SlideShare a Scribd company logo
1 of 14
Download to read offline
Altiris IT Management Suite 7.0
    Redefining IT lifecycle management and automation




    April 13, 2010


Altiris IT Management Suite                             1
Presentation Overview



          Management is Critical Component of Security

          IT Management Suite Delivers Integrated Value

                              Process Automation – Built-in




Altiris IT Management Suite
The Need For Management And Security

                  Protect the     > Symantec™ Protection Suite
               Infrastructure

                    Protect the   > Symantec™ Data Loss Prevention
                   Information

Develop and Enforce               > Symantec™ Control Compliance Suite
          IT Policies

        Manage Systems            > Symantec™ IT Management Suite


Altiris IT Management Suite                                              3
Integrations Available Today                                           pcAnywhere Solution 7.0

7.0 Management Platform                                           Supports light and full versions
                                                                  Management console right click
                                                                   context menu
         Deployment Solution 7.1                                  Management database
 Incorporates Ghost Imaging Foundation                            integration (audit trail, security)
 Hardware independent imaging
 In-place file preservation imaging
 Native VMDK support including physical
  to virtual                                                                              Symantec Endpoint Protection
                                                                                            Integration Component 7.0
                                                                                        Updated to 7.0 Platform
                                                                                        Antivirus Inventory
 Backup Exec System Recovery                                                            Expanded migration tasks
   8.5 & 2010
  Native Integration
  Client deployment
                                                                                                         IT Analytics 7.0 for SEP
  Backup and recovery tasks                Management                                           Updated to 7.0 Platform
  Web reports                              Platform 7.0
                                                                                                 Key Performance Indicators




  Backup Exec Infrastructure Manager 12.5                                                       Data Loss Prevention (Vontu)
                                                                                                  Integration Component 9.0
   Discover and inventory BE components
                                                                                             Agent rollout and management
   Report on enterprise protection          Control Compliance Suite 9.0 SP 1
                                                                                             Integrated reporting
   Deploy and Patch of BE components        Import assets from Management
   Monitor BE at enterprise level & rack     Platform into CCS
    Storage                                  Automated creation of service
                                              tickets from audit results


Altiris IT Management Suite                                                                                                         4
Standardize, Automate, And Consolidate Operations




                              Client IT Asset
                                  Service Desk
                                     Management
                                      Server
                                  Management



Altiris IT Management Suite                         5
Intelligently Integrate Capabilities


            Self              Avoid calls or requests entirely with best practice self service
          Service             delivered via the Service Catalog
       (Service Catalog)


         Process              Automate human and system interactions;                       Increased
       Automation             eliminate latency, errors and omissions
       (Workflow Engine)                                                                     Service,
                                                                                            Efficiency
         Policy               Detect and remediate automatically, with no human            and Savings
      Enforcement
        (Policy Engine)       involvement

           Task
                              Perform multiple remote management tasks
        Automation
         (Task Engine)        simultaneously

        Remote
      Management              Avoid desk side visits with one to one remote
       (Remote Services)      management capabilities


Altiris IT Management Suite                                                                              6
Altiris Product Family
                                                       • ServiceDesk




                                                                                           Altiris IT Management Suite 7.0 from Symantec
                               Altiris™ Service Desk   • ITIL best practices
                                  from Symantec        • Service Catalog


            Self                  Altiris™ Asset       •   Manage budgets
          Service             Management Suite from    •   Ensure license compliance
       (Service Catalog)            Symantec           •   Support growth or contraction
                                                       •   Align IT with the business
         Process
       Automation
       (Workflow Engine)
                                  Altiris™ Client      •   Configuration management
                              Management Suite from    •   Patch management
         Policy                     Symantec           •   Monitoring and alerting
      Enforcement                                      •   Remote control
        (Policy Engine)          Altiris™ Server       •   IT process automation
                                                       •   Best practices
                              Management Suite from    •   Manage virtual infrastructure
           Task                    Symantec
        Automation
         (Task Engine)


                               Altiris™ Deployment     • System provisioning
        Remote                                         • Task-based operations
      Management              Solution from Symantec   • Simple one to one management
       (Remote Services)




Altiris IT Management Suite                                                                                            7
IT Management Suite 7.0
Components
Integrated products in one comprehensive suite
    –   Client Management Suite 7
    –   Asset Management Suite 7
    –   Server Management Suite 7
    –   ServiceDesk 7
    –   Workflow 7


Key Features
    –   Built-in process automation
    –   Intelligent software management
    –   OS Migration, featuring Windows 7
    –   Comprehensive client, server, and asset management

Altiris IT Management Suite                                  8
IT Management Suite Benefits
     Reduce Total Costs        Reduce Complexity              Focus on Critical
                                                           Organization Initiatives

    • Automate time           • Gain complete visibility   • Align process, people
      consuming tasks           into IT environment          and technology
      • Software and hard-    • Increase security and      • Free IT to focus on
        ware management         reduce risks                 strategic business
      • OS Migrations                                        initiatives
                              • Get information to IT
    • Close technology          and decision makers        • Drive business
      gaps to maximize
      investments
    • Increase Service
      Levels




Altiris IT Management Suite                                                           9
Windows 7 No Touch Migration
  Customer Profile                                 Background
                               • Planned OS upgrade and migration of 300,000
Global Financial Institution     endpoints within 18 months
• 300,000+ endpoints           • Moving to corporate standard image

• 30+ hardware platforms       • Estimated $200-300 migration cost per endpoint
                               • Estimated 5 migrations per technician per night
• 600+ applications

• 7 data centers                                      Results
Previous Products              • 200% greater efficiency while using less staff
                               • Migrated ~1,800 endpoints in a 24-hour period
• Ghost / Microsoft ImageX
                               • Required only 6 technicians per 400 migrations
Previous Migration Rate
                               • Process deployed the corporate SOE, then Line of
• 1,000 migrations in 12         Business software, then specialized “one off”
  months                         applications

Altiris IT Management Suite                                                         10
7 Steps to Windows 7
                                       Inventory
   1                                 Asset Mgmt
                                           CMDB
                                     Deployment
   2                                    Solution

                                    Wise Package
   3                                      Studio

                                     Deployment
   4                                    Solution


   5                                   Workflow

                              Deployment Solution
   6                               Software Mgmt
                                      Patch Mgmt
                                       Inventory
   7                                 ServiceDesk

Altiris IT Management Suite                         11
Licensing Harvesting at Large Manufacturer
  Customer Profile                              Background
 World’s largest              •   Needed better understanding of software
 manufacturer and                 environment
 marketer of major home       •   Unstable software licensing costs
 appliances.                  •   Wanted increased negotiating power with
                                  software vendors to save money
 • 214 locations in 44
 countries
                                                   Results
 • 73,000 employees
                              •   Uninstalled 6,441 unregistered software
 globally
                                  products
                              •   Cost avoidance of over $2 million (US)
 • 31,000 Client Nodes
                              •   Negotiated new Enterprise Agreement with
                                  vendor
 • 1,500 Server Nodes




Altiris IT Management Suite                                                  12
Eliminating Unnecessary IT Labor
     VPN Certificate Request                          Manual Effort
                                             • Number of requests
 Before Automation                              – 334 requests in 2 months
 1. User entered request via web site        • Estimated Helpdesk Time Spent
     – No error checking, no user               – 25.05 man weeks per year
       verification
 2. Request forwarded to Helpdesk
 3. Worker opened ticket
                                                          Results
    – Found request number and logged
      into Certificate Server                • Number of requests
    – Approved or Denied request (blindly)       – 1,774 requests in 6 months
    – Marked ticket completed                • Estimated Helpdesk Time Spent
    – Certificate emailed to end-user with       – 0 Hours
      no security attached                   • Cost avoided
 Average time to completion – 1.5 days           – $85k annually


Altiris IT Management Suite                                                     13
Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Altiris IT Management Suite                                                                                                                                                                 14

More Related Content

What's hot

NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overviewfannaq786
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Controlwebhostingguy
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewAmit Gatenyo
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Iftikhar Ali Iqbal
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012Amit Gatenyo
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringwwwally
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud ComputingScientia Groups
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012ebuc
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...eG Innovations
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013C/D/H Technology Consultants
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementC/D/H Technology Consultants
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 

What's hot (20)

NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoring
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 

Viewers also liked

Control Compliance Suite 10
Control Compliance Suite 10Control Compliance Suite 10
Control Compliance Suite 10Symantec
 
Vmserver2
Vmserver2Vmserver2
Vmserver2nkirve
 
Symantec Solutions
Symantec SolutionsSymantec Solutions
Symantec Solutionstwelling
 
Code syntax highlighting in ghost
Code syntax highlighting in ghostCode syntax highlighting in ghost
Code syntax highlighting in ghostPaul Graham
 
Winning Business Proposals Module 3
Winning Business Proposals   Module 3Winning Business Proposals   Module 3
Winning Business Proposals Module 3Deiric McCann
 
Tk2273 -teknologi_virtualisasi Cloud Computing
Tk2273  -teknologi_virtualisasi Cloud ComputingTk2273  -teknologi_virtualisasi Cloud Computing
Tk2273 -teknologi_virtualisasi Cloud ComputingSyarif Maula
 
Starters 2 test 2
Starters 2   test 2Starters 2   test 2
Starters 2 test 2rol1977
 
Yle starters1 tb
Yle starters1 tbYle starters1 tb
Yle starters1 tbThinh Vinh
 
165870 yle-starters-sample-papers-vol-
165870 yle-starters-sample-papers-vol-165870 yle-starters-sample-papers-vol-
165870 yle-starters-sample-papers-vol-caycho123
 
Jobe A. Diagne
Jobe A. DiagneJobe A. Diagne
Jobe A. Diagnejobediagne
 
ESL Activities and Mini-Books
ESL Activities and Mini-BooksESL Activities and Mini-Books
ESL Activities and Mini-BooksAdrienne Kirby
 
Starters 2 test 1
Starters 2   test 1Starters 2   test 1
Starters 2 test 1rol1977
 
Starters 2 speaking tests
Starters 2   speaking testsStarters 2   speaking tests
Starters 2 speaking testsrol1977
 

Viewers also liked (19)

Control Compliance Suite 10
Control Compliance Suite 10Control Compliance Suite 10
Control Compliance Suite 10
 
Vmserver2
Vmserver2Vmserver2
Vmserver2
 
Symantec Solutions
Symantec SolutionsSymantec Solutions
Symantec Solutions
 
Code syntax highlighting in ghost
Code syntax highlighting in ghostCode syntax highlighting in ghost
Code syntax highlighting in ghost
 
Winning Business Proposals Module 3
Winning Business Proposals   Module 3Winning Business Proposals   Module 3
Winning Business Proposals Module 3
 
Tk2273 -teknologi_virtualisasi Cloud Computing
Tk2273  -teknologi_virtualisasi Cloud ComputingTk2273  -teknologi_virtualisasi Cloud Computing
Tk2273 -teknologi_virtualisasi Cloud Computing
 
Starters 6 sb
Starters 6 sbStarters 6 sb
Starters 6 sb
 
Starters 2 test 2
Starters 2   test 2Starters 2   test 2
Starters 2 test 2
 
Yle starters1 tb
Yle starters1 tbYle starters1 tb
Yle starters1 tb
 
165870 yle-starters-sample-papers-vol-
165870 yle-starters-sample-papers-vol-165870 yle-starters-sample-papers-vol-
165870 yle-starters-sample-papers-vol-
 
Movers Picture Description
Movers Picture DescriptionMovers Picture Description
Movers Picture Description
 
Jobe A. Diagne
Jobe A. DiagneJobe A. Diagne
Jobe A. Diagne
 
Full Buku sakti belajar hacker
Full Buku sakti belajar hackerFull Buku sakti belajar hacker
Full Buku sakti belajar hacker
 
English Adventure Starter A
English Adventure Starter AEnglish Adventure Starter A
English Adventure Starter A
 
ESL Activities and Mini-Books
ESL Activities and Mini-BooksESL Activities and Mini-Books
ESL Activities and Mini-Books
 
Movers 6
Movers 6Movers 6
Movers 6
 
Movers 7
Movers 7Movers 7
Movers 7
 
Starters 2 test 1
Starters 2   test 1Starters 2   test 1
Starters 2 test 1
 
Starters 2 speaking tests
Starters 2   speaking testsStarters 2   speaking tests
Starters 2 speaking tests
 

Similar to Altiris IT Management Suite 7.0 Redefining Lifecycle Management

分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景ITband
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudwwwally
 
System Center And Sql Server
System Center And Sql Server System Center And Sql Server
System Center And Sql Server Eduardo Castro
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
System Center 2012 Ürün Ailesi
System Center 2012 Ürün AilesiSystem Center 2012 Ürün Ailesi
System Center 2012 Ürün AilesiMustafa
 
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...New Lease
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Development Platform as a Service - erfarenheter efter ett års användning - ...
Development Platform as a Service - erfarenheter efter ett års användning -  ...Development Platform as a Service - erfarenheter efter ett års användning -  ...
Development Platform as a Service - erfarenheter efter ett års användning - ...IBM Sverige
 
System Center 2012: Delivering a Private Cloud Environment
System Center 2012: Delivering a Private Cloud EnvironmentSystem Center 2012: Delivering a Private Cloud Environment
System Center 2012: Delivering a Private Cloud EnvironmentIntergen
 
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012Dubravko Marak
 
Managing IT as A Service with System Center
Managing IT as A Service with System CenterManaging IT as A Service with System Center
Managing IT as A Service with System CenterLai Yoong Seng
 
Newest Family Member - IT Automation With Opalis
Newest Family Member - IT Automation With OpalisNewest Family Member - IT Automation With Opalis
Newest Family Member - IT Automation With OpalisAmit Gatenyo
 
Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012Juanchi_43
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services OlivierMichot
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simplyLilian Schaffer
 

Similar to Altiris IT Management Suite 7.0 Redefining Lifecycle Management (20)

分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
 
System Center And Sql Server
System Center And Sql Server System Center And Sql Server
System Center And Sql Server
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
System Center 2012 Ürün Ailesi
System Center 2012 Ürün AilesiSystem Center 2012 Ürün Ailesi
System Center 2012 Ürün Ailesi
 
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
 
Private cloud day session 3 monitor and operate your private cloud
Private cloud day session 3 monitor and operate your private cloud Private cloud day session 3 monitor and operate your private cloud
Private cloud day session 3 monitor and operate your private cloud
 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Development Platform as a Service - erfarenheter efter ett års användning - ...
Development Platform as a Service - erfarenheter efter ett års användning -  ...Development Platform as a Service - erfarenheter efter ett års användning -  ...
Development Platform as a Service - erfarenheter efter ett års användning - ...
 
System Center 2012: Delivering a Private Cloud Environment
System Center 2012: Delivering a Private Cloud EnvironmentSystem Center 2012: Delivering a Private Cloud Environment
System Center 2012: Delivering a Private Cloud Environment
 
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
 
Managing IT as A Service with System Center
Managing IT as A Service with System CenterManaging IT as A Service with System Center
Managing IT as A Service with System Center
 
Newest Family Member - IT Automation With Opalis
Newest Family Member - IT Automation With OpalisNewest Family Member - IT Automation With Opalis
Newest Family Member - IT Automation With Opalis
 
Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012
 
Configuring and deploying a private cloud with system center 2012
Configuring and deploying a private cloud with system center 2012Configuring and deploying a private cloud with system center 2012
Configuring and deploying a private cloud with system center 2012
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Altiris IT Management Suite 7.0 Redefining Lifecycle Management

  • 1. Altiris IT Management Suite 7.0 Redefining IT lifecycle management and automation April 13, 2010 Altiris IT Management Suite 1
  • 2. Presentation Overview Management is Critical Component of Security IT Management Suite Delivers Integrated Value Process Automation – Built-in Altiris IT Management Suite
  • 3. The Need For Management And Security Protect the > Symantec™ Protection Suite Infrastructure Protect the > Symantec™ Data Loss Prevention Information Develop and Enforce > Symantec™ Control Compliance Suite IT Policies Manage Systems > Symantec™ IT Management Suite Altiris IT Management Suite 3
  • 4. Integrations Available Today pcAnywhere Solution 7.0 7.0 Management Platform  Supports light and full versions  Management console right click context menu Deployment Solution 7.1  Management database  Incorporates Ghost Imaging Foundation integration (audit trail, security)  Hardware independent imaging  In-place file preservation imaging  Native VMDK support including physical to virtual Symantec Endpoint Protection Integration Component 7.0  Updated to 7.0 Platform  Antivirus Inventory Backup Exec System Recovery  Expanded migration tasks 8.5 & 2010  Native Integration  Client deployment IT Analytics 7.0 for SEP  Backup and recovery tasks Management  Updated to 7.0 Platform  Web reports Platform 7.0  Key Performance Indicators Backup Exec Infrastructure Manager 12.5 Data Loss Prevention (Vontu) Integration Component 9.0  Discover and inventory BE components  Agent rollout and management  Report on enterprise protection Control Compliance Suite 9.0 SP 1  Integrated reporting  Deploy and Patch of BE components  Import assets from Management  Monitor BE at enterprise level & rack Platform into CCS Storage  Automated creation of service tickets from audit results Altiris IT Management Suite 4
  • 5. Standardize, Automate, And Consolidate Operations Client IT Asset Service Desk Management Server Management Altiris IT Management Suite 5
  • 6. Intelligently Integrate Capabilities Self Avoid calls or requests entirely with best practice self service Service delivered via the Service Catalog (Service Catalog) Process Automate human and system interactions; Increased Automation eliminate latency, errors and omissions (Workflow Engine) Service, Efficiency Policy Detect and remediate automatically, with no human and Savings Enforcement (Policy Engine) involvement Task Perform multiple remote management tasks Automation (Task Engine) simultaneously Remote Management Avoid desk side visits with one to one remote (Remote Services) management capabilities Altiris IT Management Suite 6
  • 7. Altiris Product Family • ServiceDesk Altiris IT Management Suite 7.0 from Symantec Altiris™ Service Desk • ITIL best practices from Symantec • Service Catalog Self Altiris™ Asset • Manage budgets Service Management Suite from • Ensure license compliance (Service Catalog) Symantec • Support growth or contraction • Align IT with the business Process Automation (Workflow Engine) Altiris™ Client • Configuration management Management Suite from • Patch management Policy Symantec • Monitoring and alerting Enforcement • Remote control (Policy Engine) Altiris™ Server • IT process automation • Best practices Management Suite from • Manage virtual infrastructure Task Symantec Automation (Task Engine) Altiris™ Deployment • System provisioning Remote • Task-based operations Management Solution from Symantec • Simple one to one management (Remote Services) Altiris IT Management Suite 7
  • 8. IT Management Suite 7.0 Components Integrated products in one comprehensive suite – Client Management Suite 7 – Asset Management Suite 7 – Server Management Suite 7 – ServiceDesk 7 – Workflow 7 Key Features – Built-in process automation – Intelligent software management – OS Migration, featuring Windows 7 – Comprehensive client, server, and asset management Altiris IT Management Suite 8
  • 9. IT Management Suite Benefits Reduce Total Costs Reduce Complexity Focus on Critical Organization Initiatives • Automate time • Gain complete visibility • Align process, people consuming tasks into IT environment and technology • Software and hard- • Increase security and • Free IT to focus on ware management reduce risks strategic business • OS Migrations initiatives • Get information to IT • Close technology and decision makers • Drive business gaps to maximize investments • Increase Service Levels Altiris IT Management Suite 9
  • 10. Windows 7 No Touch Migration Customer Profile Background • Planned OS upgrade and migration of 300,000 Global Financial Institution endpoints within 18 months • 300,000+ endpoints • Moving to corporate standard image • 30+ hardware platforms • Estimated $200-300 migration cost per endpoint • Estimated 5 migrations per technician per night • 600+ applications • 7 data centers Results Previous Products • 200% greater efficiency while using less staff • Migrated ~1,800 endpoints in a 24-hour period • Ghost / Microsoft ImageX • Required only 6 technicians per 400 migrations Previous Migration Rate • Process deployed the corporate SOE, then Line of • 1,000 migrations in 12 Business software, then specialized “one off” months applications Altiris IT Management Suite 10
  • 11. 7 Steps to Windows 7 Inventory 1 Asset Mgmt CMDB Deployment 2 Solution Wise Package 3 Studio Deployment 4 Solution 5 Workflow Deployment Solution 6 Software Mgmt Patch Mgmt Inventory 7 ServiceDesk Altiris IT Management Suite 11
  • 12. Licensing Harvesting at Large Manufacturer Customer Profile Background World’s largest • Needed better understanding of software manufacturer and environment marketer of major home • Unstable software licensing costs appliances. • Wanted increased negotiating power with software vendors to save money • 214 locations in 44 countries Results • 73,000 employees • Uninstalled 6,441 unregistered software globally products • Cost avoidance of over $2 million (US) • 31,000 Client Nodes • Negotiated new Enterprise Agreement with vendor • 1,500 Server Nodes Altiris IT Management Suite 12
  • 13. Eliminating Unnecessary IT Labor VPN Certificate Request Manual Effort • Number of requests Before Automation – 334 requests in 2 months 1. User entered request via web site • Estimated Helpdesk Time Spent – No error checking, no user – 25.05 man weeks per year verification 2. Request forwarded to Helpdesk 3. Worker opened ticket Results – Found request number and logged into Certificate Server • Number of requests – Approved or Denied request (blindly) – 1,774 requests in 6 months – Marked ticket completed • Estimated Helpdesk Time Spent – Certificate emailed to end-user with – 0 Hours no security attached • Cost avoided Average time to completion – 1.5 days – $85k annually Altiris IT Management Suite 13
  • 14. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Altiris IT Management Suite 14