SlideShare uma empresa Scribd logo
1 de 26
© 2012 IBM Corporation1
IBM Endpoint Manager
Continuously monitor the health and security of all enterprise computers in real-time
via a single, policy-driven agent
Endpoints
• One infrastructure:
management
server, console, agent for
Windows, Mac, Unix, Linux,
Mobile
• Scales to 250,000 endpoints
per management server
• Robust, flexible architecture
with built-in failover
• Nearly-invisible impact to
network, endpoints
• Operates in low-bandwidth /
high-latency environments
• Physical or virtual, network or
Internet-connected
IBM Endpoint Manager
Patch
Management
Lifecycle
Management
Software Use
Analysis
Power
Management
Mobile
Devices
Security and
Compliance
Core
Protection
Desktop / laptop / server endpoint Mobile Purpose specific
Systems Management Security Management
Server
Automation
© 2012 IBM Corporation2
Security &
Compliance
Vulnerability Assessment
Compliance Analytics
3rd Party Endpoint
Protection Management
Patch
Management
Security Configuration
Management
Core
Protection
Anti-Malware
Firewall
Data Protection
(add-on)
Patch
Management
Offline VM
Patching
Application
Patching
OS
Patching
Mobile
Devices
Compliance
App Mgmt
Mobile
Device Mgmt
The IBM Endpoint Manager Family
Middleware Management
Multi-Platform OS Deployment
Physical & Virtual
Server Lifecycle Management
Cross-Server Sequenced Task
Automation (e.g. Patch OS on
Server Cluster)
Server
Automation
Power
Management
Windows &
Macs
Carbon, cost
reduction reports
End-user
Dashboard
Lifecycle
Management
Software
Distribution
OS Deployment
Remote Control
Patch
Management
Basic HW &
SW Inventory
Starter
Kit
TPM
evolution
Software Use
Analysis
Software Catalog
Correlation
Software Usage
Reporting
Software
Inventory
TADd / ILMT
convergence
App, PIM
Containers
Self-Quarantine
Starter
Kit
© 2012 IBM Corporation3
Stores / Kiosks
WAN
Data center
Headquarters
Remote offices
Distribution center
Internet
WiFi
Airport
Hotel
Coffee shop
Home
Leased line
3G
WiFi
IBM Endpoint Manager, built on BigFix technology
Whether it’s a Mac connecting from hotel WiFi, a Windows laptop at 30K feet or a Red Hat Linux Server
in your data center, IBM Endpoint Manager has it covered. In real time, at any scale.
Satellite
Network-friendly architecture delivers
large packages without disrupting critical
business applications
Single, intelligent
agent uses <2%
CPU, <10MB RAM
Cloud-based service
continuously provides
new patch, policy
updates
Full command and
control of Internet-
connected devices
Use existing computers
as Relays to minimize
network traffic
Content Update
Service
Leased
line
© 2012 IBM Corporation4
IBM Endpoint Manager elements
Single server and console
• Highly secure, highly available
• Aggregates data, analyzes and reports
• Manages up to 250K endpoints per server
Flexible policy language (Fixlets)
• Thousands of out-of-the-box policies
• Best practices for operations and security
• Simple custom policy authoring
• Highly extensible/applicable across all platforms
Virtual infrastructure
• Designate IBM Endpoint Manager agent as a relay
or discovery point in minutes
• Provides built-in redundancy
• Leverages existing systems/shared infrastructure
Single intelligent agent
• Continuous self-assessment
• Continuous policy enforcement
• Minimal system impact (<2% CPU, <10MB RAM)
© 2012 IBM Corporation5
What’s New in IBM Endpoint Manager for Power Management
More granular power tracking to allow breakdown of weekly power
consumption and idle time
Two new historical web reports to reflect the weekly power tracking
data
Enhancements to power profile wizard to allow creation of 'multiple
power profile policy'
Enhancements to Client side dashboard to show the projected impact
of applying a single power profile offer
BES Server Plug-in Service enhanced to use encrypted passwords
© 2012 IBM Corporation6
Software Asset Management
IBM Endpoint Manager enables software asset management
Endpoint Management
Systems
Management
Security
Management
Common agent
Unified console
Single mgmt
server
Managed = Secure
Desktops, Laptops
,
& Servers
Smartphones
& Tablets
Purpose-specific
Endpoints
Save $20-$50 per computer per
year
Contribute to organizational
“Green” initiatives
Empower end-user participation
© 2012 IBM Corporation7
Annual Energy Cost Savings
 Granular policy setting and continuous
enforcement. Fine-grained controls for
hibernation/standby, subsystem-only
shutdown, and save-work-before-shutdown
options that can be enforced at the
endpoint
Create and deploy complex power profiles
that support applications by time of day
and day of week
 Flexible targeting.
Individuals, groups, buildings, hardware
manufacturers, models, Active Directory
OUs, and more
 Multi-platform. Windows, Windows
Servers, and Mac OS X
 Coordinate with HVAC. Export detailed
reports and scheduling to coordinate with
HVAC systems for additional savings.
How do I directly improve the bottom line without impacting headcount?
Many utility companies offer rebates for the
purchase of PC power management tools such as
IBM Endpoint Manager. These rebates can cover
most, if not all, of the purchase price.
© 2012 IBM Corporation8
Enable IT Maintenance
 Scheduling. Schedule Wake from
Standby, Distributed Wake-on-LAN, and
Last Man Standing or wake up
individual, groups of computers as needed
without impacting the schedule
 Patch management integration. Use a
single solution for patch and power
management to ensure updates are
applied in a timely fashion
 Cures PC Insomnia. Intelligently
measures user idle time, overcomes issue
where computers don’t enter standby when
they should
 Minimal infrastructure impact. Installs in
just hours, nearly invisible impact to
network and endpoints with small agent
footprint and on-endpoint monitoring and
enforcement.
How do I ensure power management activities don’t impact other IT management
needs?
High-level reports help administrators understand
their environment, and provide easy access to drill-
down details.
© 2012 IBM Corporation9
“Green” Initiatives
How do I contribute to larger organizational “Green” initiatives and marketing
 Green reporting. Easily produce reports on CO2 reductions, translated into “trees planted”
or “cars taken off the road”
 Modeling. Before implementing a PC power management program, model multiple
scenarios to determine how “green” you can get
 Accuracy. Override power and CO2 assumptions by hardware profile, location, and monitor
type for custom reporting
© 2012 IBM Corporation10
End User Participation
How do I get end users on board with this project?
 Opt-in profiles. Create multiple power
profiles and let users opt-in to the one that
best fits their needs. Typically users opt-in
to a much stricter profile than they would
have tolerated under a mandatory
approach.
 Client-side dashboard. End users can
see their unique savings and green
impact or change to a different profile
from their desktop
 Auto save. Automatically save work prior
to shut down
 Remote wake-up. Wake up just their
machine remotely from a web page.
 Extend hardware life, employee
productivity. Schedule older computers
to wake-up 30 minutes early so it is fully
booted up when the employee arrives
“Brand” your power profiles with names that
match organizational “green” initiatives and
watch as end users volunteer for stricter policies
(and greater savings)
© 2012 IBM Corporation11
Penn State
Power-savings initiative expected to deliver $800,000 annual savings
The need:
With energy costs doubling, Penn State looked to reduce unnecessary
power consumption from leaving classroom, lab, and departmental
computers on, when they were not in use.
The solution:
The University implemented an endpoint management solution that
combines power, lifecycle, patch and security management to reduce
energy costs while improving the reliability and security of campus
computers.
The benefit:
 Reduced energy costs by US$288,000 per year with annual savings
expected to reach US$800,000
 Decreased IT time required to manage classroom and lab computers
 Improved security with faster deployment of patches and software
applications
“We expect almost
US$800,000 in annual
savings, once all of our
approximately 20,000
workstations are under Tivoli
Endpoint Manager and
similar power management
settings are applied.”
—Chris
Sacksteder, Manager, Systems
Development Group, Penn State
Solution components:
 IBM Endpoint Manager for
Power Management
 IBM Endpoint Manger for
Lifecycle Management
TIP14388-USEN-00
© 2012 IBM Corporation12
BACKUP SLIDES
• Additional Case Studies
• Screen Shots
© 2012 IBM Corporation13
St Vincents & Mater Health Sydney (SV&MHS)
Gaining visibility, control and compliance over PCs
The need:
The IT staff at SV&MHS manages more than 2,700 PCs. With a diverse set of
academic, medical practitioner and administrative users, the IT team must provide
access to the latest technologies while protecting patient privacy. The IT team
also wanted to reduce energy usage and computing costs through PC power
management and efficient security configuration, patch compliance and license
management.
The solution:
Using IBM® Tivoli® Endpoint Manager, built on BigFix technology, SV&MHS
has a single solution for patch management, configuration compliance, power
management, asset discovery and software usage reporting. The software’s ability
to operate outside of direct network connections has provided SV&MHS with
visibility and control over 100 percent of the PCs the IT team supports.
The benefit:
 Significantly mitigated risk exposure while also improving regulatory compliance
 Freed up IT staff to execute additional strategic projects
 Realized cost savings through PC power management and the elimination of
software licenses
“We now have a rich systems
remediation platform from which
to deploy endpoint security.
Once we discovered the power
management and application
deployment capabilities, we
knew we had found the
complete solution we were
looking for.”
—Peter Param, IT Security Manager, St
Vincents & Mater Health Sydney
Solution components:
 IBM Endpoint Manager for
Power Management
 IBM Endpoint Manager for
Security & Compliance
 IBM Endpoint Manager for
Software Use Analysis
TIP14316-USEN-00
© 2012 IBM Corporation14
Power Consumption Spectrum
© 2012 IBM Corporation15
Computer Power State Behavior
Computers are idle
for 17 hours per day
© 2012 IBM Corporation16
Power Management Settings Over Time
80% of computers
now have standby
enabled
© 2012 IBM Corporation17
Model Power Savings
© 2012 IBM Corporation18
18
Configure Office Hours Assumption
 Use Office Hours Assumptions tab under Manage Assumptions Task
Wizard to configure Office hours and Workdays.
 The settings can be set for each individual computer and use its local time.
 By default, the Office Hours are set from 9:00 a.m. to 6:00 p.m., and
Workdays are set from Monday to Friday.
© 2012 IBM Corporation19
19
New properties added to Power Consumption Analysis
 Computer Power Usage in kWh Last Week (Office Hours)
 Computer Power Usage in CO2 Last Week (Office Hours)
 Computer Power Usage in Cost Last Week (Office Hours)
 Time in idle state in hours last week (Office Hours)
 Time in logged off state in hours last week (Office Hours)
 Number of Office Hours Per Week
 Computer Power Usage in kWh Last Week (Outside Office Hours - Workdays)
 Computer Power Usage in CO2 Last Week (Outside Office Hours - Workdays)
 Computer Power Usage in Cost Last Week (Outside Office Hours - Workdays)
 Time in idle state in hours last week (Outside Office Hours - Workdays)
 Time in logged off state in hours last week (Outside Office Hours - Workdays)
 Number of Outside Office Hours (Workdays) Per Week
 Computer Power Usage in kWh Last Week (Weekend)
 Computer Power Usage in CO2 Last Week (Weekend)
 Computer Power Usage in Cost Last Week (Weekend)
 Time in idle state in hours last week (Weekend)
 Time in logged off state in hours last week (Weekend)
 Number of Weekend Hours Per Week
 Time in active state in hours last week
 Monitor On Time in Hours Last Week
 Office Hours Assumption (Name, ID)
© 2012 IBM Corporation20
20
What’s new in Power Consumption Summary Dashboard
 Additional usage scenarios added to the power consumption spectrum
– No Idle Time Outside Office Hours
– No Idle Time During Weekends
 The potential savings resulting from each of the scenarios are listed in the table below
 Calculations are based on the results of the new analysis properties added for last week
(Instead of Average per day values)
© 2012 IBM Corporation21
21
 Idle Time Breakdown per computer table for Last Week added
 The total tracked computers table shows computers “Removed due to insufficient data”
– These are computers which have less than a week's worth of data
[Demo]
What’s new in Power Consumption Summary Dashboard
© 2012 IBM Corporation22
22
Power Management Web Reports
 Two new web reports added:
– Weekly Idle Time Breakdown Over Time
– Weekly Power Consumption Over Time
 These reports provide trend analysis by displaying the weekly power
consumption and weekly idle time breakdown in a deployment as a
stacked area chart.
© 2012 IBM Corporation23
23
Power Management Web Reports
 Support for relative date inputs added to all historical web reports.
– Provides a convenient way to select date inputs
– Gives option to store the generated reports together with relative date inputs.
 Improved accuracy and performance.
– There are changes made to Power Consumption Over Time to improve accuracy of
power calculations. A custom report that highlights the calculation differences is
available for download.
[Demo]
© 2012 IBM Corporation24
24
“Create Power Profile Fixlet” Wizard
 “Multiple Profile Policy” tab added in Power Profile wizard to allow creation of fixlet
that sets multiple profiles by time of day and day of week
– The action needs to run as a policy to take advantage of this feature
• Single power profile option can now be used by the client side dashboard to
display the effect of applying the power profile/profiles, if the action is
presented as an offer to the client.
© 2012 IBM Corporation25
25
Client Side Dashboard
 Client Side Dashboard has been enhanced to show scenario analysis of applying
a particular power profile on the endpoint and give control to the user to select the
power profile to be applied on their system.
[Demo]
© 2012 IBM Corporation26
26
BES Server Plug-in Service (under BES Support site)
 BES Server Plug-in Service has been enhanced to use encrypted
passwords.
 Use BES Server Plug-in Service configuration wizard to configure BES
Server Plug-in.
[Demo]

Mais conteúdo relacionado

Mais procurados

Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldQuest
 
Modern Infrastructure - Mace
Modern Infrastructure - Mace Modern Infrastructure - Mace
Modern Infrastructure - Mace Prolifics
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementQuest
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Sverige
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1Paul O'Doherty
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...Leif Davidsen
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pMicrosoft Singapore
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud ComputingScientia Groups
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
A Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate PresentationA Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate PresentationRobert Atkins
 
2.ibm flex system manager overview
2.ibm flex system manager overview2.ibm flex system manager overview
2.ibm flex system manager overviewsolarisyougood
 
How Remote infrastructure Management works
How Remote infrastructure Management worksHow Remote infrastructure Management works
How Remote infrastructure Management worksJayashree Skylark
 
Ibm PureApplication system
Ibm PureApplication systemIbm PureApplication system
Ibm PureApplication systemkhawkwf
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Eduardo Patrocinio
 

Mais procurados (20)

BigFix White Paper
BigFix White PaperBigFix White Paper
BigFix White Paper
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
IBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systemsIBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systems
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Modern Infrastructure - Mace
Modern Infrastructure - Mace Modern Infrastructure - Mace
Modern Infrastructure - Mace
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
 
VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1VMworld Revisited; VMware View & vSphere 4.1
VMworld Revisited; VMware View & vSphere 4.1
 
The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...The bits bytes and business benefits of securing your mq environment and mess...
The bits bytes and business benefits of securing your mq environment and mess...
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_p
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
A Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate PresentationA Better Solution Limited Corporate Presentation
A Better Solution Limited Corporate Presentation
 
2.ibm flex system manager overview
2.ibm flex system manager overview2.ibm flex system manager overview
2.ibm flex system manager overview
 
NZS-1543 - How IBM Service Management Unite Helps Mainframe O
NZS-1543 - How IBM Service Management Unite Helps Mainframe ONZS-1543 - How IBM Service Management Unite Helps Mainframe O
NZS-1543 - How IBM Service Management Unite Helps Mainframe O
 
How Remote infrastructure Management works
How Remote infrastructure Management worksHow Remote infrastructure Management works
How Remote infrastructure Management works
 
IBM PureSystems
IBM PureSystemsIBM PureSystems
IBM PureSystems
 
Ibm PureApplication system
Ibm PureApplication systemIbm PureApplication system
Ibm PureApplication system
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 

Semelhante a IBM Endpoint Manger for Power Management (Overview)

Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device ManagementIBM Danmark
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM Events
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus KeynoteStephen Rose
 
IT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldIT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldEMC
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Green Your IT Enterprise In 2010
Green Your IT Enterprise In 2010Green Your IT Enterprise In 2010
Green Your IT Enterprise In 2010Terell Jones
 
IBM Endpoint Data Sheet
IBM Endpoint Data SheetIBM Endpoint Data Sheet
IBM Endpoint Data SheetÉric Guay
 
Green it initiatives
Green it initiativesGreen it initiatives
Green it initiativesAparna Bulusu
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDNUG e.V.
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesAl Sabawi
 
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013IBM Switzerland
 
10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3Jennifer Phillips
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer Englishcynapspro GmbH
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieCor Ranzijn
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM Security
 

Semelhante a IBM Endpoint Manger for Power Management (Overview) (20)

Unified Device Management
Unified Device ManagementUnified Device Management
Unified Device Management
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & WieckIBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
IBM InterConnect 2013 Expert Integrated Systems Keynote: Sotiropoulos & Wieck
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
IT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined WorldIT Ops Mgmt in the New Virtualized, Software-defined World
IT Ops Mgmt in the New Virtualized, Software-defined World
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Green Your IT Enterprise In 2010
Green Your IT Enterprise In 2010Green Your IT Enterprise In 2010
Green Your IT Enterprise In 2010
 
IBM Endpoint Data Sheet
IBM Endpoint Data SheetIBM Endpoint Data Sheet
IBM Endpoint Data Sheet
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Green it initiatives
Green it initiativesGreen it initiatives
Green it initiatives
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium Businesses
 
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
 
10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3
 
PowerPro Flyer English
PowerPro Flyer EnglishPowerPro Flyer English
PowerPro Flyer English
 
Infrastructure Matters
Infrastructure MattersInfrastructure Matters
Infrastructure Matters
 
Managed Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategieManaged Mobility Services: Implementing a true mobile strategie
Managed Mobility Services: Implementing a true mobile strategie
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
SCCM 2012 Presentation
SCCM 2012 PresentationSCCM 2012 Presentation
SCCM 2012 Presentation
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

IBM Endpoint Manger for Power Management (Overview)

  • 1. © 2012 IBM Corporation1 IBM Endpoint Manager Continuously monitor the health and security of all enterprise computers in real-time via a single, policy-driven agent Endpoints • One infrastructure: management server, console, agent for Windows, Mac, Unix, Linux, Mobile • Scales to 250,000 endpoints per management server • Robust, flexible architecture with built-in failover • Nearly-invisible impact to network, endpoints • Operates in low-bandwidth / high-latency environments • Physical or virtual, network or Internet-connected IBM Endpoint Manager Patch Management Lifecycle Management Software Use Analysis Power Management Mobile Devices Security and Compliance Core Protection Desktop / laptop / server endpoint Mobile Purpose specific Systems Management Security Management Server Automation
  • 2. © 2012 IBM Corporation2 Security & Compliance Vulnerability Assessment Compliance Analytics 3rd Party Endpoint Protection Management Patch Management Security Configuration Management Core Protection Anti-Malware Firewall Data Protection (add-on) Patch Management Offline VM Patching Application Patching OS Patching Mobile Devices Compliance App Mgmt Mobile Device Mgmt The IBM Endpoint Manager Family Middleware Management Multi-Platform OS Deployment Physical & Virtual Server Lifecycle Management Cross-Server Sequenced Task Automation (e.g. Patch OS on Server Cluster) Server Automation Power Management Windows & Macs Carbon, cost reduction reports End-user Dashboard Lifecycle Management Software Distribution OS Deployment Remote Control Patch Management Basic HW & SW Inventory Starter Kit TPM evolution Software Use Analysis Software Catalog Correlation Software Usage Reporting Software Inventory TADd / ILMT convergence App, PIM Containers Self-Quarantine Starter Kit
  • 3. © 2012 IBM Corporation3 Stores / Kiosks WAN Data center Headquarters Remote offices Distribution center Internet WiFi Airport Hotel Coffee shop Home Leased line 3G WiFi IBM Endpoint Manager, built on BigFix technology Whether it’s a Mac connecting from hotel WiFi, a Windows laptop at 30K feet or a Red Hat Linux Server in your data center, IBM Endpoint Manager has it covered. In real time, at any scale. Satellite Network-friendly architecture delivers large packages without disrupting critical business applications Single, intelligent agent uses <2% CPU, <10MB RAM Cloud-based service continuously provides new patch, policy updates Full command and control of Internet- connected devices Use existing computers as Relays to minimize network traffic Content Update Service Leased line
  • 4. © 2012 IBM Corporation4 IBM Endpoint Manager elements Single server and console • Highly secure, highly available • Aggregates data, analyzes and reports • Manages up to 250K endpoints per server Flexible policy language (Fixlets) • Thousands of out-of-the-box policies • Best practices for operations and security • Simple custom policy authoring • Highly extensible/applicable across all platforms Virtual infrastructure • Designate IBM Endpoint Manager agent as a relay or discovery point in minutes • Provides built-in redundancy • Leverages existing systems/shared infrastructure Single intelligent agent • Continuous self-assessment • Continuous policy enforcement • Minimal system impact (<2% CPU, <10MB RAM)
  • 5. © 2012 IBM Corporation5 What’s New in IBM Endpoint Manager for Power Management More granular power tracking to allow breakdown of weekly power consumption and idle time Two new historical web reports to reflect the weekly power tracking data Enhancements to power profile wizard to allow creation of 'multiple power profile policy' Enhancements to Client side dashboard to show the projected impact of applying a single power profile offer BES Server Plug-in Service enhanced to use encrypted passwords
  • 6. © 2012 IBM Corporation6 Software Asset Management IBM Endpoint Manager enables software asset management Endpoint Management Systems Management Security Management Common agent Unified console Single mgmt server Managed = Secure Desktops, Laptops , & Servers Smartphones & Tablets Purpose-specific Endpoints Save $20-$50 per computer per year Contribute to organizational “Green” initiatives Empower end-user participation
  • 7. © 2012 IBM Corporation7 Annual Energy Cost Savings  Granular policy setting and continuous enforcement. Fine-grained controls for hibernation/standby, subsystem-only shutdown, and save-work-before-shutdown options that can be enforced at the endpoint Create and deploy complex power profiles that support applications by time of day and day of week  Flexible targeting. Individuals, groups, buildings, hardware manufacturers, models, Active Directory OUs, and more  Multi-platform. Windows, Windows Servers, and Mac OS X  Coordinate with HVAC. Export detailed reports and scheduling to coordinate with HVAC systems for additional savings. How do I directly improve the bottom line without impacting headcount? Many utility companies offer rebates for the purchase of PC power management tools such as IBM Endpoint Manager. These rebates can cover most, if not all, of the purchase price.
  • 8. © 2012 IBM Corporation8 Enable IT Maintenance  Scheduling. Schedule Wake from Standby, Distributed Wake-on-LAN, and Last Man Standing or wake up individual, groups of computers as needed without impacting the schedule  Patch management integration. Use a single solution for patch and power management to ensure updates are applied in a timely fashion  Cures PC Insomnia. Intelligently measures user idle time, overcomes issue where computers don’t enter standby when they should  Minimal infrastructure impact. Installs in just hours, nearly invisible impact to network and endpoints with small agent footprint and on-endpoint monitoring and enforcement. How do I ensure power management activities don’t impact other IT management needs? High-level reports help administrators understand their environment, and provide easy access to drill- down details.
  • 9. © 2012 IBM Corporation9 “Green” Initiatives How do I contribute to larger organizational “Green” initiatives and marketing  Green reporting. Easily produce reports on CO2 reductions, translated into “trees planted” or “cars taken off the road”  Modeling. Before implementing a PC power management program, model multiple scenarios to determine how “green” you can get  Accuracy. Override power and CO2 assumptions by hardware profile, location, and monitor type for custom reporting
  • 10. © 2012 IBM Corporation10 End User Participation How do I get end users on board with this project?  Opt-in profiles. Create multiple power profiles and let users opt-in to the one that best fits their needs. Typically users opt-in to a much stricter profile than they would have tolerated under a mandatory approach.  Client-side dashboard. End users can see their unique savings and green impact or change to a different profile from their desktop  Auto save. Automatically save work prior to shut down  Remote wake-up. Wake up just their machine remotely from a web page.  Extend hardware life, employee productivity. Schedule older computers to wake-up 30 minutes early so it is fully booted up when the employee arrives “Brand” your power profiles with names that match organizational “green” initiatives and watch as end users volunteer for stricter policies (and greater savings)
  • 11. © 2012 IBM Corporation11 Penn State Power-savings initiative expected to deliver $800,000 annual savings The need: With energy costs doubling, Penn State looked to reduce unnecessary power consumption from leaving classroom, lab, and departmental computers on, when they were not in use. The solution: The University implemented an endpoint management solution that combines power, lifecycle, patch and security management to reduce energy costs while improving the reliability and security of campus computers. The benefit:  Reduced energy costs by US$288,000 per year with annual savings expected to reach US$800,000  Decreased IT time required to manage classroom and lab computers  Improved security with faster deployment of patches and software applications “We expect almost US$800,000 in annual savings, once all of our approximately 20,000 workstations are under Tivoli Endpoint Manager and similar power management settings are applied.” —Chris Sacksteder, Manager, Systems Development Group, Penn State Solution components:  IBM Endpoint Manager for Power Management  IBM Endpoint Manger for Lifecycle Management TIP14388-USEN-00
  • 12. © 2012 IBM Corporation12 BACKUP SLIDES • Additional Case Studies • Screen Shots
  • 13. © 2012 IBM Corporation13 St Vincents & Mater Health Sydney (SV&MHS) Gaining visibility, control and compliance over PCs The need: The IT staff at SV&MHS manages more than 2,700 PCs. With a diverse set of academic, medical practitioner and administrative users, the IT team must provide access to the latest technologies while protecting patient privacy. The IT team also wanted to reduce energy usage and computing costs through PC power management and efficient security configuration, patch compliance and license management. The solution: Using IBM® Tivoli® Endpoint Manager, built on BigFix technology, SV&MHS has a single solution for patch management, configuration compliance, power management, asset discovery and software usage reporting. The software’s ability to operate outside of direct network connections has provided SV&MHS with visibility and control over 100 percent of the PCs the IT team supports. The benefit:  Significantly mitigated risk exposure while also improving regulatory compliance  Freed up IT staff to execute additional strategic projects  Realized cost savings through PC power management and the elimination of software licenses “We now have a rich systems remediation platform from which to deploy endpoint security. Once we discovered the power management and application deployment capabilities, we knew we had found the complete solution we were looking for.” —Peter Param, IT Security Manager, St Vincents & Mater Health Sydney Solution components:  IBM Endpoint Manager for Power Management  IBM Endpoint Manager for Security & Compliance  IBM Endpoint Manager for Software Use Analysis TIP14316-USEN-00
  • 14. © 2012 IBM Corporation14 Power Consumption Spectrum
  • 15. © 2012 IBM Corporation15 Computer Power State Behavior Computers are idle for 17 hours per day
  • 16. © 2012 IBM Corporation16 Power Management Settings Over Time 80% of computers now have standby enabled
  • 17. © 2012 IBM Corporation17 Model Power Savings
  • 18. © 2012 IBM Corporation18 18 Configure Office Hours Assumption  Use Office Hours Assumptions tab under Manage Assumptions Task Wizard to configure Office hours and Workdays.  The settings can be set for each individual computer and use its local time.  By default, the Office Hours are set from 9:00 a.m. to 6:00 p.m., and Workdays are set from Monday to Friday.
  • 19. © 2012 IBM Corporation19 19 New properties added to Power Consumption Analysis  Computer Power Usage in kWh Last Week (Office Hours)  Computer Power Usage in CO2 Last Week (Office Hours)  Computer Power Usage in Cost Last Week (Office Hours)  Time in idle state in hours last week (Office Hours)  Time in logged off state in hours last week (Office Hours)  Number of Office Hours Per Week  Computer Power Usage in kWh Last Week (Outside Office Hours - Workdays)  Computer Power Usage in CO2 Last Week (Outside Office Hours - Workdays)  Computer Power Usage in Cost Last Week (Outside Office Hours - Workdays)  Time in idle state in hours last week (Outside Office Hours - Workdays)  Time in logged off state in hours last week (Outside Office Hours - Workdays)  Number of Outside Office Hours (Workdays) Per Week  Computer Power Usage in kWh Last Week (Weekend)  Computer Power Usage in CO2 Last Week (Weekend)  Computer Power Usage in Cost Last Week (Weekend)  Time in idle state in hours last week (Weekend)  Time in logged off state in hours last week (Weekend)  Number of Weekend Hours Per Week  Time in active state in hours last week  Monitor On Time in Hours Last Week  Office Hours Assumption (Name, ID)
  • 20. © 2012 IBM Corporation20 20 What’s new in Power Consumption Summary Dashboard  Additional usage scenarios added to the power consumption spectrum – No Idle Time Outside Office Hours – No Idle Time During Weekends  The potential savings resulting from each of the scenarios are listed in the table below  Calculations are based on the results of the new analysis properties added for last week (Instead of Average per day values)
  • 21. © 2012 IBM Corporation21 21  Idle Time Breakdown per computer table for Last Week added  The total tracked computers table shows computers “Removed due to insufficient data” – These are computers which have less than a week's worth of data [Demo] What’s new in Power Consumption Summary Dashboard
  • 22. © 2012 IBM Corporation22 22 Power Management Web Reports  Two new web reports added: – Weekly Idle Time Breakdown Over Time – Weekly Power Consumption Over Time  These reports provide trend analysis by displaying the weekly power consumption and weekly idle time breakdown in a deployment as a stacked area chart.
  • 23. © 2012 IBM Corporation23 23 Power Management Web Reports  Support for relative date inputs added to all historical web reports. – Provides a convenient way to select date inputs – Gives option to store the generated reports together with relative date inputs.  Improved accuracy and performance. – There are changes made to Power Consumption Over Time to improve accuracy of power calculations. A custom report that highlights the calculation differences is available for download. [Demo]
  • 24. © 2012 IBM Corporation24 24 “Create Power Profile Fixlet” Wizard  “Multiple Profile Policy” tab added in Power Profile wizard to allow creation of fixlet that sets multiple profiles by time of day and day of week – The action needs to run as a policy to take advantage of this feature • Single power profile option can now be used by the client side dashboard to display the effect of applying the power profile/profiles, if the action is presented as an offer to the client.
  • 25. © 2012 IBM Corporation25 25 Client Side Dashboard  Client Side Dashboard has been enhanced to show scenario analysis of applying a particular power profile on the endpoint and give control to the user to select the power profile to be applied on their system. [Demo]
  • 26. © 2012 IBM Corporation26 26 BES Server Plug-in Service (under BES Support site)  BES Server Plug-in Service has been enhanced to use encrypted passwords.  Use BES Server Plug-in Service configuration wizard to configure BES Server Plug-in. [Demo]