SlideShare a Scribd company logo
1 of 19
ActiveManage:
Anywhere, Anytime
™
™
Page 2
ActiveManage
 Anywhere, anytime active control
 Intuitive interfaces
 Web and Wireless
 Unified and familiar interfaces
 Enabling productivity gains from the networked
environment
 Proactive responses, preventative actions
 The tool for the network administrator to continually
improve Quality of Service
Page 3
Why ActiveManage?
= Blowing Money
& Productivity
Away
= Continual
improvement
to network quality
Active Control
Page 4
What is ActiveManage?
Clients ActiveManage
Server
Agents
Web, Palm
& Pocket PC
Windows,
Linux,
Solaris
Windows 2000
Page 5
ActiveManage Architecture
Native
Sys. Calls
Encrypt.
AgentsWindows Solaris Linux
Agent Interface
IPC Engine
Client
Comms
Alert
Engine
Cross
Platform
Engine
DB
Engine
Web Servlet WIP Servlet
IIS Web Server
DB
KVM
Engine
Native
Sys. Calls
Encrypt.
Native
Sys. Calls
Encrypt.
Web
Palm
PocketPC
Interbase
Oracle
MS SQL
JDBC
Page 6
Key Features
 Active Controls
 Web & Wireless Console
 Heterogeneous & Multiple Platforms
 Remote KVM (Keyboard Video Mouse)
 Secure & Encrypted
 Flexible & Fast Configuration
 Extensible SDK Architecture
Page 7
Active Controls
 Alert Engine
 Triggers on performance or
application counters
 possible on 1000’s of
counters
 Notify on events, conditions
and thresholds
 to cell phones, PDA or e-
mail
 Automated responses
through rules
 Established by admin.
 History stored of events and
actions
Page 8
Active Control (cont.)
 Rule Based Responses
 Chaining of events &
automated responses
 Escalation of events
 Scheduled responses w/
automated actions
 Generate rule profiles for
common classes of
machines
 Reporting
 Trends – time events, alerts
 System response reporting
 Export to Excel, PDF, Browser
Page 9
Web and Wireless
 Portable unified console –
anywhere, anytime
 Full capability to monitor,
diagnose, take actions &
resolve issues
 Familiar dialogs and
commands using native
system calls
 Actively respond to alerts and
events
 Continuous access to
conditions to improve network
quality
Page 10
Heterogeneous Platform
 Perform commands
transparently across
multiple platforms
simultaneously
 Complete access to IT
environment from unified
web, and wireless
interfaces
 Easy to move between
systems
 Unified view of active alerts
and responses
Page 11
Remote KVM
 Secure & encrypted control of
user environment
 Compliments help desk
functionality
 Remote access to system for
diagnosis and repair
 Tools for experts from remote
locations
 Reduce costs associated with
system troubleshooting and
repair
 Closes the loop to the system
in ActiveManage
Page 12
Secure & Encrypted
128 bit
SSL
128 bit
AES
WIP
128bit
SSL
128 bit
AES
WIP
IISWebServer
HTTP
Encap
AgentInterface
ActiveManage Server
128 bit
SSL
Encrypt
Clients
Agents
128 bit
SSL
Encrypt
Page 13
Flexible & Fast Configuration
 Flexible
 Control over systems at highly
granular levels
 Establishes permissions for
multiple servers from single
environment
 Supports multiple network
admin. roles or sub-
administrators
 Configuration
 Agents
 Small footprint, low use of
bandwidth & resources
 Predefined templates for rapid
deployment
 Discovery – ActiveManage
Server automatically finds
running server agents
Page 14
Demonstration
Active Control
Page 15
Feature Comparison
ProductivityN
et
H
P
O
penView
M
anageX
M
icroS
oftM
O
M
IntelLAN
D
esk
C
A
C
ontrolIT
Web Console   
Wireless 
View Processes  
Control System   
KVM Access   
Users/ Groups 
Event Log  
Active Directory  
Registry 
Network Settings 
Alerting (Sys, Prot, SNMP)  
Windows     
Linux   
Solaris  
SNMP Devices   
Page 16
Platform Availability
 Clients
 Web Browser – IE 5.0 and above
 Palm OS 3.2 and above (e.g. Palm, Visor, Kyocera Smartphone)
 PocketPC 3.0 and above (e.g. Compaq iPoQ)
 Client Connectivity
 PalmNet
 Wireless Ethernet - 802.11x
 Personal Area Network - Bluetooth
 Server
 Windows 2000 Server w/ SP2
 Internet Information Server (IIS) installed
 100 MB hard drive space, and 128 MB RAM minimum depending on usage
 Agents
 Windows NT 4.0 SP5+
 Windows 2000 Professional & Server
 Windows XP
 Redhat Linux 6.2+
 Mandrake Linux 7.2+
 Solaris 2.8
 Routers (future)
Page 17
Key factors for rapid ROI
 Agents
 Intelligent & autonomous, acting at the system level
 Alerts & Rules
 Detect a deterioration in service in advance of failure
 Rules to automatically correct & escalate
 Determine Root Cause of Problems
 Alerts and controls of the system at fine levels of granularity
 Act on end user experience, close the loop to the user
 Accessibility
 Ability to respond anywhere, anytime
 Rapid Implementation
 Easy to deploy agents, predefined rules and alerts
Page 18
Next Steps
 Download a Test License
 30 Day trial license: www.productivitynet.com/download
 1 Server and 10 Workstations
 Optional – Request a CD
 Live Trial
 1 week remote access to ProductivityNet ActiveManage
Server
 2 Server Agents, 2 Workstation Agents
ActiveManage product brief 2002

More Related Content

What's hot

Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Controlrkoscak
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Microsoft TechNet - Belgium and Luxembourg
 
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Intergen
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationnetworkershome
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Abdelslam Elsobky
 
Software Deployment by DeskCenter USA
Software Deployment by DeskCenter USASoftware Deployment by DeskCenter USA
Software Deployment by DeskCenter USADeskCenter USA Inc.
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMJerry Bishop
 
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The FieldDynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The FieldAmit Gatenyo
 
Configuring windows 7 to provide secure wireless access point services to wi fi
Configuring windows 7 to provide secure wireless access point services to wi fiConfiguring windows 7 to provide secure wireless access point services to wi fi
Configuring windows 7 to provide secure wireless access point services to wi fiRavi Kumar Lanke
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012capriguy84
 
SoCalDevOpsUserGroup-PresentationPuppetLabs
SoCalDevOpsUserGroup-PresentationPuppetLabsSoCalDevOpsUserGroup-PresentationPuppetLabs
SoCalDevOpsUserGroup-PresentationPuppetLabsSuresh Paulraj
 
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...Netgear Italia
 
Network Security Flow Diagram
Network Security Flow DiagramNetwork Security Flow Diagram
Network Security Flow Diagrambcheney76
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Introduction to Trusted Virtual Client
Introduction to Trusted Virtual ClientIntroduction to Trusted Virtual Client
Introduction to Trusted Virtual Clientgustavoeliano
 
GWAVACon: ZENworks Mobile Management (english)
GWAVACon: ZENworks Mobile Management (english)GWAVACon: ZENworks Mobile Management (english)
GWAVACon: ZENworks Mobile Management (english)GWAVA
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017Quest
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 

What's hot (20)

Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
 
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
Windows Accelerate IT Pro Bootcamp: App-V (Module 6 of 8)
 
Deployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccmDeployment day session 4 deployment using sccm
Deployment day session 4 deployment using sccm
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012
 
Software Deployment by DeskCenter USA
Software Deployment by DeskCenter USASoftware Deployment by DeskCenter USA
Software Deployment by DeskCenter USA
 
Seminar 2 ppt
Seminar 2 pptSeminar 2 ppt
Seminar 2 ppt
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The FieldDynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
Dynamic Server Provisioning With Ops Manager And Hyper V – Notes From The Field
 
Configuring windows 7 to provide secure wireless access point services to wi fi
Configuring windows 7 to provide secure wireless access point services to wi fiConfiguring windows 7 to provide secure wireless access point services to wi fi
Configuring windows 7 to provide secure wireless access point services to wi fi
 
SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012SCCM 2007 Introduction - PICC 2012
SCCM 2007 Introduction - PICC 2012
 
SoCalDevOpsUserGroup-PresentationPuppetLabs
SoCalDevOpsUserGroup-PresentationPuppetLabsSoCalDevOpsUserGroup-PresentationPuppetLabs
SoCalDevOpsUserGroup-PresentationPuppetLabs
 
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
 
Network Security Flow Diagram
Network Security Flow DiagramNetwork Security Flow Diagram
Network Security Flow Diagram
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Introduction to Trusted Virtual Client
Introduction to Trusted Virtual ClientIntroduction to Trusted Virtual Client
Introduction to Trusted Virtual Client
 
GWAVACon: ZENworks Mobile Management (english)
GWAVACon: ZENworks Mobile Management (english)GWAVACon: ZENworks Mobile Management (english)
GWAVACon: ZENworks Mobile Management (english)
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 

Viewers also liked

Viewers also liked (15)

RawGoodies® Ambiance Soy Fragrance Collection
RawGoodies® Ambiance Soy Fragrance CollectionRawGoodies® Ambiance Soy Fragrance Collection
RawGoodies® Ambiance Soy Fragrance Collection
 
Creative brief (1)
Creative brief (1)Creative brief (1)
Creative brief (1)
 
Creative brief format
Creative brief formatCreative brief format
Creative brief format
 
Red Bull Creative Brief
Red Bull Creative BriefRed Bull Creative Brief
Red Bull Creative Brief
 
Brand Analytics Workshop
Brand Analytics WorkshopBrand Analytics Workshop
Brand Analytics Workshop
 
Creative Brief Example
Creative Brief ExampleCreative Brief Example
Creative Brief Example
 
Sample creative briefs
Sample creative briefsSample creative briefs
Sample creative briefs
 
Strategic Thinking Workshop
Strategic Thinking WorkshopStrategic Thinking Workshop
Strategic Thinking Workshop
 
Smart strategic thinking for Marketers
Smart strategic thinking for MarketersSmart strategic thinking for Marketers
Smart strategic thinking for Marketers
 
Creative Brief Workshop
Creative Brief WorkshopCreative Brief Workshop
Creative Brief Workshop
 
Brand Management Training Program
Brand Management Training ProgramBrand Management Training Program
Brand Management Training Program
 
Marketing Execution workshop
Marketing Execution workshopMarketing Execution workshop
Marketing Execution workshop
 
Brand Positioning Workshop
Brand Positioning WorkshopBrand Positioning Workshop
Brand Positioning Workshop
 
Brand Plan Workshop
Brand Plan WorkshopBrand Plan Workshop
Brand Plan Workshop
 
Beloved Brands: Who are we?
Beloved Brands: Who are we?Beloved Brands: Who are we?
Beloved Brands: Who are we?
 

Similar to ActiveManage product brief 2002

Windows 2008 Overview
Windows 2008 OverviewWindows 2008 Overview
Windows 2008 OverviewAmit Gatenyo
 
eMagic-Data Center Management System
eMagic-Data Center Management SystemeMagic-Data Center Management System
eMagic-Data Center Management SystemSandesh Sonar
 
eMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management SuiteeMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management SuiteRaj Gire
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vuvncson
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringAmit Gatenyo
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartITimothy Chen
 
Dynamic Server Provisioning With Ops Manager and Hyper-V
Dynamic Server Provisioning With Ops Manager and Hyper-VDynamic Server Provisioning With Ops Manager and Hyper-V
Dynamic Server Provisioning With Ops Manager and Hyper-VAmit Gatenyo
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesInformation Technology
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS VulnerabilitiesSecurityTube.Net
 
Harbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbourIT
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web SystemsInnoTech
 
2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security SeminarShawn Wells
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_diveNur Shiqim Chok
 
NA Element May 2014 Webinar_Widescreen Format
NA Element May 2014 Webinar_Widescreen FormatNA Element May 2014 Webinar_Widescreen Format
NA Element May 2014 Webinar_Widescreen FormatMichael Christofferson
 

Similar to ActiveManage product brief 2002 (20)

Windows 2008 Overview
Windows 2008 OverviewWindows 2008 Overview
Windows 2008 Overview
 
eMagic-Data Center Management System
eMagic-Data Center Management SystemeMagic-Data Center Management System
eMagic-Data Center Management System
 
eMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management SuiteeMagic : A Complete Datacenter Management Suite
eMagic : A Complete Datacenter Management Suite
 
Microsoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son VuMicrosoft.Virtualization.Technologies Son Vu
Microsoft.Virtualization.Technologies Son Vu
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Dynamic Server Provisioning With Ops Manager and Hyper-V
Dynamic Server Provisioning With Ops Manager and Hyper-VDynamic Server Provisioning With Ops Manager and Hyper-V
Dynamic Server Provisioning With Ops Manager and Hyper-V
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
Harbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 Wrap
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar2008-03-06 Harris Corp Security Seminar
2008-03-06 Harris Corp Security Seminar
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
 
NA Element May 2014 Webinar_Widescreen Format
NA Element May 2014 Webinar_Widescreen FormatNA Element May 2014 Webinar_Widescreen Format
NA Element May 2014 Webinar_Widescreen Format
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

ActiveManage product brief 2002

  • 2. Page 2 ActiveManage  Anywhere, anytime active control  Intuitive interfaces  Web and Wireless  Unified and familiar interfaces  Enabling productivity gains from the networked environment  Proactive responses, preventative actions  The tool for the network administrator to continually improve Quality of Service
  • 3. Page 3 Why ActiveManage? = Blowing Money & Productivity Away = Continual improvement to network quality Active Control
  • 4. Page 4 What is ActiveManage? Clients ActiveManage Server Agents Web, Palm & Pocket PC Windows, Linux, Solaris Windows 2000
  • 5. Page 5 ActiveManage Architecture Native Sys. Calls Encrypt. AgentsWindows Solaris Linux Agent Interface IPC Engine Client Comms Alert Engine Cross Platform Engine DB Engine Web Servlet WIP Servlet IIS Web Server DB KVM Engine Native Sys. Calls Encrypt. Native Sys. Calls Encrypt. Web Palm PocketPC Interbase Oracle MS SQL JDBC
  • 6. Page 6 Key Features  Active Controls  Web & Wireless Console  Heterogeneous & Multiple Platforms  Remote KVM (Keyboard Video Mouse)  Secure & Encrypted  Flexible & Fast Configuration  Extensible SDK Architecture
  • 7. Page 7 Active Controls  Alert Engine  Triggers on performance or application counters  possible on 1000’s of counters  Notify on events, conditions and thresholds  to cell phones, PDA or e- mail  Automated responses through rules  Established by admin.  History stored of events and actions
  • 8. Page 8 Active Control (cont.)  Rule Based Responses  Chaining of events & automated responses  Escalation of events  Scheduled responses w/ automated actions  Generate rule profiles for common classes of machines  Reporting  Trends – time events, alerts  System response reporting  Export to Excel, PDF, Browser
  • 9. Page 9 Web and Wireless  Portable unified console – anywhere, anytime  Full capability to monitor, diagnose, take actions & resolve issues  Familiar dialogs and commands using native system calls  Actively respond to alerts and events  Continuous access to conditions to improve network quality
  • 10. Page 10 Heterogeneous Platform  Perform commands transparently across multiple platforms simultaneously  Complete access to IT environment from unified web, and wireless interfaces  Easy to move between systems  Unified view of active alerts and responses
  • 11. Page 11 Remote KVM  Secure & encrypted control of user environment  Compliments help desk functionality  Remote access to system for diagnosis and repair  Tools for experts from remote locations  Reduce costs associated with system troubleshooting and repair  Closes the loop to the system in ActiveManage
  • 12. Page 12 Secure & Encrypted 128 bit SSL 128 bit AES WIP 128bit SSL 128 bit AES WIP IISWebServer HTTP Encap AgentInterface ActiveManage Server 128 bit SSL Encrypt Clients Agents 128 bit SSL Encrypt
  • 13. Page 13 Flexible & Fast Configuration  Flexible  Control over systems at highly granular levels  Establishes permissions for multiple servers from single environment  Supports multiple network admin. roles or sub- administrators  Configuration  Agents  Small footprint, low use of bandwidth & resources  Predefined templates for rapid deployment  Discovery – ActiveManage Server automatically finds running server agents
  • 15. Page 15 Feature Comparison ProductivityN et H P O penView M anageX M icroS oftM O M IntelLAN D esk C A C ontrolIT Web Console    Wireless  View Processes   Control System    KVM Access    Users/ Groups  Event Log   Active Directory   Registry  Network Settings  Alerting (Sys, Prot, SNMP)   Windows      Linux    Solaris   SNMP Devices   
  • 16. Page 16 Platform Availability  Clients  Web Browser – IE 5.0 and above  Palm OS 3.2 and above (e.g. Palm, Visor, Kyocera Smartphone)  PocketPC 3.0 and above (e.g. Compaq iPoQ)  Client Connectivity  PalmNet  Wireless Ethernet - 802.11x  Personal Area Network - Bluetooth  Server  Windows 2000 Server w/ SP2  Internet Information Server (IIS) installed  100 MB hard drive space, and 128 MB RAM minimum depending on usage  Agents  Windows NT 4.0 SP5+  Windows 2000 Professional & Server  Windows XP  Redhat Linux 6.2+  Mandrake Linux 7.2+  Solaris 2.8  Routers (future)
  • 17. Page 17 Key factors for rapid ROI  Agents  Intelligent & autonomous, acting at the system level  Alerts & Rules  Detect a deterioration in service in advance of failure  Rules to automatically correct & escalate  Determine Root Cause of Problems  Alerts and controls of the system at fine levels of granularity  Act on end user experience, close the loop to the user  Accessibility  Ability to respond anywhere, anytime  Rapid Implementation  Easy to deploy agents, predefined rules and alerts
  • 18. Page 18 Next Steps  Download a Test License  30 Day trial license: www.productivitynet.com/download  1 Server and 10 Workstations  Optional – Request a CD  Live Trial  1 week remote access to ProductivityNet ActiveManage Server  2 Server Agents, 2 Workstation Agents