare Managed It Services Intro V.1
Mindshare Managed It Services Intro V.1
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network Mayhem
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
How eBMS can help you
How eBMS can help youHow eBMS can help you
How eBMS can help you
 
Imran Zahid Hussain Dalvi
Imran Zahid Hussain DalviImran Zahid Hussain Dalvi
Imran Zahid Hussain Dalvi
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management2012-12-12 Seminar McAfee Risk Management
2012-12-12 Seminar McAfee Risk Management
 
Cloud os and management overview of windows server 2012 and system center 2...
Cloud os and management   overview of windows server 2012 and system center 2...Cloud os and management   overview of windows server 2012 and system center 2...
Cloud os and management overview of windows server 2012 and system center 2...
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016
 
Acuma Introduction
Acuma IntroductionAcuma Introduction
Acuma Introduction
 
AWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWSAWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWS
 
Sys track customer facing-terminal server-updated
Sys track   customer facing-terminal server-updatedSys track   customer facing-terminal server-updated
Sys track customer facing-terminal server-updated
 
Achieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By DesignAchieve Compliance with Security by Default and By Design
Achieve Compliance with Security by Default and By Design
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 

Mehr von Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 

Mehr von Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Kürzlich hochgeladen

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Feb. 28 - 5 Best Practices for Network Discovery & Management in 2013!

  • 1. IT Briefing Series 5 Best Practices for Network Discovery & Management in 2013
  • 2. SPEAKERS Ray Barber Danny Jerman Product Marketing Manager Senior Consultant Kaseya Kaseya www.kaseya.com
  • 3. AGENDA • Introductions • 5 Best Practices Discussion • Recap • Q&A www.kaseya.com
  • 4. The Correct Terminology www.kaseya.com
  • 5. Good Practice #1 - DISCOVER Discover the Current State and Health of Your IT Infrastructure www.kaseya.com
  • 6. Good Practice #2 – MANAGE Manage and Control a Constantly Changing IT Environment • Avoid the ‘Picasso’ effect • Driving consistent approach • Managing risk www.kaseya.com
  • 7. Good Practice #3 – ACCESS Quickly & Securely Gain Access to Machines, Domains, Users, Devices www.kaseya.com
  • 8. Good Practice #4 – AUTOMATE MONITORING & REMEDIATION Automate monitoring and remediation of issues - before they impact operations www.kaseya.com
  • 9. Good Practice #5 – AUTOMATE DEPLOYMENT & SECURITY www.kaseya.com
  • 10. OUR VISION “Providing Enterprise-Class IT Systems Management for Everybody” www.kaseya.com
  • 11. CORE PRINCIPLES Discover Validate Manage Automate www.kaseya.com
  • 12. CONSOLIDATED DISCOVERY N M A P Multiple Scan Methods www.kaseya.com
  • 13. GOOD PRACTICE 100’s of Pre-Defined Views, Maintenance Routines and Policies • Device Views by Type – By OS Type/Ver – Exchange, SQL, IIS, etc • Maintenance Routines – PC and Server Maintenance • Monitor Sets – Application Events/Logs – Hardware Thresholds – Up/Down Faults – Servers, Database, Exchange and Domains – 3rd Party Backup, Security and Network Infrastructure www.kaseya.com
  • 14. UNIFIED MANAGEMENT Automate the State of Discover the State of IT Manage the State of IT IT • Systems • Scheduling • Reporting • Assets • Procedures • Dashboards • Mobile Devices • API/Messaging • Interactive Data Views • Network Devices IT Configuration Management Business Continuity • Remote Management • Image Deployment • Image Backup • File & Folder Backup • Software Deployment • Desktop Migration • Image Virtualization • Power Management • Mobile Device Management Asset Management Service Delivery • Network Discover & AD • Asset Management • Service Desk/Ticketing • Policy Compliance • Hardware/Software • Virtual Machine Management • Policy Management • Time Tracking • Service Billing Security Systems Monitoring • AntiVirus • Patch Management • Systems Checks & Alerts • Agent-less Monitoring • AntiMalware • Software Updates • Agent Monitoring • Log Monitoring • Enterprise Monitoring www.kaseya.com
  • 15. Join Us: Sign Up for a Demo Today! Contact us: +61(0)2 9293 7900 sales@kaseya.com Learn more: www.kaseya.com.au

Hinweis der Redaktion

  1. “Johnathan “Mark” Nelson is a twenty five year veteran in the IT field. He has served as the Chief Technology Officer for the American Association of Community Colleges (AACC) for the last 20 years where he manages the Information Resource Management team as well as the Data Operations team for the Association. In addition to his responsibilities as CTO, Johnathan has had the opportunity to speak, write articles and serve on various boards for a number of for-profit startups. He holds certifications in Windows, Novell and VMware, ushering AACC into the virtualized world in 2002.
  2. It’s important when we have a discussion about ‘Best practice’ that we first take a moment to consider the meaning and implications of the idea of best practice. “A best practice is a technique or methodology that, through experience and research, has been proven to reliably lead to a desired result.”So what is ‘best’ for one business may not be best for another, so in many circles of thinking on Service Management, such as ITIL, the term Good Practice is used, to define a process which is well formed and actually implemented to good use in one organization, and can at least be considered by other organizations. So today we are really going to be talking about GOOD practices, key ideas about how certain processes are undertaken within an organization and what has worked well, so that hopefully you can gain something from the shared experience.Of course this presentation is sponsored by Kaseya, and because our customer speaker today uses the Kaseya product, some of the information may be slightly specific to the platform, however even if you are not using or are not intending to use the same platform for Service and Systems Management, you can still gain insight from what processes have best gained from the adoption of a system to streamline them, which can help to either update your own use of a system or identify where perhaps some part of your process really does need a product to help get the best efficiency gains.
  3. It’s important when we have a discussion about ‘Best practice’ that we first take a moment to consider the meaning and implications of the idea of best practice. “A best practice is a technique or methodology that, through experience and research, has been proven to reliably lead to a desired result.”So what is ‘best’ for one business may not be best for another, so in many circles of thinking on Service Management, such as ITIL, the term Good Practice is used, to define a process which is well formed and actually implemented to good use in one organization, and can at least be considered by other organizations. So today we are really going to be talking about GOOD practices, key ideas about how certain processes are undertaken within an organization and what has worked well, so that hopefully you can gain something from the shared experience.Of course this presentation is sponsored by Kaseya, and because our customer speaker today uses the Kaseya product, some of the information may be slightly specific to the platform, however even if you are not using or are not intending to use the same platform for Service and Systems Management, you can still gain insight from what processes have best gained from the adoption of a system to streamline them, which can help to either update your own use of a system or identify where perhaps some part of your process really does need a product to help get the best efficiency gains.
  4. Discovery and Health of your IT InfrastructureGaining visibility into existing and newly acquired assets, in real-time.Even the basics of asset management cannot be accomplished if you cannot accurately track and uniquely identify every IT asset in your business, something as simple as a reconciliation against financial data becomes impossible without reliable accurate continuous discovery feeding all of your IT process.Keeping a current state of health on your infrastructureEvery other IT practice depends on the reliability of your discovery process to ensure that you know what is on your network at all times. Discovery is not just an audit, an audit is a snapshot in time as is out of date as soon as it is finished. You cannot manage what you cannot seePart of creating a reliable and stable environment is continuous management of all systems to a defined standard within the business. You can’t begin to even tackle this issue if you aren’t fully aware of every part of your environment. Even one device left off an audit or update process may leave a network out of compliance or with a security hole.Danny:Pro-active Network Audit - while working for a very well known Casino here in Australia (Mentioning no names), the casino’s due to heavy governance must only have Cisco kit, while assisting and training the local Systems & Network team during a Kaseya implementation, showing them the new discovery process, we detected 3 Dlink routers within the network, faces immediately went white and within minutes these devices were disconnected and removed. Via the Discovery Process we were able to determine the network information, device type and although these Dlinks were located in the test lab, due to heavy compliance regulation around the gaming industry these could not exist within the network . A Good example of things within a network or happening without IT’s knowledge that wouldn’t be found without regular approach to discovery
  5. 2. Manage through a single platforma) Picassos are the ‘artists’ which have their own unique approach to everything but are impossible to replicate and expensive to replace – learn to paint by numbers b) Now we’ve made those decisions how to make sure that everything happens? single pane of glass helps drive consistency through all disciplines and across all parts of the organization. One thing that we have seen proven time and again with our Service Provider customers is that it’s possible to ‘manage to perfection’ – example of worst and best customerc) Deciding policy and knowing what it is – examples of how those decisions are made, and managing risk – e.g. patchingDanny:Example 1: Patch Management, within one of our large Retail Clients machines with 100’s of stores, different local networks, their environment was patched differently on a ad-hoc basis according to what seemed like any engineers whim. So no consistency at all and no way of knowing what or how their environment was. Kaseya provided the ability for the organization to easily implement and deliver a standard patch policy across all POS & Back Office Servers across the countryThis saved weeks in man hours and allowed for reporting across the whole environment in one place for compliancy Example 2. Pitcher Partners, Group Policy – issues applying group policy and replication from one site to another. Kaseya allows for policy from a single pain, alerting around policy and or procedures when fail rather than having to keep running Gpupdateetc
  6. 3. Quickly and easily gain accessOften times every different system has its own methodology for access, whether the actual UI is a web interface or local app, often separate accounts with their own security controls, VPN’s to get to remote sites, often giving more access than is required to gt the job done. It also all leaves a lot of administration overhead and makes managing security complex. Good practice for access means having a consistent approach through a single UI with one security context for immediate setup or disablement, and complete auditability on all actions, every action and process carefully recorded. Danny– Service Providers typically required SSL VPN’s to clients, permission over AD from one site to another - Kaseya improved efficiency by enforcing single approach to remote access to everything no matter where the device is in the world, whether in the corporate network or not
  7. 4. Automate monitoring and remediationMonitoring is much more than just a ping – connectivity is important, but not the whole story – “The Mainframe is down”, need to have smart monitoring that is looking deeper to get the real story.And monitoring on it’s own in not pro-active, users notice before you can. Looking for the signs of problems and then taking an automated response – may be as simple as print spooler errorAutomated monitoring means that it is applied by policy, and enforced constantly to ensure correct operation – who watches the watchmanComplete integration is important – with everything in one system & Ensuring items that are discovered get the right response at the right time Danny examples: Automating virus response – remove the device from the network to separate Vlan, alerting user and administrator – client in ozRebel, DB re-indexing required remote control, diagnosining, this was achieved via a simple drop down field within service desk to trigger remediation advising user throughout the process of the fix as to the progress. If failed re-appear in the IT admins queue, IF successful was automatically closed and re-launched software and advised user with pop up and messageService Desk examples from Siax and Geek – automation for performance with diagnostics within Service Desk Ray: Examples where diagnosis is already in the tickets
  8. Automating recurring IT tasksPatch UpdatesStandardization of ProcessesEveryone is always being tasked to do more with less. As complexity increases with systems, rules and regulations it becomes difficult to automate much of the daily tasks to ensure the overall health, wellness and security. Kaseya is all about automation, which can mean many things… one of which is applying one thing to many machines, Like Patch. Patch management example of automating deployment based on policy across all machines, handling file downloads centrally and dealing with reboots in a way that doesn’t impact users.By using a policy based approach to important tasks such as deployment and security we can ensure consistency of approach to minimize network and user impact. Auomated systems run the process directly on the machines so they can be done out of hours or even while users are working without disturbing them.Danny: (Keeping Johnathons points in relation to Australia Examples such as Billabong, able to rein in their Asia Pac and eurpope network under one pain of glass with policy applied to all machine roles – no longer outsourcing and have centralized operations locally.. Another example Jason R servicing Pharmacies around NSW seemlessly) How has a systems management solution like Kaseya allowed you to automate the management of deployment such as patches and everything that comes along with that like rebooting machines, or making sure the right machines get the right patches? IPART : Reg scan and clean each morning irradicating the need for engineers to manually fix legacy software issues
  9. Automating recurring IT tasksPatch UpdatesStandardization of ProcessesEveryone is always being tasked to do more with less. As complexity increases with systems, rules and regulations it becomes difficult to automate much of the daily tasks to ensure the overall health, wellness and security. Kaseya is all about automation, which can mean many things… one of which is applying one thing to many machines, Like Patch. Patch management example of automating deployment based on policy across all machines, handling file downloads centrally and dealing with reboots in a way that doesn’t impact users.By using a policy based approach to important tasks such as deployment and security we can ensure consistency of approach to minimize network and user impact. Auomated systems run the process directly on the machines so they can be done out of hours or even while users are working without disturbing them.Danny : What Policy really means to us, MSP’s not realising that critical servers events were not being captured, now with Kaseya’s Policy manager monitoring through to software, patch and maintenance are performed and delivered automatically as soon as the agent is deployedExample : WOL, maintenance of workstations performed out of hours recorded and reported against according to set schedules Automation of policy delivery according to machine role and org Compliance for Government dept
  10. Automating recurring IT tasksPatch UpdatesStandardization of ProcessesEveryone is always being tasked to do more with less. As complexity increases with systems, rules and regulations it becomes difficult to automate much of the daily tasks to ensure the overall health, wellness and security. Kaseya is all about automation, which can mean many things… one of which is applying one thing to many machines, Like Patch. Patch management example of automating deployment based on policy across all machines, handling file downloads centrally and dealing with reboots in a way that doesn’t impact users.By using a policy based approach to important tasks such as deployment and security we can ensure consistency of approach to minimize network and user impact. Auomated systems run the process directly on the machines so they can be done out of hours or even while users are working without disturbing them.
  11. Automating recurring IT tasksPatch UpdatesStandardization of ProcessesEveryone is always being tasked to do more with less. As complexity increases with systems, rules and regulations it becomes difficult to automate much of the daily tasks to ensure the overall health, wellness and security. Kaseya is all about automation, which can mean many things… one of which is applying one thing to many machines, Like Patch. Patch management example of automating deployment based on policy across all machines, handling file downloads centrally and dealing with reboots in a way that doesn’t impact users.By using a policy based approach to important tasks such as deployment and security we can ensure consistency of approach to minimize network and user impact. Auomated systems run the process directly on the machines so they can be done out of hours or even while users are working without disturbing them.Jonathan:How has a systems management solution like Kaseya allowed you to automate the management of deployment such as patches and everything that comes along with that like rebooting machines, or making sure the right machines get the right patches?
  12. Automating recurring IT tasksPatch UpdatesStandardization of ProcessesEveryone is always being tasked to do more with less. As complexity increases with systems, rules and regulations it becomes difficult to automate much of the daily tasks to ensure the overall health, wellness and security. Kaseya is all about automation, which can mean many things… one of which is applying one thing to many machines, Like Patch. Patch management example of automating deployment based on policy across all machines, handling file downloads centrally and dealing with reboots in a way that doesn’t impact users.By using a policy based approach to important tasks such as deployment and security we can ensure consistency of approach to minimize network and user impact. Auomated systems run the process directly on the machines so they can be done out of hours or even while users are working without disturbing them.Jonathan:How has a systems management solution like Kaseya allowed you to automate the management of deployment such as patches and everything that comes along with that like rebooting machines, or making sure the right machines get the right patches?
  13. Needs to be cleaned up.