SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
@TechTrainerTim techtrainertim.com
AUTHOR/TECH EVANGELIST, PLURALSIGHT
Tim Warner
Predicting the Future of Endpoint
Management in a Mobile World
Define our terms
Review endpoint systems management trends
Present an endpoint management “wish list”
Overview
Relevant vocabulary
An Internet-capable computer hardware device on a
TCP/IP network.
Endpoint device
timw.info/ed
Endpoint Examples
Server and desktop PCs (Windows, Linux, macOS)
Laptop PC
Thin-client devices (Chromebooks)
Tablet
Smartphone
Printers
POS systems
IoT devices (smart meters)
Bring Your Own Device. The policy of permitting employees
to bring personally owned devices to their workplace, and to
to use those devices to access privileged company
information and applications.
BYOD
timw.info/byod
Customer Owned, Personally Enabled. A policy in which the
company purchases the devices to provide to their
employees; the functionality of a private device is enabled to
to allow personal usage.
COPE
timw.info/byod
Endpoint systems management trends
Mobile Workforce Trends
“Road
warrior”
salespeople
Broadband
home office
workers
BYOD
Endpoint Device Confetti
One user, multiple devices Fragmentation
Open-source components 0-day vulnerabilities
Endpoint Device Confetti
This situation is made worse with non-integrated management
systems
Lack of Enforcement
How can you detect and
remediate compromised
systems?
Lack of Policy
How well documented is
your inventory?
Compliance reports?
Lack of Visibility
Can you view all
endpoints, in all their
forms, through a “single
pane of glass”?
Security Hazards
Endpoint management “wish list”
Service desk/support
Application
deployment
Patch management
Compliance
evaluation
OSD (and licensing)Asset management
Elements of Endpoint Management
An Umbrella (Appliance) Solution
Support
What is the vendor’s
policy?
Integration
How does the solution
“play”?
Feature Set
Is it an “umbrella”
solution?
Scalability
Can the solution grow
with your business?
Complexity
Does the solution match
your business needs?
Considerations in Choosing an Endpoint
Management Solution
KACE Endpoint Systems
Management for growing
organizations
18
Endpoint systems management lifecycle
• Image capture
• Zero touch OS
deployment
• Multicasting
• User state migration
• Remote site support
• Service desk
• User portal & self
service
• Monitoring & alerting
• Remote control
• Mobile access
• Patch management
• Configuration
management
• Policy enforcement
• Vulnerability scanning
• Discovery & inventory
• Asset management
• Software distribution
• Reporting &
compliance
19
• Reduce infrastructure costs
• Expedite time to value
• Automate asset inventory
and patching
• Save time on asset
discovery and inventory
using consolidated
reporting
• Improve control, security,
response time and user
productivity
• Cut downtime and risk
• Ensure license compliance
• Perform application updates
in minutes
• Upgrade suites in days, not
weeks
Optimize
application
experience
Modernize
infrastructure
for the cloud
Automate
complex
processes
Enable a
data-driven
business
• Reduce IT time and
resources for system
provisioning, deployments,
patching and service request
responses
KACE can help
20
Optimize
application
experience
Modernize
infrastructure
for the cloud
Automate
complex
processes
Enable a
data-driven
business
Customer validation
• 68% of surveyed IT
organizations have more
accurate hardware and
software inventory to better
inform purchasing and
maximize use of existing
assets as a result of
purchasing KACE K1000.
• 50% of surveyed IT
organizations have simplified
application distribution and
maintenance to ensure
applications are up to date and
secure as a result of purchasing
KACE.
• 53% of IT organizations chose
the KACE Systems
Management Deployment
Appliance because they were
overwhelmed by the amount of
manual chores to simply keep
operating systems up to date
and running.
• 70% of customers
implemented KACE in less
than 2 weeks.
Add Image Here
21
KACE Systems Management Appliance
The KACE Systems
Management Appliance
is the most
comprehensive systems
management solution
that streamlines asset
management, better
secures all network
connected devices, and
more efficiently services
end user systems –
giving resource
constrained IT
organizations more time
to innovate.
Inventory & IT asset
management
Software distribution
Transform insight into action with
turnkey reporting.
Keep your organization safe with set-it-and-
forget-it patching.
Deliver the right software to the right
person at the right time.
Make delivering a great help desk user
experience look easy.
Patch management
& security
Software distribution
Service desk
Add Image Here
22
KACE Systems Deployment Appliance
The KACE Systems
Deployment
Appliance offers a
multi-platform
solution that provides
initial provisioning
and ongoing
administration of
master system
images and driver
updates faster and
easier, ensuring
connected systems
remain up to date and
secure.
Plan
Configure
Deploy
Centralized
Administration
Remote site
Management and
administration
• Mobile interface for the Systems Management Appliance
• Enhanced mobile productivity for systems administrators
• Ability to cut through email noise and identify critical issues
• Task engine
• Pre- and post-install tasks
• User state migration
• Remote systems recovery
• Disk imaging
• Centralized deployment library
• Multicasting
• Network OS install
Thank you so much for your time today!
Twitter: @TechTrainerTim
Website: techtrainertim.com
Email: tim-warner@pluralsight.com
On demand webcast:
http://ow.ly/pOwW30eF1ys
Summary

Mais conteúdo relacionado

Mais procurados

Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
CTI Group
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
Lumension
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
Brian Dickhaus
 

Mais procurados (19)

VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
 
V mware view
V mware viewV mware view
V mware view
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentials
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
 
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
 
Troubleshooting and debugging Citrix Receiver for iOS and Android
Troubleshooting and debugging Citrix Receiver for iOS and AndroidTroubleshooting and debugging Citrix Receiver for iOS and Android
Troubleshooting and debugging Citrix Receiver for iOS and Android
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager Overview
 
AutomateandsimAutomate and Simplify Your IT Management Operations
AutomateandsimAutomate and Simplify Your IT Management OperationsAutomateandsimAutomate and Simplify Your IT Management Operations
AutomateandsimAutomate and Simplify Your IT Management Operations
 
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
 

Semelhante a Predicting the Future of Endpoint Management in a Mobile World

Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
SolarWinds
 

Semelhante a Predicting the Future of Endpoint Management in a Mobile World (20)

Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
Entuity Network Management Product Overview
Entuity Network Management Product OverviewEntuity Network Management Product Overview
Entuity Network Management Product Overview
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
 
VAS - VMware CMP
VAS - VMware CMPVAS - VMware CMP
VAS - VMware CMP
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native Stack
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenter
 
Sutedjo - Introduction to Cloud
Sutedjo - Introduction to CloudSutedjo - Introduction to Cloud
Sutedjo - Introduction to Cloud
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
 

Mais de Quest

Mais de Quest (20)

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
Your Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemYour Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome Them
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active Directory
 

Último

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

Predicting the Future of Endpoint Management in a Mobile World

  • 1. @TechTrainerTim techtrainertim.com AUTHOR/TECH EVANGELIST, PLURALSIGHT Tim Warner Predicting the Future of Endpoint Management in a Mobile World
  • 2. Define our terms Review endpoint systems management trends Present an endpoint management “wish list” Overview
  • 4. An Internet-capable computer hardware device on a TCP/IP network. Endpoint device timw.info/ed
  • 5. Endpoint Examples Server and desktop PCs (Windows, Linux, macOS) Laptop PC Thin-client devices (Chromebooks) Tablet Smartphone Printers POS systems IoT devices (smart meters)
  • 6. Bring Your Own Device. The policy of permitting employees to bring personally owned devices to their workplace, and to to use those devices to access privileged company information and applications. BYOD timw.info/byod
  • 7. Customer Owned, Personally Enabled. A policy in which the company purchases the devices to provide to their employees; the functionality of a private device is enabled to to allow personal usage. COPE timw.info/byod
  • 10. Endpoint Device Confetti One user, multiple devices Fragmentation Open-source components 0-day vulnerabilities
  • 11. Endpoint Device Confetti This situation is made worse with non-integrated management systems
  • 12. Lack of Enforcement How can you detect and remediate compromised systems? Lack of Policy How well documented is your inventory? Compliance reports? Lack of Visibility Can you view all endpoints, in all their forms, through a “single pane of glass”? Security Hazards
  • 14. Service desk/support Application deployment Patch management Compliance evaluation OSD (and licensing)Asset management Elements of Endpoint Management
  • 16. Support What is the vendor’s policy? Integration How does the solution “play”? Feature Set Is it an “umbrella” solution? Scalability Can the solution grow with your business? Complexity Does the solution match your business needs? Considerations in Choosing an Endpoint Management Solution
  • 17. KACE Endpoint Systems Management for growing organizations
  • 18. 18 Endpoint systems management lifecycle • Image capture • Zero touch OS deployment • Multicasting • User state migration • Remote site support • Service desk • User portal & self service • Monitoring & alerting • Remote control • Mobile access • Patch management • Configuration management • Policy enforcement • Vulnerability scanning • Discovery & inventory • Asset management • Software distribution • Reporting & compliance
  • 19. 19 • Reduce infrastructure costs • Expedite time to value • Automate asset inventory and patching • Save time on asset discovery and inventory using consolidated reporting • Improve control, security, response time and user productivity • Cut downtime and risk • Ensure license compliance • Perform application updates in minutes • Upgrade suites in days, not weeks Optimize application experience Modernize infrastructure for the cloud Automate complex processes Enable a data-driven business • Reduce IT time and resources for system provisioning, deployments, patching and service request responses KACE can help
  • 20. 20 Optimize application experience Modernize infrastructure for the cloud Automate complex processes Enable a data-driven business Customer validation • 68% of surveyed IT organizations have more accurate hardware and software inventory to better inform purchasing and maximize use of existing assets as a result of purchasing KACE K1000. • 50% of surveyed IT organizations have simplified application distribution and maintenance to ensure applications are up to date and secure as a result of purchasing KACE. • 53% of IT organizations chose the KACE Systems Management Deployment Appliance because they were overwhelmed by the amount of manual chores to simply keep operating systems up to date and running. • 70% of customers implemented KACE in less than 2 weeks.
  • 21. Add Image Here 21 KACE Systems Management Appliance The KACE Systems Management Appliance is the most comprehensive systems management solution that streamlines asset management, better secures all network connected devices, and more efficiently services end user systems – giving resource constrained IT organizations more time to innovate. Inventory & IT asset management Software distribution Transform insight into action with turnkey reporting. Keep your organization safe with set-it-and- forget-it patching. Deliver the right software to the right person at the right time. Make delivering a great help desk user experience look easy. Patch management & security Software distribution Service desk
  • 22. Add Image Here 22 KACE Systems Deployment Appliance The KACE Systems Deployment Appliance offers a multi-platform solution that provides initial provisioning and ongoing administration of master system images and driver updates faster and easier, ensuring connected systems remain up to date and secure. Plan Configure Deploy Centralized Administration Remote site Management and administration • Mobile interface for the Systems Management Appliance • Enhanced mobile productivity for systems administrators • Ability to cut through email noise and identify critical issues • Task engine • Pre- and post-install tasks • User state migration • Remote systems recovery • Disk imaging • Centralized deployment library • Multicasting • Network OS install
  • 23. Thank you so much for your time today! Twitter: @TechTrainerTim Website: techtrainertim.com Email: tim-warner@pluralsight.com On demand webcast: http://ow.ly/pOwW30eF1ys Summary