Well Managed Systems - Endpoint Management and Mobility
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Well Managed Systems - Endpoint Management and Mobility

on

  • 540 views

 

Statistics

Views

Total Views
540
Views on SlideShare
540
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Well Managed Systems - Endpoint Management and Mobility Presentation Transcript

  • 1. Well Managed Systems Endpoint Management and MobilityWell Managed Systems 1
  • 2. Agenda 1 Key trends that are changing how we work 2 Solutions and conversation starters 3 Resonate with C-Level ITWell Managed Systems 2
  • 3. The Traditional Desktop World No Longer ExistsWell Managed Systems 3
  • 4. Struggling with New Perceptions and Technology End Users Technology> End Users Expect More > Rapid Technology Changes > IT Can’t Keep Pace•49% of millenials want to choose their •By the end of 2011, there will be 120 •The office is now a technological boneown technology in the workplace million more combined smartphones and yard where youre perpetually trapped tablets shipped worldwide than PCs about three years in the past•32% of employees globally now rely onmore than one device during their typical •By the end of 2011, there will be over 1.3 •Work and life should not require such aworkday. million apps on smartphones and tablets change in gears in order to communicate versus 75 thousand on PCs with one another•61% of employees don’t believe they needto be in the office to be productive Well Managed Systems 4
  • 5. Key Trends that are Changing How We Work Embrace Personally-owned and UnmanagedInfo/App Only Access Evolving Focus Unmanaged 246M Corp PCs 293M Personal PCs Relevent 819M Smartphones Devices 116M Tablets Today Future Devices 177M Corp PCsFull Control Managed 300M Smarphones 15M Tablets Traditional Focus Corporate-Owned Personally-Owned Devices Well Managed Systems 5
  • 6. What it Means to the End User LEVERAGE THE DEVICES THAT FASTER ACCESS TO APPLICATIONS WORK FOR THEM AND CONTENT TRANSPARENT BOUNDARY GREATER PRODUCTIVITY, BETWEEEN WORK AND PLAY BETTER BUSINESS RESULTSWell Managed Systems 6
  • 7. What it Means to the IT Industry INCREASINGLY DIFFICULT CAN’T KEEP PACE WITH TO DRIVE EFFICIENCY AND SCALE NEW TECHNOLOGIESLIMITED SOLUTIONS THAT PROTECT DATA CAN’T MANAGE AT THE LOWEST COST AND ENSURE COMPLIANCE WITH HIGHEST PERFORMANCE Well Managed Systems 7
  • 8. Symantec Addresses These Challenges Trend IT Challenges Symantec Solution • Enterprise activation and provisioning • Enterprise policy management and controls • Application certification, control & delivery • Secure application provisioning, access and collaboration • Enterprise security policy enforcement • Mobile malware threat protection • Application delivery across physical and multi- • “End-user computing environment” sprawl layered virtualization • Application provisioning and management • Heterogeneous configuration management – • Performance and availability across virtual and physical • Increasing Mac adoption forcing support • Multi-platform management with specific Mac • Facilitating the move to Microsoft® based guidelines Windows 7 • Best of breed migration tools and virtualization to drive OS migrationsWell Managed Systems 8
  • 9. Conversation 1: Tackling MobilityWell Managed Systems 9
  • 10. Enterprise Challenges4 Major Pain Points Explosion of New Apps Must Increased Risk Infrastructure New Devices Be Supported of Data Loss Silos • How do I • How do I manage • How do I protect • Who will own enterprise-activate application corporate enterprise these devices? deployment & secrets, protect mobility? associated costs? the brand & comply with regulations? 1B+ SmartPhones / Tablets by 2014Well Managed Systems 10
  • 11. Protecting People, Information & Devices• Delivers enterprise policy and configuration management across heterogeneous mobile platforms• Authenticates people and devices accessing authorized applications and data• Secures information and devices against the evolving mobile threat landscapeWell Managed Systems 11
  • 12. Mobile Device Management and SecurityA New Approach - End To End Mobility Enterprise Secure Information Policy Access Protection • Security and Compliance • Strong authentication • DLP and Messaging Security • Application Management • Complete PKI/OTP lifecycle • Data Encryption • Configuration Management • Authentication for app • Threat Protection Enterprise Integration Endpoint Security Business Management Infrastructure ProcessesWell Managed Systems 12
  • 13. Conversation 2: Leveraging VirtualizationWell Managed Systems 13
  • 14. Enterprise Challenges4 Major Pain Points VDI Unmanaged License Windows 7 Enablement PCs Compliance Migration • How do I simplify • How do I manage • How do I ensure • How do I make the and accelerate VDI software and compliance and transition as easy deployments maintain control? optimize costs? as possible for me and the usersWell Managed Systems 14
  • 15. Automating Delivery and Optimizing Costs• On-demand delivery of applications to any PC: • Physical or Virtual (VDI) • Local or Remote • Managed or Unmanaged• Clear containment of apps to maximize flexibility and minimize helpdesk calls and downtime Dynamic Workspace Configuration• Real-time license management eases management and compliance while optimizing costWell Managed Systems 15
  • 16. Conversation 3: OS Diversity in the EnterpriseWell Managed Systems 16
  • 17. Enterprise Challenges4 Major Pain Points Executive Too Many Lack of Higher Costs Pressure Windows Apps Specialization • How can I resist • How can I deliver • Do I have to hire • How can I executive the same services new talent? How manage these pressures to and applications I can retrain my systems without support Macs? without new Windows-centric breaking the development? administrators? bank? Macs in the Enterprise set to double by 2013 In 2012 the typical Experienced vendors organization will amass may have checklists more OS-neutral than Symantec IT announces and other job aids. Windows applications Mac support June 2011Well Managed Systems 17
  • 18. Supporting a Diverse Client Environment with a SinglePane of Glass• Delivers enterprise configuration management for Mac from provisioning to ongoing support• Reduces multiple consoles for supporting and patching heterogeneous client environment• Assists Windows centric IT shops with the transition to Mac management, while providing a familiar look and feel for end-usersWell Managed Systems 18
  • 19. SummaryStart a conversation with key hot topics that resonate withC-Level IT and Desktop Operations Mobility Virtualization Mac • Hot topic on every CIO • Virtualization is a critical • Hot debate for desktop agenda factor in future client operations infrastructures • Key starting point for Bring • Mac in the enterprise now Your Own Device programs • Essential element for at 11% and growing rapidly supporting unmanaged • Entry point for broader • Competitive differentiator systems client management over Microsoft discussions • Key technology for Windows 7 migrationsWell Managed Systems 19
  • 20. Thank you! For more information, download: Whitepaper: Mobile Device Security Forrester Report: The Total Economic Impact Of Altiris™ IT Management Suite 7 From Symantec Multicompany Analysis Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.Well Managed Systems 20