Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Kaseya Asset Discovery Overview


Published on

Accurate and efficient asset discovery is an integral part of IT operations management. Key concepts of successful asset discovery, either by scanning the network or Active Directory, will be the key topic of discussion in this session. You will also learn about advanced fingerprinting techniques used within Kaseya Virtual System Administrator (VSA) and Kaseya Traverse to present key performance indicators for monitoring. Finally, we will explore how asset discovery is not only limited to servers and workstations, but expanding into mobile devices and applications in the highly distributed and cloud-enabled networks.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Kaseya Asset Discovery Overview

  1. 1. Kaseya Asset Discovery Rajib Rashid Sr. Director, Product Management Copyright ©2014 Kaseya 1
  2. 2. Kaseya Asset Discovery The information in this presentation is confidential and proprietary to Kaseya and may not be disclosed or distributed without the prior written permission of Kaseya. This document, and any related presentation, as well as Kaseya's strategy, possible future developments, products, platforms, directions and/or functionality are all subject to change without notice at Kaseya’s sole discretion. The information in this document does not constitute a commitment, contract, promise or legal obligation to deliver any material, code or functionality. This document is provided without warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. This document is for informational purposes only and may not be incorporated into a contract. All forward-looking statements, including those set forth in this presentation, are subject to various assumptions, risks and uncertainties that could cause actual results to differ materially from projections. Readers are cautioned not to place undue reliance on such forward-looking statements, and specifically, not to rely upon such in making purchasing decisions. Copyright ©2014 Kaseya 2
  3. 3. Discovery Use Cases Copyright ©2014 Kaseya 3
  4. 4. Discovery Use Cases  Asset Management – Locate server/workstations in network – Automatic Kaseya Agent deployment – Launch Remote Control, Agent Procedure  Performance Monitoring – Query local/remote devices – Verify availability, measure performance – Raise alarm, open trouble ticket  No “one size fits all” solution Copyright ©2014 Kaseya 4
  5. 5. VSA/Network Monitor Copyright ©2014 Kaseya 5
  6. 6. VSA/Network Monitor  LAN Watch – Ping sweep within local network – Port scan, MAC address for classification  Domain Watch – Synchronize Active Directory data  Network Monitor Integrated – Monitor assets from VSA Discovery Copyright ©2014 Kaseya 6
  7. 7. Network (LAN) Discovery Copyright ©2014 Kaseya 7
  8. 8. Domain (AD) Integration Copyright ©2014 Kaseya 8
  9. 9. Traverse Advanced Monitoring Copyright ©2014 Kaseya 9
  10. 10. Traverse Discovery Workflow Copyright ©2014 Kaseya 10
  11. 11. Traverse Discovery Result Copyright ©2014 Kaseya 11
  12. 12. Network Topology/Dependency Copyright ©2014 Kaseya 12
  13. 13. Smart Event Suppression  Root cause analysis – Check availability of upstream devices – Identify real cause of outage – Highlight affected devices/applications  Eliminate false alarms – Prevent alarm flood from affected devices Copyright ©2014 Kaseya 13
  14. 14. Asset Fingerprinting Copyright ©2014 Kaseya 14  Device Signatures – Identify device type, running application – Locate key performance/availability metrics – Default thresholds based on industry standard – Facilitate rapid deployment Traditional Approach Locate MIBs Load, Compile Identify Metrics Adjust Thresholds Start Monitoring Traverse Solution Perform Discovery Start Monitoring
  15. 15. Supported IT Infrastructure Copyright ©2014 Kaseya 15 •Arrowpoin t •F5 •Coradiant •Peribit •Bluecoat • Riverbed •NetApp •Brocade •Sun T300 •ADIC •Dell •EMC Applications Firewalls •Oracle, SQL Server, DB2, MySQL •Exchange, Lotus Notes •IIS, Apache, WebLogic, WebSphere, Java, JMX •Citrix, AD, DNS, DHCP, WINS •Blackberry Network •Routing (BGP, OSPF, RIP) •Frame Relay & ATM •WiFi, RMON2 •Cisco, Foundry, Juniper, Avaya, Amperion, Neoteris Servers • VMware vSphere, Xen, HyperV • Dell OpenManager • Compaq Insight Manager • Cisco UCS, CUCM • Linux, Solaris, HP-UX, Windows, Novell Content Delivery Storage Fixed Wireless Voice over IP Environmental Management •Netscreen •Checkpoint •Fortinet •PIX •NetASQ •Kagoor •Broadworks •DragonWave •NextNet •Redline •Tasman •Liebert •APC •NetBotz •Valere •Omnitroni x •Cyclades •Cisco Call Manager •Cisco IP-SLA
  16. 16. Future Discovery Direction Copyright ©2014 Kaseya 16
  17. 17. VSA Discovery Roadmap  Key objectives – Strong focus on user experience – Utilize best-of-breed technology – Improve reliability and consistency  Approach – Enhance LAN discovery engine – Augment server audit data – Retain feature parity Copyright ©2014 Kaseya 17
  18. 18. Evolving Asset Discovery Scope  Beyond servers/workstations  Hybrid cloud/virtualized environments – Elastic compute resources – vMotion/DRS  SaaS Applications – Google Apps, Office 365 – User synchronization  Storage Area Network Copyright ©2014 Kaseya 18
  19. 19. Copyright ©2014 Kaseya 19 Questions and Answers Thanks for Attending Kaseya Connect #KaseyaConnect Let's Share!