AppSense Product Deck


Published on

AppSense product deck. High level product deck, but please contact for more information.

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • During good times, cost reduction is not always top of mind for many organizations. However, during economic downturn or recessions, we hear the request to “do more with less” from management way more frequently. Many Citrix customers are not aware of the optional cost savings that you have within your environments today. Cost savings will vary from organization to organization, but I can safely assume that many of you in the audience have opportunity to save your company money through infrastructure cost savings, improved automation and management, user productivity savings, and IT staff efficiencies. Here are just a few cost savings associated with user environment management. Faster logon times Reduce profile corruption Fewer “gold” images to manage Avoid unused licenses Increase the number of Citrix users per server Avoid support and end user impact for server lockup issues(70-90 seconds)
  • AppSense Product Deck

    1. 1. The technology........<br />
    2. 2. AppSense Management Suite<br />
    3. 3. AppSense Management Suite<br />Policy and Personalization Management<br />Application Entitlement<br />Resource Entitlement<br />
    4. 4. Personalization and Policy Management <br /><ul><li>Provide the best user experience across all delivery mechanisms
    5. 5. Ensure the fastest user logon and desktop set up times
    6. 6. Eliminate profile corruption and support calls
    7. 7. Reduce time spent maintaining the user environment </li></li></ul><li>Personalization StreamingReduce logon times by streaming user personalization settings throughout their session on demand.<br />Application-Level Personalization <br />Personalization settings are managed and streamed on a per application basis. Applications can now be upgraded or swapped out with no impact to the user.<br />OS and Application Feature Lockdown<br />Using an intuitive ‘spytool’ feature, items such as menus, application features and network access can be disabled or removed within minutes without the need for intensive scripting or registry hacking. <br />User Profile Migration<br />Enable rapid desktop migrations by moving users to new delivery mechanisms without having to recreate personalization settings.<br />
    8. 8. Personalization Analysis<br />Interactive reports and graphs provide visibility into personalization activity across the enterprise. Personalization analysis identifies trends, showing how often applications are personalized.<br />Personalization Rollback<br />Reduce support costs, time to repair damaged profiles and preserve user personalization settings by ‘rolling back’ to a previous known good profile on a per application or user basis. <br />Offline Mode<br />Personalization data is stored in a virtual cache within the user’s desktop and remains available to disconnected users. The user now has a fully portable, follow-me personality, which is re-synchronized with the latest, centralized settings when the user comes back online. <br />
    9. 9. Rules and Actions<br />Define events that are used to implement business policies. Rule examples include “when user X logs on to the desktop with an IP address of Y”, “when a user opens an application named Y” or for complete flexible control, any combination of multiple conditions. Actions resulting from these rules include file, folder, registry, ADM, drive and printer mappings.<br /> <br />Self Healing<br />Automatically self heal files, folders, registry keys, services and processes, application and system components in real time to prevent user introduced changes or actions from compromising system integrity. <br />AppSense Configuration Templates<br />AppSense Environment Manager is able to import an unlimited number of configuration files and use these policies in combination. A selection of Configuration Templates, such as default Outlook Profile, MS Office feature lockdown and XP Control Panel Item Removal are available from This Template Library is maintained and updated frequently.<br />
    10. 10. Application Entitlement<br /><ul><li>Protect the environment from unauthorised applications and code
    11. 11. Reduce the need to maintain, re-build or re-image
    12. 12. Eliminate time consuming lists and scripts
    13. 13. Ensure compliance with Microsoft licensing</li></li></ul><li>Trusted Ownership <br /> Protect the system without complex lists and constant management. Only code installed and owned by ‘trusted owners’ is allowed to execute. The trusted owners list can be extended to suit any environment or content directory infrastructure.<br /> <br />End Point Analysis <br /> Identify all executable files on a target device and quickly group the files into authorized and unauthorized. Configurations can be deployed to a user, group of users, machine, group of machines.<br /> <br /> Application Network Access Control<br /> Control network access without complex controls such as routers, switches and firewalls. Connections include access to UNC paths (including all files & folders on that drive), servers, IP addresses, URL’s, devices & FTP locations. Policy can be tailored to dynamically change based on user or device properties.<br />
    14. 14. Passive Monitoring<br /> Monitor application usage without preventing users from running applications. Passive monitoring can be managed on a per user, device or group basis, providing an extremely useful tool to accurately track user behavior prior to implementation or to understand application usage for software license management.<br />Digital Signatures<br /> Assign SHA-1 digital signatures to applications and files to ensure application integrity. Modified or spoofed applications are prevented from executing. <br />White & Black List Configurations<br /> Lists can be used in conjunction with Trusted Ownership to control known applications which pass the NTFS owner check such as administrator owned tools like cmd or ftp. Or, create white lists to guarantee only known and trusted applications can execute on a system.<br />
    15. 15. Self Authorizing UsersUsers can authorize their own applications without relying on IT. An audit details information such as application name, time and date of execution and device. A copy of the application can be taken and stored centrally for examination.<br />Application Limits & Time Restrictions<br /> Control the number of application instances and at what times it can be run. Also enforce licensing models by controlling application access on a per device basis.<br />Extensive File Support<br /> In addition to controlling .exe files, scripts, batch and registry files are also controlled. Digital signatures can also be applied to scripts to ensure content remains unaltered.<br /> <br />AppSense Configuration TemplatesTake full advantage of pre-built corporate policy best practice by importing AppSense Configuration Templates.  AppSense Application Manager is able to import an unlimited number of configuration files and use these in combination.  A selection of templates such as ‘common prohibited item’s or ‘End Point Analysis’ is available from  This Template Library is maintained and updated frequently.<br />
    16. 16. System Resource Entitlement <br /><ul><li>Ensure a optimal and consistentquality of service
    17. 17. Application response times are optimized according to business policy
    18. 18. Dramatically increase server capacity, number of users and applications
    19. 19. Significantly reduce per user TCO</li></li></ul><li> Disk I/O Resource Management<br /> Prevent I/O Request Packet (IRP) bottlenecks from impacting critical applications by dynamically prioritizing IRP’s. Named applications have priority disk access, preventing them being held in a queue behind less important application IRP’s.<br />CPU Smart Scheduler™Allocate CPU resource to applications by assigning a relative share to the user or application. For instance, an application assigned a share factor higher than another application will receive higher priority access to the CPU when there is contention.<br /> Thread Throttling™CPU thread throttling policies will automatically trigger when the system is heavily loaded and apply gradual throttling to any runaway threads within each process.<br />Physical Memory ControlAutomatically trim physical memory consumption based on application events and states, such as application startup, idle, minimized and in the background. Releasing RAM back to the operating system enables a significant increase in user density or application instances.<br />
    20. 20. Virtual Memory OptimizationOptimizing the way Dynamic Link Libraries (DLLs) are loaded reduces virtual memory overheads and system paging is significantly reduced. Optimized DLLs are stored in a separate cache and loaded dynamically, leaving the original applications intact.<br /> Virtual Memory LimitsUser memory limits restrict the amount of virtual memory utilized. Users can be warned, or prevented from launching additional applications. Application memory limits can also be applied to individual applications giving greater control over virtual memory consumption.<br /> CPU Application Limits<br /> Define hard processor limits to control an applications access to the CPU. For example, an application limit of 70% ensures it cannot use more than 70% of the CPU.<br /> CPU Reservations<br /> Ensure applications are guaranteed CPU resource. For example, an application allocated 20% of CPU will get priority access to the CPU while it is using 20% or less of the CPU.<br />
    21. 21. Processor Affinity Assignment<br /> On multiprocessor systems policies can bind specific users and applications to processors allowing mission critical applications to run exclusively on a dedicated CPU.<br />Statistical Analysis and Reporting<br /> Report on CPU, Memory and Disk usage at the process level on a per user or application basis. Tabular reports and graphs are used to report on defined events to show resource consumption and optimization. <br />AppSense Configuration Templates<br /> Take full advantage of pre-built corporate policy best practice by importing AppSense Configuration Templates. AppSense Performance Manager is able to import an unlimited number of resource policy configuration policies and use these policies in combination. A selection of Policy Templates, such as “BoostOffice” to prioritize resources to the MS Office application set, is available from This Template Library is maintained and updated frequently.<br />
    22. 22. Managing The User Environment<br />Proven enterprise scalability<br />Centralized management of user environment<br />Provides visibility in the user environment<br />Ensure continuous communication and fail over capabilities<br />
    23. 23. Active Directory Authentication<br /> Tight integration with existing Microsoft Active Directory ensures all managed devices are authenticated before communications are established.<br /> <br />Client Communications Agent (CCA)<br /> The CCA securely handles all communications between device and Management Server, adding the device to the correct deployment group, managing package installations and collecting and transferring audit data.<br /> Automatic Client Registration<br /> New devices automatically registers itself with the Management Server via the CCA. The properties of the device are used to automatically add it to the correct deployment group and automatically deploy the correct policy.<br /> <br /> Reporting<br /> An interactive set of reports are used monitor and audit user environment actions. Flexible options enable customization to show specific information, enabling forward planning and a move away from a reactive management approach.<br />
    24. 24. Role-based Access Control<br /> Granular control of access rights on all objects such as deployment groups, packages, reports and alerts. Management Server Administrative users can be granted different access rights to each object on a per user or group basis. <br /> Secure Web-based Communications<br /> Built on WinHTTP, BITS and IIS technologies, data transfer and communications between the Management Server and device are securely managed across HTTPS or HTTP protocols.<br />Watchdog Agent<br /> Should an AppSense agent stop unexpectedly or become unstable, the Watchdog will automatically audit the detected error and if configured, raise and alert and take corrective actions to restart the agent.<br />
    25. 25. Configuration Check-out Process<br /> Support multiple administrators simultaneously opening or editing configurations. Once an administrator is granted access (via role based access control), already open configurations can be opened as read only. Metadata tags can be added as a description to a configuration.<br />Management Server Configuration<br /> The Management Server installation provides the configuration of the Microsoft IIS and SQL Server. If configuration conflict arises during configuration, repair functions are presented. Support reports can be generated for AppSense Technical Services to initiate your case.<br />Failover Support<br /> The CCA supports multiple Management Server URL’s. Should the link to the current Management Server fail, the CCA will re-connect to a different server allowing for full failover support and continue communications between the end point and the Management Center.<br />
    26. 26. User environment management Solution<br />AppSense Management Suite<br />AppSense user environment management<br />Policy and Personalization<br />Management<br />Consistent and contextual user environment<br />Protected user environment<br />Application <br />Entitlement<br />Resource <br />Entitlement<br />Responsive user environment<br />
    27. 27. Potential Cost Reduction in Your Citrix Environment<br />Personalization and Policy Management<br />Faster user logon times<br />Reduce profile corruption & support call remediation<br />Cut time spent maintaining the environment<br /><ul><li>Application Entitlement
    28. 28. Eliminate need to re-image and re-build
    29. 29. Replace costly, time consuming lists and scripts
    30. 30. Reduce Microsoft application licence requirements
    31. 31. System Resource Management
    32. 32. More users per server / server consolidation
    33. 33. Improved quality of service / prevent server lockups
    34. 34. Extend hardware lifecycle</li></li></ul><li>Contact Info:<br />Jason McGeough<br />Regional Manager<br /><br />