IBM Endpoint Manager v9.0 provides enhanced security, expanded platform support, improved software distribution capabilities, and expanded mobile device management. Key enhancements include new encryption and internet security options, support for additional operating systems and agents, more robust patching, imaging and remote control functions, and consolidated management for Android, iOS, and other mobile devices. The release further strengthens capabilities for software usage analysis, security and compliance management, and server automation.
IBM Endpoint Manager for Server Automation (Overview)Kimber Spradlin
IBM® Endpoint Manager for Server Automation enables users to perform advanced automation tasks across servers, including task sequencing—without the need for programming skills. This product offers a rich set of prebuilt automation scripts and enables users to create and re-use their own automation flows.
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
Save $20-$50 per computer per year by automatically putting devices in lower-power states when they are unused. Much more granular policy setting, "Green" reports, savings models, client-side dashboard, coverage for PCs and Macs, and continuous enforcement set this solution apart from relying on the built-in power management settings.
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
Complete visibility and management over all endpoints - physical or virtual, on- or off-network across Windows, Max, Unix, and Linux servers, desktops, laptops, and specialty devices. Includes network discovery, deep hardware and software inventory of managed devices, software distribution and patch management, OS deployment and bare-metal provisioning, and remote control.
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
Respond to license audits in minutes, uncover unused software that can be cancelled or redeployed to lower expenses by 35% or more with this solution from IBM. Covers Windows, Linux, and Unix applications with a library of over 100,000 software titles.
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
Manage all devices - smartphones, tablets, laptops, desktops, and servers - from a single console. IBM Endpoint Manager also integrates Enterproid Divide secure container and NitroDesk TouchDown secure email technologies for separation of organizational content on BYOD and contractor devices.
IBM Endpoint Manager for Server Automation (Overview)Kimber Spradlin
IBM® Endpoint Manager for Server Automation enables users to perform advanced automation tasks across servers, including task sequencing—without the need for programming skills. This product offers a rich set of prebuilt automation scripts and enables users to create and re-use their own automation flows.
IBM Endpoint Manger for Power Management (Overview)Kimber Spradlin
Save $20-$50 per computer per year by automatically putting devices in lower-power states when they are unused. Much more granular policy setting, "Green" reports, savings models, client-side dashboard, coverage for PCs and Macs, and continuous enforcement set this solution apart from relying on the built-in power management settings.
IBM Endpoint Manager for Lifecycle Management (Overview)Kimber Spradlin
Complete visibility and management over all endpoints - physical or virtual, on- or off-network across Windows, Max, Unix, and Linux servers, desktops, laptops, and specialty devices. Includes network discovery, deep hardware and software inventory of managed devices, software distribution and patch management, OS deployment and bare-metal provisioning, and remote control.
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
Respond to license audits in minutes, uncover unused software that can be cancelled or redeployed to lower expenses by 35% or more with this solution from IBM. Covers Windows, Linux, and Unix applications with a library of over 100,000 software titles.
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
Manage all devices - smartphones, tablets, laptops, desktops, and servers - from a single console. IBM Endpoint Manager also integrates Enterproid Divide secure container and NitroDesk TouchDown secure email technologies for separation of organizational content on BYOD and contractor devices.
The bits bytes and business benefits of securing your mq environment and mess...Leif Davidsen
Understand why all aspects of security are important when you are connecting systems and applications together using MQ - and the costs of data breaches to all types of business
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
On April 8 Syncsort announced Assure Security, a new product that brings together Syncsort’s best-in-class IBM i security capabilities. Assure Security enables organizations like yours to comply with cybersecurity regulations and strengthen IBM i security through features that assess security vulnerabilities, control access to systems and data, enforce data privacy, and monitor for security incidents and compliance deviations.
View this webcast on-demand to learn all about Assure Security, including:
• How Syncsort’s security brands have come together in Assure Security
• How Assure Security automates security best practices and satisfies regulatory requirements
• How Syncsort can help you control access to IBM i systems and prevent data breaches
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations.
Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT by:
1. Enabling your end users by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices.
2. Helping protect your data by protecting corporate information and managing risk.
3. Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Windows Azure.
Let’s discuss each of these areas in more detail.
RES Software dynamic desktop solutions simplify desktops into centrally managed, secure, personalized, context-aware and less complex desktops for your users.
Faster logins and access to applications make a difference in EHR adoption.
The bits bytes and business benefits of securing your mq environment and mess...Leif Davidsen
Understand why all aspects of security are important when you are connecting systems and applications together using MQ - and the costs of data breaches to all types of business
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
On April 8 Syncsort announced Assure Security, a new product that brings together Syncsort’s best-in-class IBM i security capabilities. Assure Security enables organizations like yours to comply with cybersecurity regulations and strengthen IBM i security through features that assess security vulnerabilities, control access to systems and data, enforce data privacy, and monitor for security incidents and compliance deviations.
View this webcast on-demand to learn all about Assure Security, including:
• How Syncsort’s security brands have come together in Assure Security
• How Assure Security automates security best practices and satisfies regulatory requirements
• How Syncsort can help you control access to IBM i systems and prevent data breaches
System Center 2012 R2 Configuration Manager (SCCM) with Windows IntuneAmit Gatenyo
Microsoft has a history of providing rich IT-infrastructure solutions to help manage every aspect of enterprise operations. Microsoft’s people-centric solution consists of products and technologies that can help IT departments handle the influx of consumer-oriented technology and the work style expectations of users, thereby helping increase productivity and satisfaction for the people within their organizations.
Microsoft’s people-centric IT vision helps organizations enable and embrace the consumerization of IT by:
1. Enabling your end users by allowing users to work on the device(s) of their choice and providing consistent access to corporate resources from those devices.
2. Helping protect your data by protecting corporate information and managing risk.
3. Unifying your environment by delivering comprehensive application and device management from both your existing on-premises infrastructure, including System Center Configuration Manager, Windows Server, and Active Directory, as well as cloud-based services, including Windows Intune and Windows Azure.
Let’s discuss each of these areas in more detail.
RES Software dynamic desktop solutions simplify desktops into centrally managed, secure, personalized, context-aware and less complex desktops for your users.
Faster logins and access to applications make a difference in EHR adoption.
Helm summit 2019_handling large number of charts_sept 10Shikha Srivastava
Now that you have an application running in Kubernetes, what will your next steps be? Can you deploy this application to any cloud? If someone else wishes to install your helm chart would you have all necessary resources to deploy it successfully? Do you have a certification process to ensure your helm chart is enterprise ready? Creating a helm chart to deploy your application is just the first step, but now you need a process to ensure that the helm chart follows guidelines established by your enterprise and future versions of the chart are created efficiently as part of your CI/CD pipeline. In this presentation, you will learn about effective ways to create, organize and maintain enterprise grade helm charts. We will also discuss how our CI/CD pipeline is implemented using custom linter, verification test cases to make sure only certified charts are promoted into production.
How Microsoft Technologies And Windows Vista Improve SupportingMicrosoft TechNet
Windows Vista includes many advances that help IT organizations lock down the desktop environment and prevent user-generated configuration conflicts. We will explore how to take advantage of the advanced capabilities in Windows Vista, Windows Server 2008, Microsoft Desktop Optimization Pack, Microsoft Deployment Toolkit (MDT) 2008, and System Center application suit to reduce disruption, minimize help desk calls, and ensure maximum uptime for desktop users. In addition, learn how remote-assistance capability in Windows Vista can enable troubleshooting remotely, making problem resolution much more efficient.
"Why do hand-picked cherries provide no guarantee for a tasty pie?" co-presented with Sergio Pellizzari at IIR's "IMS Global Congress" in Vienna, November 2009.
Our own UEM solutions engineer Bruce Johnson is teaming up with Microsoft MVP Nathan O’Bryan to help you strengthen your unified endpoint management strategy.
OpSource Cloud Hosting is the first Cloud solution to meet enterprise production application requirements for security, control, performance and ease of integration. Each OpSource Cloud user automatically receives a Virtual Private Cloud which allows them to set their preferred amount of public Internet connectivity.
IT Automation With CFEngine - Business Value and Basic ConceptsCFEngine
Automation has been central to infrastructure management and more recently to the continuous delivery of applications, DevOps. What has changed is the scale at which these are conducted. CFEngine delivers IT automation at Web-Scale. Scale in this context includes speed and agility along with size. So, smaller organizations can also benefit from IT automation for their infrastructure and continuous delivery needs.
In this webinar we discussed the business value of Web-Scale IT Automation as well as CFEngine's capabilities through a demonstration of its key features. Based on sound principles of Promise Theory CFEngine is a highly scalable, very secure, model-based approach to infrastructure management and continuous delivery.
2. IBM Endpoint Manager v9.0 Platform
Enhancements
• New security configuration options for managing internet
connected computers and mobile devices as well as native
encryption capabilities to enable even simpler setup of
secure data transfers and password management policies.
• Data is encrypted per targeted endpoint and is stored in encrypted
form in the database, ensuring only the intended party is able to
decrypt the information.
• Expanded platform coverage option to deploy the
Enterprise Manager server on Red Hat Enterprise Linux
and DB2 in addition to existing support for Microsoft
Windows and SQL Server configurations.
• Newly supported agent platforms in V9.0 include Solaris
11, Debian 6, and Ubuntu 12.04 in addition to previously
released support for Mac OS X 10.8, Windows 8, Windows
RT, and Windows Server 2012.
3. Lifecycle
Management
• Includes enhanced software distribution capabilities
• Allows end users to self-provision software by selecting from a list of
administrator-approved applications
• Maintains and updates applications lists quickly and easily for self-
provisioning and for enforcing required application policies Dramatically
• Retrieves software package block error codes automatically for reduced patch
enhanced troubleshooting and reporting capabilities
cycles and
• Migrates orphaned software packages
increased first-
• Deeply integrated bare metal and operating system re-imaging support pass success
• Provision Windows operating systems from bare metal through the rates
Endpoint Manager infrastructure
• Enables administrators to seamlessly trigger deployment of
applications and configuration policies post imaging to complete the
provisioning process and provides full customization capabilities for Multi-platform
desktop personalization support (Unix,
• Has expanded remote control capabilities Linux,
• Supports internet brokered connections for complete remote control Windows, Mac
functionality regardless of connection type OS X)
4. Patch
Management
Supports
hundreds of
• Enhanced AIX patching capabilities give administrators the option of
installing updates from Network File System (NFS) shares or from the local
thousands of
file system endpoints
• Expanded Solaris patch content now includes support for Critical Patch
Updates (CPUs) in addition to existing support for patch clusters and Reduce security
individual security, recommended, and configuration updates and compliance
• Addition of patch support for CentOS 6 operating systems risk by slashing
• Addition of native dependency resolution for Ubuntu utilizing the apt-get remediation
tool cycles
• Enhanced offline patch management for virtual machines, complete with
network quarantine and schedule power on and power off capabilities
Gain greater
• Enhanced audit capabilities for ESXi hypervisor host patch management visibility into
• Delivers host-guest relationship reporting for virtual environments patch
• Adds patch support for Windows non-security updates, specifically for critical compliance
updates and Service Packs.
Patch online
and offline
virtual
machines
5. Software Usage Analysis
• IBM Tivoli Asset Discovery for distributed is now supported as part of IBM
Endpoint Manager for Software Use Analysis. If you purchased IBM Endpoint
Manager for Software Use Analysis licenses and are current with Software
Subscription and Support, you will be entitled to IBM Tivoli Asset Discovery for
distributed for use as part of IBM Endpoint Manager for Software Use Analysis .
• IBM Tivoli Asset Discovery for distributed helps you maintain an up-to-date
inventory of installed distributed software, hardware, and software use data and is
the recognized IBM product, together with the IBM License Metric Tool, for
providing audit reports for products that are licensed under the IBM Passport
Advantage Virtualization Capacity (sub-capacity) licensing.
• Adds support for the Common Inventory Tool component to identify and
discover software products based on signatures across operating systems . 5000+
• Adds the Software Knowledge Base Tool component for managing complex Software publishers
software signature definitions and differentiating between software
identification and software usage signatures across operating systems for IBM,
non-IBM, and custom applications.
• The Software Use Analysis server now uses the Tivoli Endpoint Manager
Analytics component which now provides: 105,000+
• Advanced searching and filtering criteria Application signatures
• Table view aggregation of collected software scans and raw usage data for easy out of the box
navigation and filtering
• Data export into common separated value (CSV) and portable document format
(PDF) format files on all views and reports for improved consumability.
6. Security and Compliance
Continuous
enforcement of
security
• Expanded coverage for Center for Internet Security (CIS) security
benchmarks for Windows and UNIX operating systems
policies
• Enhanced reporting functions including save to PDF and scheduled report
options Host-based
• Simplifies management of updates to customized security configuration vulnerability
management policies assessment
with
a 99.9%
accuracy rate
Define and
assess client
compliance to
security
configuration
baselines
SCAP certified
for FDCC
7. Mobile Device Management
• Self-service portal for end-user management of mobile devices
• Simplifies setup through seamless integration with Active Directory
and Lightweight Directory Access Protocol (AD/LDAP)
• Enables end-users to issue wipe, lock, and reset password commands
from the portal
• Customized enrollment options
• Supports authenticated enrollment through AD/LDAP integration
• Adds a custom end-user license agreement or enables customization
of the enrollment process through organization specific question sets
• Supports bulk distribution of certificates Apple iOS
• Enterprise Application Store
Google Android
• Quickly and easily deploy applications to mobile devices
• Directly import applications into the Enterprise Application Store from Nokia Symbian
Worklight Application Center Windows Phone 8
and Windows RT,
BlackBerry
8. Mobile Device Management
• Consolidated management for Android, iOS, Windows Phone 8, Windows
RT, BlackBerry, and Symbian devices
• Deploys advanced iOS profile options including Simple Certificate
Enrollment Protocol (SCEP), Lightweight Directory Access Protocol
(LDAP), Credentials, Access Point Name (APN), web clips and
enterprise Wi-Fi profiles
• Enrollement Protocol (SCEP), Lightweight Directory Access Protocol
Address bring
(LDAP), Credentials, Access Point Name (APN), web clips and your own device
enterprise Wi-Fi profiles (BYOD)
• Extends key management functionality for Android devices through
support of NitroDesk touchdown and Samsung's custom enterprise Manage enterprise
APIs
and personal data
• Enables administrators to locate lost devices through location separately
services for iOS
• Security compliance
Leverage a single
• Detects unlocked or jailbroken device infrastructure to
• Ensures mobile security compliance through standard checks for manage all
Center for Internet Security (CIS) benchmarks
enterprise devices
9. Core Protection
• Expanded platform coverage to include support for Windows 8 and Windows 2012
• Adds optimized Virtual Desktop Infrastructure Smart Scan to ensure proper resource
utilization for virtualized environments
• Added integrated access to a Threat Encyclopedia to learn more about detected
threats
• Added data protection add-on module to prevent sensitive data loss
Single Console
Cloud-based
Protection
Anti-virus
Anti-malware
Personal
Firewall
Data Protection
10. Server Automation
• Enables you to automate complex data center tasks through advanced task
sequencing capabilities
• Helps provision and manage virtual servers
• Supports creation of new virtual machines from templates Manage the
• Provides the ability to create and manage instances and profiles for WebSphere lifecycle of data
Application Server and IBM DB2 center servers
Thousands of
automation
scripts
Patching for
multi-tier server
applications
Supports both
physical and
virtual
Editor's Notes
Patch Management Product Benefits Reduction in patch and update times from weeks and days to hours and minutes Increase first-pass success rates from 60-75% to 95-99+% System administrator workload reductions of 75% or more Assured compliance with internal and external standards/requirements Product Features Patch capabilities for multiple platforms: Windows, Linux, UNIX and Mac OS X 3 rd Party Windows applications (Adobe, Java Run Time, Mozilla, QuickTime, Skype etc.) Automated self-assessment, no centralised or remote scanning required Real-time reporting on patch deployment: When deployed, who deployed them, and to which endpoints Ability for custom patches for in-house or other vendor patches Lightweight agent (<2% of CPU on average)
IBM Endpoint Manager for Mobile devices brochure - http://public.dhe.ibm.com/common/ssi/ecm/en/tid14091usen/TID14091USEN.PDF Gartner Magic Quadrant for Mobile Device Management Software - http://www.gartner.com/technology/reprints.do?id=1-1AKUTXX&ct=120518&st=sg
IBM Endpoint Manager for Mobile devices brochure - http://public.dhe.ibm.com/common/ssi/ecm/en/tid14091usen/TID14091USEN.PDF Gartner Magic Quadrant for Mobile Device Management Software - http://www.gartner.com/technology/reprints.do?id=1-1AKUTXX&ct=120518&st=sg
Adds additional protection by extending and enhancing platform support for Windows 8, Windows Server 2012 & Server Core 2012 support, full support for IE 10, real-time toast notifications in “Windows Store Applications” and the Start Screen, and data loss prevention support for “Windows Store Applications” Faster and more automated detection execution through improved performance of MSI installers, automatic full disk scan of storage devices on insertion, and VDI performance enhancement for updates Simple and quick access to enhanced threat information through integrated access to the Trend Micro Threat Encyclopedia from the CPM Logs and the Anti-Thread Toolkit to quickly identify, analyze, and fix a wide range of threats including viruses, worms, Trojans, and spyware.