SlideShare a Scribd company logo
1 of 28
Welcome to the Webinar
Contextual Security and Application Control for Virtualized Desktops
Tim Cox
Principal Sales Engineer
Ivanti
Jens Schmidt
Sales Manager
deviceTRUST
Sascha Goeckel
Pre-Sales Manager
deviceTRUST
Agenda
• Welcome
• Ivanti Application Control
• deviceTRUST Contextual Security
• Live Demo
• Summary
Established in 1985
Privately owned
Headquarters in Salt Lake City, UT.
~1,900 employees in 23 countries
27,500+ customers, 47.5M+ endpoints
1,500+ partners
10 acquisitions since 2012
20152005200019901985 1995 2010 2020
ITAM
Security
ITSM
Supply Chain
UEM
Ivanti DNA
Highlighted Ivanti Capabilities
Discovery • Reporting • Analytics • Workflow Automation • Self Service
Cloud or On-Premises
Full ITSM /
ITIL Support
Voice Automation /
Telephony
Service
Catalog
Project Portfolio
Management
Service
Management
IT
Operations
Software / Hardware Asset
Management
Device Lifecycle
Management
Environment
Management
File & Profile
Migration
Software
Distribution
AV /
Anti-Malware
Patch
Management
Device and
App Control
Privilege
Management
Configuration
Management
Operational
Security
On-boarding /
Off-boarding
Mobility
Management
Voice
Enablement
Mobile Browser
Solutions
Terminal
Emulation
Smart Device
Remote Control
Supply
Chain
•Ivanti Application Control
WHAT IS APPLICATION CONTROL™, AND HOW CAN IT HELP
ENTERPRISE BUSINESSES?
1. Remove administrative rights
2. Stay up-to-date on business objectives through
operational security practices
3. Control network access to critical applications
and data
… ALL WITHOUT AFFECTING the user’s workflow and productivity, yet also
helping to enable their relationship with IT.
APPLICATION CONTROL:
KEY DIFFERENTIATORS AND FOCUSES
 Runs ‘Headless’ and Secure by Design
 On the workspace, just an agent and configuration
are needed, backend optional.
 Works online OR offline.
 Protection against uninstallation.
 Agnostically Awesome
 Works on any Windows OS (version applicable).
 Works across any platform; physical, virtual,
datacenter, or cloud.
 Say Goodbye to Traditional Whitelisting
 Trusted Ownership ensures those applications
installed by trusted installers can run without
needing to whitelist them.
 Quickly apply to any scenario
 Protect against File-Based (Ransomware) & File-
Less Malware
 Trusted Ownership creates a layer of ‘zero-trust’;
everything is blocked from executing except
authorized applications.
 Confidently Control Licensed Applications
 Ensure only those needing access to licensed applications
can run them
APPLICATION CONTROL: PRIVILEGE MANAGEMENT
 Facilitate the removal of admin rights
from enterprise
 Allow the execution of applications that cannot run with
standard user rights
 Not just to admin, to any rights level that is needed
 Allow users access to the tools they need,
without excess rights
 Defrag the drive, change time, etc.
 Support personal applications while allowing it
the control they require.
 Known good locations containing known good apps
 Elevation of active x installs
 Apps within Internet Explorer
APPLICATION CONTROL: TRUSTED OWNERSHIP
 On any windows system, there are certain accounts
that are trusted to introduce new software, where
everything they install is inherently ‘owned’:
 The system account
 Local admin
 Trusted installer
 “Administrators” groups (Local or Active Directory)
 (Add your own users or groups from your environment)
 As a fundamental security model of the Windows OS,
with application control, if the file is not owned by a
trusted ‘owner’, it won’t be allowed to execute.
WELCOME TO DYNAMIC WHITELISTING
APPLICATION CONTROL: POWER BEYOND PRIVILEGE
 Contextual based control
 SHA1/SHA2 Whitelisting
 Metadata support
 Certificate Support
 Secure dialog box support
 Passive mode
 URL Redirection
 Licensing / Compliance control
 Software Asset Management
 Application Network Access control
 Windows 10 Support
 Windows App Store Support
 Prevent configured apps from being
terminated
 Windows services protections
 Application installation/uninstallation
protections
 AD and OU Support
 Scripted rules
 Scriptable agents and console
 Enterprise auditing
 App V support
 Citrix / Terminal Server Support
 Registered allocated Windows altitude Driver
https://msdn.microsoft.com/en/us/library/windows/hardware/dn265170(v=vs.85).aspx
 Certified MS Product
 SCCM integration
 AD/GPO deployment
 SCOM Management packs
Standard or Administrator
AdministratorUser
Removing admin rights from your desktops…
Ivanti Application Control
 Privilege management, Trusted Ownership
About us
• German-based ISV founded in January 2016
• Customers from the verticals Finance, Healthcare,
Transport & Government with up to 63,000 licensed
users
• Germany’s most active seed stage investor High-Tech
Gründerfonds (HTGF) invested in July 2017
Headquarter Office
HUB31, Darmstadt DE
Development Office
The Innovation Centre, Daresbury UK
Why deviceTRUST
Desktop Thin Client
Managed
Tablet
COPE / BYOD Unmanaged
Digital Workplace
Corporate
Desktops
Corporate
Applications
Corporate
Resources
Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
Why deviceTRUST
User Authentication
Desktop Thin Client
Managed
Tablet
COPE / BYOD Unmanaged
Digital Workplace
Corporate
Desktops
Corporate
Applications
Corporate
Resources
Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
Security, Compliance & Regulatory Requirements
Why deviceTRUST
User Authentication
Desktop Thin Client
Managed
Tablet
COPE / BYOD Unmanaged
Digital Workplace
Corporate
Desktops
Corporate
Applications
Corporate
Resources
Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
Security, Compliance & Regulatory Requirements
Why deviceTRUST
User Authentication
Desktop Thin Client
Managed
Tablet
COPE / BYOD Unmanaged
Digital Workplace
Corporate
Desktops
Corporate
Applications
Corporate
Resources
Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
Security, Compliance & Regulatory Requirements
deviceTRUST Contextual Security
deviceTRUST Solution
deviceTRUST Contextual Security
Actions & triggers with no additional infrastructure.
Context
Endpoint
Information
Location
Information
Network
Information
• Security State
• Hardware
• Corporate Certificate
• Domain Membership
• …
• Access Type
• Validated Network
• Wi-Fi Network
• Network Security
• …
• Geolocation
• Internet Service Provider (ISP)
• Network Location
• …
deviceTRUST Solution
deviceTRUST Contextual Security
Actions & triggers with no additional infrastructure.
Contextual Access
Actions
Contextual Policies
Contextual
Application Access
Context
Endpoint
Information
Location
Information
Network
Information
• Security State
• Hardware
• Corporate Certificate
• Domain Membership
• …
• Access Type
• Validated Network
• Wi-Fi Network
• Network Security
• …
• Geolocation
• Internet Service Provider (ISP)
• Network Location
• …
Live Demo
deviceTRUST Architecture – No infrastructure required!
deviceTRUST Architecture – No infrastructure required!
deviceTRUST Architecture – No infrastructure required!
Use Case Overview
• Conditional access based on context (network, Wi-Fi security, geolocation,
location, hardware used, corporate endpoint etc.)
• Contextual application access (e.g. with Ivanti Application Control)
• Location based resource mapping
• Wi-Fi roaming based default printer management
• Device-based licensing (e.g. Microsoft Visio license compliance)
• External partner access
• Improve usability
• Optimize screen saver configuration
• Inform user about endpoint is going out of battery
• Location aware Google Chrome Search Provider & Google Maps home
• Context everywhere (double-hop support)
• …
Live Demo
• Check out our Use Case videos:
• Website: https://deviceTRUST.com/Ivanti
• YouTube: https://www.youtube.com/channel/UCQIXvqqMDNjkcQQR48F7CDQ
Thank you
Internet: https://devicetrust.com
Email: sales@devicetrust.com
Twitter: @deviceTRUST
Contacts: Jens Schmidt
Email: jens.schmidt@devicetrust.com
Mobil: +49 (1520) 4457309
Sascha Goeckel
Email: sascha.goeckel@devicetrust.com
Mobil: +49 (151) 20522308
Do you like to know more about our solution, please contact us:

More Related Content

What's hot

AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramIvanti
 
Technology for People in Healthcare
Technology for People in HealthcareTechnology for People in Healthcare
Technology for People in HealthcareRES
 
How to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service TechnologyHow to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service TechnologyRES
 
Empower Your Workforce Through Self Service
Empower Your Workforce Through Self ServiceEmpower Your Workforce Through Self Service
Empower Your Workforce Through Self ServiceRES
 
Service Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study WebinarService Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study WebinarIvanti
 
Conquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionConquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionRES
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareRES
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseRES
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - ExplainedGhassan Chahine
 
SMB300: An Introduction to DevOps in ITSM
SMB300: An Introduction to DevOps in ITSMSMB300: An Introduction to DevOps in ITSM
SMB300: An Introduction to DevOps in ITSMIvanti
 
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar SlidesMind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar SlidesRES
 
Transforming the digital experience of your workforce
Transforming the digital experience of your workforceTransforming the digital experience of your workforce
Transforming the digital experience of your workforceRES
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondRES
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be InnovatingAre Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be InnovatingRES
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services PresentationIISGL
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestAdrian Dumitrescu
 
Beyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar SlidesBeyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar SlidesRES
 
How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line Net at Work
 

What's hot (20)

AMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management ProgramAMB400: How to Build a Successful IT Asset Management Program
AMB400: How to Build a Successful IT Asset Management Program
 
Technology for People in Healthcare
Technology for People in HealthcareTechnology for People in Healthcare
Technology for People in Healthcare
 
How to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service TechnologyHow to Empower Your Clinician with Automated Self-Service Technology
How to Empower Your Clinician with Automated Self-Service Technology
 
Empower Your Workforce Through Self Service
Empower Your Workforce Through Self ServiceEmpower Your Workforce Through Self Service
Empower Your Workforce Through Self Service
 
Service Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study WebinarService Delivery Beyond IT - Customer Case Study Webinar
Service Delivery Beyond IT - Customer Case Study Webinar
 
Conquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service AdoptionConquer the Barriers to Self-Service Adoption
Conquer the Barriers to Self-Service Adoption
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Flexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern EnterpriseFlexible and Secure Workspaces for the Modern Enterprise
Flexible and Secure Workspaces for the Modern Enterprise
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
SMB300: An Introduction to DevOps in ITSM
SMB300: An Introduction to DevOps in ITSMSMB300: An Introduction to DevOps in ITSM
SMB300: An Introduction to DevOps in ITSM
 
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar SlidesMind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
Mind The Gap: Why IT Will Deliver a Great User Experience - Webinar Slides
 
Transforming the digital experience of your workforce
Transforming the digital experience of your workforceTransforming the digital experience of your workforce
Transforming the digital experience of your workforce
 
Looking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and BeyondLooking Ahead: Predictions for 2016 and Beyond
Looking Ahead: Predictions for 2016 and Beyond
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be InnovatingAre Your IT Professionals Fire-Fighting When They Should Be Innovating
Are Your IT Professionals Fire-Fighting When They Should Be Innovating
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
Beyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar SlidesBeyond the Enterprise App Store – Webinar Slides
Beyond the Enterprise App Store – Webinar Slides
 
Virtualization security audit
Virtualization security auditVirtualization security audit
Virtualization security audit
 
How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line
 

Similar to Contextual Security and Application Control for Virtualized Desktops

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to IvantiIvanti
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDNUG e.V.
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3InTTrust S.A.
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskPrecisely
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimend
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itPeter Daalmans
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanDavid J Rosenthal
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Technologies
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPrimend
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 

Similar to Contextual Security and Application Control for Virtualized Desktops (20)

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
DACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdfDACHNUG50 HCL BigFix mobile.pdf
DACHNUG50 HCL BigFix mobile.pdf
 
In t trustm365ems_v3
In t trustm365ems_v3In t trustm365ems_v3
In t trustm365ems_v3
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Information Security
Information SecurityInformation Security
Information Security
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - AtidanMicrosoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
Microsoft Enterprise Mobility and Security Launch - August 5-2015 - Atidan
 
InstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and BenefitsInstaSafe Zero Trust Access - Key Features and Benefits
InstaSafe Zero Trust Access - Key Features and Benefits
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendusedPraktiline pilvekonverents - IT haldust hõlbustavad uuendused
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 

More from Ivanti

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de AbrilIvanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia AprileIvanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - MarsIvanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de MarzoIvanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia MarzoIvanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de FebreroIvanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - FévrierIvanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioIvanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch TuesdayIvanti
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch TuesdayIvanti
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch TuesdayIvanti
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch TuesdayIvanti
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de EneroIvanti
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – JanvierIvanti
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch TuesdayIvanti
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de DiciembreIvanti
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – DécembreIvanti
 

More from Ivanti (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – Janvier
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch Tuesday
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de Diciembre
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – Décembre
 

Recently uploaded

Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 

Recently uploaded (20)

Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 

Contextual Security and Application Control for Virtualized Desktops

  • 1. Welcome to the Webinar Contextual Security and Application Control for Virtualized Desktops Tim Cox Principal Sales Engineer Ivanti Jens Schmidt Sales Manager deviceTRUST Sascha Goeckel Pre-Sales Manager deviceTRUST
  • 2. Agenda • Welcome • Ivanti Application Control • deviceTRUST Contextual Security • Live Demo • Summary
  • 3. Established in 1985 Privately owned Headquarters in Salt Lake City, UT. ~1,900 employees in 23 countries 27,500+ customers, 47.5M+ endpoints 1,500+ partners 10 acquisitions since 2012
  • 4. 20152005200019901985 1995 2010 2020 ITAM Security ITSM Supply Chain UEM Ivanti DNA
  • 5. Highlighted Ivanti Capabilities Discovery • Reporting • Analytics • Workflow Automation • Self Service Cloud or On-Premises Full ITSM / ITIL Support Voice Automation / Telephony Service Catalog Project Portfolio Management Service Management IT Operations Software / Hardware Asset Management Device Lifecycle Management Environment Management File & Profile Migration Software Distribution AV / Anti-Malware Patch Management Device and App Control Privilege Management Configuration Management Operational Security On-boarding / Off-boarding Mobility Management Voice Enablement Mobile Browser Solutions Terminal Emulation Smart Device Remote Control Supply Chain
  • 7. WHAT IS APPLICATION CONTROL™, AND HOW CAN IT HELP ENTERPRISE BUSINESSES? 1. Remove administrative rights 2. Stay up-to-date on business objectives through operational security practices 3. Control network access to critical applications and data … ALL WITHOUT AFFECTING the user’s workflow and productivity, yet also helping to enable their relationship with IT.
  • 8. APPLICATION CONTROL: KEY DIFFERENTIATORS AND FOCUSES  Runs ‘Headless’ and Secure by Design  On the workspace, just an agent and configuration are needed, backend optional.  Works online OR offline.  Protection against uninstallation.  Agnostically Awesome  Works on any Windows OS (version applicable).  Works across any platform; physical, virtual, datacenter, or cloud.  Say Goodbye to Traditional Whitelisting  Trusted Ownership ensures those applications installed by trusted installers can run without needing to whitelist them.  Quickly apply to any scenario  Protect against File-Based (Ransomware) & File- Less Malware  Trusted Ownership creates a layer of ‘zero-trust’; everything is blocked from executing except authorized applications.  Confidently Control Licensed Applications  Ensure only those needing access to licensed applications can run them
  • 9. APPLICATION CONTROL: PRIVILEGE MANAGEMENT  Facilitate the removal of admin rights from enterprise  Allow the execution of applications that cannot run with standard user rights  Not just to admin, to any rights level that is needed  Allow users access to the tools they need, without excess rights  Defrag the drive, change time, etc.  Support personal applications while allowing it the control they require.  Known good locations containing known good apps  Elevation of active x installs  Apps within Internet Explorer
  • 10. APPLICATION CONTROL: TRUSTED OWNERSHIP  On any windows system, there are certain accounts that are trusted to introduce new software, where everything they install is inherently ‘owned’:  The system account  Local admin  Trusted installer  “Administrators” groups (Local or Active Directory)  (Add your own users or groups from your environment)  As a fundamental security model of the Windows OS, with application control, if the file is not owned by a trusted ‘owner’, it won’t be allowed to execute. WELCOME TO DYNAMIC WHITELISTING
  • 11. APPLICATION CONTROL: POWER BEYOND PRIVILEGE  Contextual based control  SHA1/SHA2 Whitelisting  Metadata support  Certificate Support  Secure dialog box support  Passive mode  URL Redirection  Licensing / Compliance control  Software Asset Management  Application Network Access control  Windows 10 Support  Windows App Store Support  Prevent configured apps from being terminated  Windows services protections  Application installation/uninstallation protections  AD and OU Support  Scripted rules  Scriptable agents and console  Enterprise auditing  App V support  Citrix / Terminal Server Support  Registered allocated Windows altitude Driver https://msdn.microsoft.com/en/us/library/windows/hardware/dn265170(v=vs.85).aspx  Certified MS Product  SCCM integration  AD/GPO deployment  SCOM Management packs
  • 13. Removing admin rights from your desktops…
  • 14. Ivanti Application Control  Privilege management, Trusted Ownership
  • 15. About us • German-based ISV founded in January 2016 • Customers from the verticals Finance, Healthcare, Transport & Government with up to 63,000 licensed users • Germany’s most active seed stage investor High-Tech Gründerfonds (HTGF) invested in July 2017 Headquarter Office HUB31, Darmstadt DE Development Office The Innovation Centre, Daresbury UK
  • 16. Why deviceTRUST Desktop Thin Client Managed Tablet COPE / BYOD Unmanaged Digital Workplace Corporate Desktops Corporate Applications Corporate Resources Amazon AWS, Citrix, Microsoft, Parallels, VMware etc.
  • 17. Why deviceTRUST User Authentication Desktop Thin Client Managed Tablet COPE / BYOD Unmanaged Digital Workplace Corporate Desktops Corporate Applications Corporate Resources Amazon AWS, Citrix, Microsoft, Parallels, VMware etc. Security, Compliance & Regulatory Requirements
  • 18. Why deviceTRUST User Authentication Desktop Thin Client Managed Tablet COPE / BYOD Unmanaged Digital Workplace Corporate Desktops Corporate Applications Corporate Resources Amazon AWS, Citrix, Microsoft, Parallels, VMware etc. Security, Compliance & Regulatory Requirements
  • 19. Why deviceTRUST User Authentication Desktop Thin Client Managed Tablet COPE / BYOD Unmanaged Digital Workplace Corporate Desktops Corporate Applications Corporate Resources Amazon AWS, Citrix, Microsoft, Parallels, VMware etc. Security, Compliance & Regulatory Requirements deviceTRUST Contextual Security
  • 20. deviceTRUST Solution deviceTRUST Contextual Security Actions & triggers with no additional infrastructure. Context Endpoint Information Location Information Network Information • Security State • Hardware • Corporate Certificate • Domain Membership • … • Access Type • Validated Network • Wi-Fi Network • Network Security • … • Geolocation • Internet Service Provider (ISP) • Network Location • …
  • 21. deviceTRUST Solution deviceTRUST Contextual Security Actions & triggers with no additional infrastructure. Contextual Access Actions Contextual Policies Contextual Application Access Context Endpoint Information Location Information Network Information • Security State • Hardware • Corporate Certificate • Domain Membership • … • Access Type • Validated Network • Wi-Fi Network • Network Security • … • Geolocation • Internet Service Provider (ISP) • Network Location • …
  • 23. deviceTRUST Architecture – No infrastructure required!
  • 24. deviceTRUST Architecture – No infrastructure required!
  • 25. deviceTRUST Architecture – No infrastructure required!
  • 26. Use Case Overview • Conditional access based on context (network, Wi-Fi security, geolocation, location, hardware used, corporate endpoint etc.) • Contextual application access (e.g. with Ivanti Application Control) • Location based resource mapping • Wi-Fi roaming based default printer management • Device-based licensing (e.g. Microsoft Visio license compliance) • External partner access • Improve usability • Optimize screen saver configuration • Inform user about endpoint is going out of battery • Location aware Google Chrome Search Provider & Google Maps home • Context everywhere (double-hop support) • …
  • 27. Live Demo • Check out our Use Case videos: • Website: https://deviceTRUST.com/Ivanti • YouTube: https://www.youtube.com/channel/UCQIXvqqMDNjkcQQR48F7CDQ
  • 28. Thank you Internet: https://devicetrust.com Email: sales@devicetrust.com Twitter: @deviceTRUST Contacts: Jens Schmidt Email: jens.schmidt@devicetrust.com Mobil: +49 (1520) 4457309 Sascha Goeckel Email: sascha.goeckel@devicetrust.com Mobil: +49 (151) 20522308 Do you like to know more about our solution, please contact us:

Editor's Notes

  1. The Ivanti DNA… what makes us what we are, and unique in the industry, is the result of the organic work we’ve done over the years, as well as the strategic acquisitions we have made, each of which added capabilities in our 5 areas of focus: IT Asset Management IT Service Management Operational Security Unified Endpoint Management Supply Chain enablement
  2. 30 labs were done in 2016
  3. 30 labs were done in 2016
  4. 30 labs were done in 2016