SlideShare a Scribd company logo
Security and Backup I:
OEM Architecture
Ben Lavalley
Product Manager, Kaseya
Copyright ©2014 Kaseya 1
The information in this presentation is confidential and proprietary to Kaseya and may
not be disclosed or distributed without the prior written permission of Kaseya. This
document, and any related presentation, as well as Kaseya's strategy, possible future
developments, products, platforms, directions and/or functionality are all subject to
change without notice at Kaseya’s sole discretion. The information in this document
does not constitute a commitment, contract, promise or legal obligation to deliver any
material, code or functionality. This document is provided without warranty of any
kind, either express or implied, including but not limited to, the implied warranties of
merchantability, fitness for a particular purpose, and non-infringement. This document
is for informational purposes only and may not be incorporated into a contract.
All forward-looking statements, including those set forth in this presentation, are
subject to various assumptions, risks and uncertainties that could cause actual results
to differ materially from projections. Readers are cautioned not to place undue
reliance on such forward-looking statements, and specifically, not to rely upon such in
making purchasing decisions.
Copyright ©2014 Kaseya 2
OEM Architecture Status
 Before, in version 6.3:
– Each OEM product was integrated individually with
the Kaseya Agent (client-side) and with the VSA
(server-side).
– Time-consuming maintenance
 Now, in version 6.5 and forward:
– Implemented a unique and generic driver that
manages all OEM products
– Integration with a new OEM product follows a simple
set of rules
Copyright ©2014 Kaseya 3
Proven Design
 OEM products leveraging this new
architecture today:
– Backup (Acronis)
– Antivirus (Kaspersky)
– Antimalware (MalwareBytes)
– Endpoint Security (AVG)
Copyright ©2014 Kaseya 4
Overview
 The purpose of the Driver is to run tasks that
take the form of an OEM product executable
being launched as a process.
 Examples of tasks: running a backup, scanning
for viruses, deploying software, etc.
Copyright ©2014 Kaseya 5
How it works
 The Driver is an “Agent Extension” and therefore is
packaged as a DLL exporting well known functions
(SendMsg, Stop, IsDone). It is loaded by a program
that is launched by the Kaseya Agent.
 Being an Agent Extension, the Driver expects to receive
commands via the SendMsg function. The commands
must be formatted as a command line when typed into
a command shell.
 The Driver is completely “data driven”, meaning that it
has not been built with the knowledge of any OEM
product inside of it.
 The Driver loads data from files and that data drive the
runtime of the Driver.
Copyright ©2014 Kaseya 6
Catalogs
 First uses of Driver are done internally by Kaseya
for our OEMs
 “Catalogs” created that detail information about
the third party, such as: where it is typically
installed, how to run that product tasks, etc.
 Support for Driver will be part of TAP program
 Three catalogs:
– Supported Products catalog
– Command catalog
– Message catalog
 Catalogs are written in JSON.
Copyright ©2014 Kaseya 7
Summary
 Benefits of new architecture:
– Generic, same for all OEM & partner products
– Simple, easy to maintain
– Can be dynamically patched
 SDK coming soon -> recruiting new partner
candidates to help create the SDK
Copyright ©2014 Kaseya 8
Copyright ©2014 Kaseya 9
Questions and Answers
Thanks for Attending Kaseya Connect
#KaseyaConnect
Let's Share!

More Related Content

What's hot

Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
Kaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Kaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Kaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Kaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
Kaseya
 
Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...
Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...
Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...
AppDynamics
 
SAP NetWeaver Neo*: Community-Driven Development
SAP NetWeaver Neo*: Community-Driven DevelopmentSAP NetWeaver Neo*: Community-Driven Development
SAP NetWeaver Neo*: Community-Driven DevelopmentMatthias Steiner
 
6 Reasons to Extend Guidewire
6 Reasons to Extend Guidewire 6 Reasons to Extend Guidewire
6 Reasons to Extend Guidewire
Pyramid Solutions, Inc.
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
Kaseya
 
Elastic Stack keynote
Elastic Stack keynoteElastic Stack keynote
Elastic Stack keynote
Elasticsearch
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
Extensibility in the cloud – power to the business user
Extensibility in the cloud – power to the business userExtensibility in the cloud – power to the business user
Extensibility in the cloud – power to the business user
Getting value from IoT, Integration and Data Analytics
 
Df12 gaurav kheterpal-integrating evernote and salesforce using the mobile sdk
Df12 gaurav kheterpal-integrating evernote and salesforce using the mobile sdkDf12 gaurav kheterpal-integrating evernote and salesforce using the mobile sdk
Df12 gaurav kheterpal-integrating evernote and salesforce using the mobile sdkGaurav Kheterpal
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
Building APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint PlatformBuilding APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint Platform
MuleSoft
 
SaaS Enablement Challenges & Approaches
SaaS Enablement Challenges & ApproachesSaaS Enablement Challenges & Approaches
SaaS Enablement Challenges & ApproachesImpetus Technologies
 
Identity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized BenefitsIdentity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized Benefits
CA Technologies
 

What's hot (20)

Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...
Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...
Unlock The Power Of Real-Time Performance Data With Business iQ - AppD Global...
 
SAP NetWeaver Neo*: Community-Driven Development
SAP NetWeaver Neo*: Community-Driven DevelopmentSAP NetWeaver Neo*: Community-Driven Development
SAP NetWeaver Neo*: Community-Driven Development
 
6 Reasons to Extend Guidewire
6 Reasons to Extend Guidewire 6 Reasons to Extend Guidewire
6 Reasons to Extend Guidewire
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 
Elastic Stack keynote
Elastic Stack keynoteElastic Stack keynote
Elastic Stack keynote
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
Extensibility in the cloud – power to the business user
Extensibility in the cloud – power to the business userExtensibility in the cloud – power to the business user
Extensibility in the cloud – power to the business user
 
Df12 gaurav kheterpal-integrating evernote and salesforce using the mobile sdk
Df12 gaurav kheterpal-integrating evernote and salesforce using the mobile sdkDf12 gaurav kheterpal-integrating evernote and salesforce using the mobile sdk
Df12 gaurav kheterpal-integrating evernote and salesforce using the mobile sdk
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
Building APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint PlatformBuilding APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint Platform
 
SaaS Enablement Challenges & Approaches
SaaS Enablement Challenges & ApproachesSaaS Enablement Challenges & Approaches
SaaS Enablement Challenges & Approaches
 
Identity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized BenefitsIdentity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized Benefits
 

Similar to Security and Backup I: OEM Architecture

Enterprise Heroku for Java
Enterprise Heroku for JavaEnterprise Heroku for Java
Enterprise Heroku for Java
Ayumu Aizawa
 
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress RouterMaking Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
VMware Tanzu
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
Kaseya
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
TechWell
 
2019 Fiscal Year Close
2019 Fiscal Year Close 2019 Fiscal Year Close
2019 Fiscal Year Close
~Eric Principe
 
Fusion hcm roles information
Fusion hcm roles informationFusion hcm roles information
Fusion hcm roles informationSantosh Mankala
 
SaaSfocus_Profile_s
SaaSfocus_Profile_sSaaSfocus_Profile_s
SaaSfocus_Profile_sShawn Murray
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
CA Technologies
 
Apache Pulsar Design Choices and use-cases
Apache Pulsar Design Choices and use-casesApache Pulsar Design Choices and use-cases
Apache Pulsar Design Choices and use-cases
souravagrawal35
 
Build and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning ExchangeBuild and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning Exchange
Salesforce Developers
 
How to Containerize WebSphere Application Server Traditional, and Why You Mig...
How to Containerize WebSphere Application Server Traditional, and Why You Mig...How to Containerize WebSphere Application Server Traditional, and Why You Mig...
How to Containerize WebSphere Application Server Traditional, and Why You Mig...
David Currie
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and Tricks
Ryan Flood
 
Brian moore
Brian mooreBrian moore
Brian moore
Zeenat Jahan
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)
Salesforce Partners
 
Lightning Developer Experience, Eclipse IDE Evolved
Lightning Developer Experience, Eclipse IDE EvolvedLightning Developer Experience, Eclipse IDE Evolved
Lightning Developer Experience, Eclipse IDE Evolved
Salesforce Developers
 
Q1 2023 DBX Investor Presentation
Q1 2023 DBX Investor PresentationQ1 2023 DBX Investor Presentation
Q1 2023 DBX Investor Presentation
Dropbox
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
Mighty Guides, Inc.
 
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
Extra Technology
 
Managing entitlements through the product lifecycle
Managing entitlements through the product lifecycleManaging entitlements through the product lifecycle
Managing entitlements through the product lifecycle
team-WIBU
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made Easier
CA Technologies
 

Similar to Security and Backup I: OEM Architecture (20)

Enterprise Heroku for Java
Enterprise Heroku for JavaEnterprise Heroku for Java
Enterprise Heroku for Java
 
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress RouterMaking Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
2019 Fiscal Year Close
2019 Fiscal Year Close 2019 Fiscal Year Close
2019 Fiscal Year Close
 
Fusion hcm roles information
Fusion hcm roles informationFusion hcm roles information
Fusion hcm roles information
 
SaaSfocus_Profile_s
SaaSfocus_Profile_sSaaSfocus_Profile_s
SaaSfocus_Profile_s
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Apache Pulsar Design Choices and use-cases
Apache Pulsar Design Choices and use-casesApache Pulsar Design Choices and use-cases
Apache Pulsar Design Choices and use-cases
 
Build and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning ExchangeBuild and Package Lightning Components for Lightning Exchange
Build and Package Lightning Components for Lightning Exchange
 
How to Containerize WebSphere Application Server Traditional, and Why You Mig...
How to Containerize WebSphere Application Server Traditional, and Why You Mig...How to Containerize WebSphere Application Server Traditional, and Why You Mig...
How to Containerize WebSphere Application Server Traditional, and Why You Mig...
 
Salesforce Security Review Tips and Tricks
Salesforce Security Review Tips and TricksSalesforce Security Review Tips and Tricks
Salesforce Security Review Tips and Tricks
 
Brian moore
Brian mooreBrian moore
Brian moore
 
Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)Platform Encryption for ISVs (February 23, 2016)
Platform Encryption for ISVs (February 23, 2016)
 
Lightning Developer Experience, Eclipse IDE Evolved
Lightning Developer Experience, Eclipse IDE EvolvedLightning Developer Experience, Eclipse IDE Evolved
Lightning Developer Experience, Eclipse IDE Evolved
 
Q1 2023 DBX Investor Presentation
Q1 2023 DBX Investor PresentationQ1 2023 DBX Investor Presentation
Q1 2023 DBX Investor Presentation
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
CA External WAAE Roadmap - UK User Group - CA Workload Automation Technology ...
 
Managing entitlements through the product lifecycle
Managing entitlements through the product lifecycleManaging entitlements through the product lifecycle
Managing entitlements through the product lifecycle
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made Easier
 

More from Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
Kaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
Kaseya
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
Kaseya
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD Suite
Kaseya
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
Kaseya
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Kaseya
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
Kaseya
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Kaseya
 
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya
 
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya
 
Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability
Kaseya
 
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay OffKaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya
 

More from Kaseya (13)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD Suite
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
Kaseya Connect 2013: A step by-step sales process guaranteed to supercharge r...
 
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
Kaseya Connect 2013: Optimizing Your K Server - Best Practices in Kaseya Infr...
 
Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability Kaseya Connect 2013: Scaling Services for Profitability
Kaseya Connect 2013: Scaling Services for Profitability
 
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay OffKaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
Kaseya Connect 2013: Tried and True: Making Your Kaseya Investment Pay Off
 

Recently uploaded

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 

Recently uploaded (20)

Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 

Security and Backup I: OEM Architecture

  • 1. Security and Backup I: OEM Architecture Ben Lavalley Product Manager, Kaseya Copyright ©2014 Kaseya 1
  • 2. The information in this presentation is confidential and proprietary to Kaseya and may not be disclosed or distributed without the prior written permission of Kaseya. This document, and any related presentation, as well as Kaseya's strategy, possible future developments, products, platforms, directions and/or functionality are all subject to change without notice at Kaseya’s sole discretion. The information in this document does not constitute a commitment, contract, promise or legal obligation to deliver any material, code or functionality. This document is provided without warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. This document is for informational purposes only and may not be incorporated into a contract. All forward-looking statements, including those set forth in this presentation, are subject to various assumptions, risks and uncertainties that could cause actual results to differ materially from projections. Readers are cautioned not to place undue reliance on such forward-looking statements, and specifically, not to rely upon such in making purchasing decisions. Copyright ©2014 Kaseya 2
  • 3. OEM Architecture Status  Before, in version 6.3: – Each OEM product was integrated individually with the Kaseya Agent (client-side) and with the VSA (server-side). – Time-consuming maintenance  Now, in version 6.5 and forward: – Implemented a unique and generic driver that manages all OEM products – Integration with a new OEM product follows a simple set of rules Copyright ©2014 Kaseya 3
  • 4. Proven Design  OEM products leveraging this new architecture today: – Backup (Acronis) – Antivirus (Kaspersky) – Antimalware (MalwareBytes) – Endpoint Security (AVG) Copyright ©2014 Kaseya 4
  • 5. Overview  The purpose of the Driver is to run tasks that take the form of an OEM product executable being launched as a process.  Examples of tasks: running a backup, scanning for viruses, deploying software, etc. Copyright ©2014 Kaseya 5
  • 6. How it works  The Driver is an “Agent Extension” and therefore is packaged as a DLL exporting well known functions (SendMsg, Stop, IsDone). It is loaded by a program that is launched by the Kaseya Agent.  Being an Agent Extension, the Driver expects to receive commands via the SendMsg function. The commands must be formatted as a command line when typed into a command shell.  The Driver is completely “data driven”, meaning that it has not been built with the knowledge of any OEM product inside of it.  The Driver loads data from files and that data drive the runtime of the Driver. Copyright ©2014 Kaseya 6
  • 7. Catalogs  First uses of Driver are done internally by Kaseya for our OEMs  “Catalogs” created that detail information about the third party, such as: where it is typically installed, how to run that product tasks, etc.  Support for Driver will be part of TAP program  Three catalogs: – Supported Products catalog – Command catalog – Message catalog  Catalogs are written in JSON. Copyright ©2014 Kaseya 7
  • 8. Summary  Benefits of new architecture: – Generic, same for all OEM & partner products – Simple, easy to maintain – Can be dynamically patched  SDK coming soon -> recruiting new partner candidates to help create the SDK Copyright ©2014 Kaseya 8
  • 9. Copyright ©2014 Kaseya 9 Questions and Answers Thanks for Attending Kaseya Connect #KaseyaConnect Let's Share!