This document summarizes a webinar presented by LANDesk on their end-to-end IT service management software. The software provides capabilities across IT service management disciplines like incident management, problem management, and change management. It also integrates capabilities for systems management, asset management, security management and service management. The software aims to automate IT processes, reduce costs, improve efficiency and help comply with standards. LANDesk is positioned as a unique vendor that can unify and automate IT service management capabilities better than competitors.
Computer security audit is a manual or systematic measurable technical of a system or application. System can include personal computers, servers, mainframes, network routers ,switches. Application can include web server, oracle database or an ERP system employed.
Aaditya Technologies provides a variety of general and specialized IT auditing assistance. Our technology professionals, in locations throughout the world, understand the benefits and risks of information technology. They work with a variety of industries, system platforms and business applications. Whether for specific projects or under a more comprehensive arrangement, Control Solutions can support your internal audit function so that your staff – and your organization’s information systems – are working to their full potential.
Computer security audit is a manual or systematic measurable technical of a system or application. System can include personal computers, servers, mainframes, network routers ,switches. Application can include web server, oracle database or an ERP system employed.
Aaditya Technologies provides a variety of general and specialized IT auditing assistance. Our technology professionals, in locations throughout the world, understand the benefits and risks of information technology. They work with a variety of industries, system platforms and business applications. Whether for specific projects or under a more comprehensive arrangement, Control Solutions can support your internal audit function so that your staff – and your organization’s information systems – are working to their full potential.
How can businesses make the smartest telecom and network choices—choices that are guided as much by the organization’s needs and demands as by cost considerations? Increasingly, companies are opting to partner with managed service providers to harness as many benefits as possible from their telecom and network services. Are they realizing these benefits? View the SlideShare to find out.
Having Trouble Managing All Your Cloud Services? We Know!Flexera
Most businesses have at least 3 or more cloud services, and it’s hard enough to control spend for just one. That’s why Flexera acquired RightScale, the leading multi-cloud management provider. With cloud services making up 20% of most IT budgets, the spend optimization stakes are high. This year’s Rightscale State Of The Cloud report shows that up to 35% of cloud services spend may be wasted.
View these slides to see how RightScale Optima helps you find that 35% and act on it.
Through this presentation Rhea shows you what it sees as the future of business applications. How we build them up and what the advantages are in working with us in regards of the integration of new technological developments.
Zenoss' Adelle Ryman (Director of Sales) and Ramil Reyes (Director of Sales) present: Why Zenoss is Right for You.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Systems, Applications, Products in data processing or SAP was originally introduced in the 1980s as SAP R/2, which was a system that provided users with a soft-real-time business application that could be used with multiple currencies and languages. As Client-servers began to be introduced SAP brought out a server based version of their software called SAP R/3, henceforth referred to as SAP, which was launched in 1992. SAP also developed a graphical user interface, or GUI, to make the system more user friendly and to move away from the mainframe style user interface.
A high-level overview of LogicMonitor; the leading SaaS-based hybrid infrastructure performance monitoring solution on the market, changing the way enterprise organisations monitor dynamic, multi-cloud environments. Giving you hosted monitoring for your entire stack - servers, networks, containers, storage, applications, virtualisation, and cloud - from a single pane of glass. No dedicated servers required!
If you want to talk AIOps, automation, and where our industry is going please hit me up with a message. I want to learn about you guys and what technology means for you!
Optimizing Regulatory Compliance with Big DataCloudera, Inc.
3 Things to Learn:
-There are many challenges in the way financial firms deal with regulatory compliance today
-Some of these challenges are related to data management and can be solved by big data technologies
-Cloudera and its partners Trifacta and Qlik are offering a solution that can accelerate the time to obtain compliance reports by using automated workflows and fast analytics that work on top of Cloudera’s Enterprise Data Hub.
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...Aspire Systems
A NASDAQ listed leading independent clearing brokerage firm, performs securities and futures clearing services, including trade execution and settlement, custody, and technology support . Due to the critical nature of their application, they wanted the IT support to be available all time with 100% compliance as per ITIL standards. Aspire has been involved in performing the mission critical activities like 1) Server Management 2) Network Management 3) Service Desk Support
How to supercharge your SIEM
Is your SIEM struggling? Is your Security Operations Centre under pressure? Does your SIEM standout from the crowd? Will your SIEM meet the IOT challenges?
Salesforce is a mature SaaS application, yet many organizations are still plagued with network and application performance issues due to the unpredictability of the Internet and the complexity of the Salesforce platform. Learn how to baseline Salesforce performance and get to root cause.
Emergence of ITOA: An Evolution in IT Monitoring and ManagementHCL Technologies
IT operations analytics(ITOA) plays key role by providing intelligence that makes business sense out of the real-time data being generated by infrastructure components and applications.
How to Handle the Realities of DevOps Monitoring TodayDevOps.com
Time series data can bring value to organizations in many ways, beyond simply metrics to help them understand how their infrastructure is performing. It also can help illuminate other issues that can have an impact on performance.
Join us for this informative webinar where we discuss the value and benefits of a Purpose-built platform, how to deal with large amounts of data, and the importance of “time to awesome.”
And make sure you are up-to-date with viewing the InfluxData Video Series on Devops.com!
EMA Presentation: Driving Business Value with Continuous Operational Intellig...ExtraHop Networks
In this presentation, EMA Vice President of Research Jim Frey and ExtraHop SVP Erik Giesa explain how IT organizations can derive real-time IT and business insights from their wire data, as well as the unique capabilities included in the fourth-generation ExtraHop platform that make this continuous operational intelligence possible. For more information, visit www.extrahop.com
Who Broke My Cloud? SaaS Monitoring Best PracticesThousandEyes
Covers the visibility challenges of networks and services you don't own in the cloud, how to get that visibility and how to apply cloud-aware Network Intelligence with cloud readiness lifecycle best practices.
How can businesses make the smartest telecom and network choices—choices that are guided as much by the organization’s needs and demands as by cost considerations? Increasingly, companies are opting to partner with managed service providers to harness as many benefits as possible from their telecom and network services. Are they realizing these benefits? View the SlideShare to find out.
Having Trouble Managing All Your Cloud Services? We Know!Flexera
Most businesses have at least 3 or more cloud services, and it’s hard enough to control spend for just one. That’s why Flexera acquired RightScale, the leading multi-cloud management provider. With cloud services making up 20% of most IT budgets, the spend optimization stakes are high. This year’s Rightscale State Of The Cloud report shows that up to 35% of cloud services spend may be wasted.
View these slides to see how RightScale Optima helps you find that 35% and act on it.
Through this presentation Rhea shows you what it sees as the future of business applications. How we build them up and what the advantages are in working with us in regards of the integration of new technological developments.
Zenoss' Adelle Ryman (Director of Sales) and Ramil Reyes (Director of Sales) present: Why Zenoss is Right for You.
Access the full presentation recordings for GalaxZ17 here: http://ow.ly/WyBu30cakk0
Systems, Applications, Products in data processing or SAP was originally introduced in the 1980s as SAP R/2, which was a system that provided users with a soft-real-time business application that could be used with multiple currencies and languages. As Client-servers began to be introduced SAP brought out a server based version of their software called SAP R/3, henceforth referred to as SAP, which was launched in 1992. SAP also developed a graphical user interface, or GUI, to make the system more user friendly and to move away from the mainframe style user interface.
A high-level overview of LogicMonitor; the leading SaaS-based hybrid infrastructure performance monitoring solution on the market, changing the way enterprise organisations monitor dynamic, multi-cloud environments. Giving you hosted monitoring for your entire stack - servers, networks, containers, storage, applications, virtualisation, and cloud - from a single pane of glass. No dedicated servers required!
If you want to talk AIOps, automation, and where our industry is going please hit me up with a message. I want to learn about you guys and what technology means for you!
Optimizing Regulatory Compliance with Big DataCloudera, Inc.
3 Things to Learn:
-There are many challenges in the way financial firms deal with regulatory compliance today
-Some of these challenges are related to data management and can be solved by big data technologies
-Cloudera and its partners Trifacta and Qlik are offering a solution that can accelerate the time to obtain compliance reports by using automated workflows and fast analytics that work on top of Cloudera’s Enterprise Data Hub.
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...Aspire Systems
A NASDAQ listed leading independent clearing brokerage firm, performs securities and futures clearing services, including trade execution and settlement, custody, and technology support . Due to the critical nature of their application, they wanted the IT support to be available all time with 100% compliance as per ITIL standards. Aspire has been involved in performing the mission critical activities like 1) Server Management 2) Network Management 3) Service Desk Support
How to supercharge your SIEM
Is your SIEM struggling? Is your Security Operations Centre under pressure? Does your SIEM standout from the crowd? Will your SIEM meet the IOT challenges?
Salesforce is a mature SaaS application, yet many organizations are still plagued with network and application performance issues due to the unpredictability of the Internet and the complexity of the Salesforce platform. Learn how to baseline Salesforce performance and get to root cause.
Emergence of ITOA: An Evolution in IT Monitoring and ManagementHCL Technologies
IT operations analytics(ITOA) plays key role by providing intelligence that makes business sense out of the real-time data being generated by infrastructure components and applications.
How to Handle the Realities of DevOps Monitoring TodayDevOps.com
Time series data can bring value to organizations in many ways, beyond simply metrics to help them understand how their infrastructure is performing. It also can help illuminate other issues that can have an impact on performance.
Join us for this informative webinar where we discuss the value and benefits of a Purpose-built platform, how to deal with large amounts of data, and the importance of “time to awesome.”
And make sure you are up-to-date with viewing the InfluxData Video Series on Devops.com!
EMA Presentation: Driving Business Value with Continuous Operational Intellig...ExtraHop Networks
In this presentation, EMA Vice President of Research Jim Frey and ExtraHop SVP Erik Giesa explain how IT organizations can derive real-time IT and business insights from their wire data, as well as the unique capabilities included in the fourth-generation ExtraHop platform that make this continuous operational intelligence possible. For more information, visit www.extrahop.com
Who Broke My Cloud? SaaS Monitoring Best PracticesThousandEyes
Covers the visibility challenges of networks and services you don't own in the cloud, how to get that visibility and how to apply cloud-aware Network Intelligence with cloud readiness lifecycle best practices.
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
The presentation provides the following:
- Symantec Corporate Overview
- Solution Portfolio of Symantec
- Symantec Data Loss Prevention - Introduction
- Symantec Data Loss Prevention - Components
- Symantec Data Loss Prevention - Features & Use Cases
- Symantec Data Loss Prevention - System Requirements
- Symantec Data Loss Prevention - Appendix (extra information)
This provides a brief overview of Symantec Data Loss Prevention (DLP). Please note all the information is based prior to May 2016 and the full integration of Blue Coat Systems's set of solutions.
This slide set presents the Managed Security Services offering of Data Consult.
MSS is a cloud-based subscription service that allows you to monitor, analyze and correlate all events happening on your network. It also allows alerts and notifications in case any suspicious activity happens on your network, and allows investigation through its forensic capabilities.
Remote Infrastructure Management Service encompasses the full life cycle of IT services, ranging from consulting and design, integration and customization to 24x7x365 management.
Managed Services: "The choice is yours: a make or buy approach to SAP security and compliance?"
-------------------------------------------------------------------------------------
Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security. However, efforts like these are technically complex, which is why they require so much time and personnel. Decision-makers thus face a fundamental question: Should they "make" or “buy" their way to SAP security and compliance? Our SAST MANAGED SERVICES offer a holistic solution that can assist you in both on-site and remote environments.
--------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Implementing access and security controls across your applicationsDave Reik
SmartERP and SafePass discuss the process of establishing access and security policies within PeopleSoft and Oracle E-Business Suite. This session focuses on the areas of Oracle E-Business Suite and PeopleSoft that should be addressed as you implement continuous controls monitoring. We address how to implement Rules and Policies that cover Finance, Supply Chain and HR for a complete approach to securing all of your critical applications.
Data loss is considered by security experts to be one of the most serious threats that businesses currently face.
Maintaining the confidentiality of personal information and data is an essential factor in operating a successful business. People must be able to trust that their service provider takes the appropriate measures to implement security controls that will ultimately protect their privacy.
However, some of the largest and most reputable organizations have fallen victim to data loss security breaches resulting in significant legal, financial, and reputation loss, including [1]:
The Bank of America: Losing the personal employee information of over one million employees
The United States Government: Losing data related to the military
Heartland Payment Systems: Transferring credit card information and other personal records of over 130 million customers
In 2013, it was estimated that data breaches had resulted in the exploitation of over 800 million personal records [2]. This number is also expected to rise over the next several years given the advanced tools that cybercriminals use to steal information and data.
Interestingly, it is not just cybercriminals who represent a threat as:
64% of data loss is caused by well-meaning insiders.
50% of employees leave with data.
$3.5 million average cost of a security breach.
Considering these extensive data breaches, it is practical for organizations to understand where their critical data is located and understanding current security controls that can stop data loss.
Data Loss Prevention (DLP) solutions locate critical and personal data for organizations and help prevent data loss. By having a deeper understanding of efficient DLP security controls, you will help protect the reputation of your organization.
For more information contact: rkopaee@riskview.ca
https://www.threatview.ca
http://www.riskview.ca
What is Splunk? At the end of this session you’ll have a high-level understanding of the pieces that make up the Splunk Platform, how it works, and how it fits in the landscape of Big Data. You’ll see practical examples that differentiate Splunk while demonstrating how to gain quick time to value.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
4. LANDesk Software Confidential
Examples of Service Desk Requests
Employee onboarding/off-boarding
Access rights
Group changes
Desk moves
Password reset
Hardware requests
Software – free v. purchase
“I want”
vs.
“I need” ?
5. LANDesk Software Confidential
Example 1: Software Request
INCIDENT
I want new software
• Discovery/Inventory
• Power Mgmt
• Remote Control
• SLM
• Mobility
• Software Distribution
• Licensing
• Versioning
• Materials Management
• White List
• Patch
• Settings
• Audit
• Policy
• Malware
SERVICE
DESK
Asset Management
Security ManagementREQUEST
Systems Management
6. LANDesk Software Confidential
Example 2: Access Request (Incident)
I need access
SERVICE
DESK
• Discovery/Inventory
• Power Mgmt
• Remote Control
• SLM
• Mobility
• Software Distribution
Asset Management
Security ManagementREQUEST
INCIDENT
SERVICE
DESK
Systems Management
7. LANDesk Software Confidential
Erasing the Barriers
Systems Management
Asset Management
Security Management
Service ManagementP
P
P
P
P
SERVICE
DESK
REQUEST
INCIDENT
Data Analytics
8. LANDesk Software Confidential
LANDesk Service Desk in Action
I want new software
• Discovery/Inventory
• Power Mgmt
• Remote Control
• SLM
• Mobility
• Software Distribution
• B2B Connectors
• Data Management
• Asset Control
• SAM
• EULA Analytics
• Compliance Reports
• White List
• Patch
• Settings
• Audit
• Policy
• Malware
Data Analytics
Security Management
Systems Management
REQUEST
INCIDENT
P
P
P
P
P
Installing on user’s machine
Service Management
9. LANDesk Software Confidential
LANDesk Service Desk in Action
I need access
• Discovery/Inventory
• Power Mgmt
• Remote Control
• SLM
• Mobility
• Software Distribution
• B2B Connectors
• Data Management
• Asset Control
• SAM
• EULA Analytics
• Compliance Reports
• White List
• Patch
• Settings
• Audit
• Policy
• Malware
Data Analytics
Security Management
Systems Management
Service Management
REQUEST
INCIDENT
P
P
P
P
P
Self-service portal
Zero Call Resolution
12. LANDesk Software Confidential
End-to-End IT Service Management
• Save money
• Reduce risk
• Increase efficiency
• Improve business
operations
P
P
P
P
P
Data Analytics
Security Management
Systems Management
Service Management
13. LANDesk Software Confidential
Magic Quadrant for IT Service Support Management Tools
The LANDesk Difference
Magic Quadrant for Client Management Tools
Magic Quadrant for Endpoint Protection Platforms
– Quadrant presence unmatched !
14. LANDesk Software Confidential
End-to-End IT Service Management = Value
Number of incidents per month
› Request offload 30%
› 30% quicker
Annual or semi-annual software audit
Patch management/software rollouts/true-ups
CSAT/Promoter score
Failed changes
Power management cost savings
SOX/HIPAA/PCI/SAS70 audits/compliance
Employee onboarding/off-boarding
15. LANDesk Software Confidential
The LANDesk Difference
What makes LANDesk truly unique?
(what no other vendor can offer)
ability to unify and automate all those disciplines
a flexible and intelligent process platform, allowing you
cost savings,
increased productivity,
business-level intelligence
true end-to-end IT service management.
16. LANDesk Software Confidential
• LANDesk is uniquely positioned to provide service management across the enterprise
and automate processes like no other vendor
• Bringing together Service Management, Process Automation, Asset Management,
Desktop Management, and Datacenter Monitoring, LANDesk provides a unique and
leading solution
• LANDesk is the only company that provides solutions in three of the key Gartner
Magic Quadrants surrounding end-to-end IT services
End-to-End IT Service Management
Magic Quadrant for IT Service Support Management ToolsMagic Quadrant for Client Management ToolsMagic Quadrant for Endpoint Protection Platforms
A “typical” business IT infrastructure is silo-ed and there is limited automation for seamless collaboration between departments. Even the most basic IT service requests (or problems) can involve dozens of complex interactions among different departments, people, and disciplines—from frontline service desks and change management engines to backend asset, lifecycle, infrastructure, and security management systems. To complicate matters even more, these different areas are nearly always separated by technological and organizational barriers, and crossing those barriers takes time, costs money, and limits efficiency.
A “typical” business IT infrastructure is silo-ed and there is limited automation for seamless collaboration between departments. Even the most basic IT service requests (or problems) can involve dozens of complex interactions among different departments, people, and disciplines—from frontline service desks and change management engines to backend asset, lifecycle, infrastructure, and security management systems. To complicate matters even more, these different areas are nearly always separated by technological and organizational barriers, and crossing those barriers takes time, costs money, and limits efficiency.
When it comes to IT Service Management, a tremendous variety of requests come in to the help desk. Some are vital needs and many are non-urgent “wants.”According to the Help Desk Institute, 30-40% of Service Desk calls are non-critical “I wants.” You can offload those Service Desk “I wants” by building an automated Self-Service Catalog. Estimate $35 per call, and if you have 10,000 calls per month, 30% of those resolved through self-service will save in excess of $100,000.
Here is an example of a Service Desk call at a “typical” company:An end user calls the help desk and asks for an updated version of Adobe Acrobat Professional. The Helpdesk employee must contact the desktop management team, who would have to first call the employee’s manager for budget approval. They would then have to purchase the software. Finally, the desktop team would either contact the employee to self-install via a link, or push the install from IT.Typically the company’s Asset Manager willmanually inventory that Acrobat Pro purchase in a spreadsheet. That record usually includes the licensing info, the version, what machine it’s loaded on, etc. Then when new software versions become available, the desktop team either automates updates or physically goes to the employee’s desk again. Sometimes they need to check with the asset manager before doing so.
LANDesk can erase these types of gaps and barriers between different organizational and IT disciplines to deliver a more unified, automated, and comprehensive approach to IT service management. LANDesk has developed an advanced intelligent process engine, the Federated CMDB, that brings all these different areas together and enables them to interact with each other in important new ways. (note: in this scenario, “asset management” becomes LANDesk Data Analytics, a far more powerful way to manage hardware and software assets)
So here is an example of the Federated CMDB in action: The employee submits a helpdesk ticket, requesting Adobe Acrobat Professional. The process engine checks inventory and then makes a request of the manager. It tracks the approval process. Then the CMDB picks it up, and Systems Management deploys, inventories, and discovers the software.Data Analytics tracks the license from purchase through to end of life, and Security Management makes sure it is automatically patched.Service Desk keeps track of the overall service to the end user – all of which is coordinated by the CMDB.
In addition to making service requests more efficient, this kind of cross-discipline automation also lowers the cost and effort required to resolve incidents. Access Requests are a common and obvious example. With LANDesk, users can initiate access requests through the self-service portal, which automatically triggers appropriate events in various IT and security management systems to achieve a low-cost, zero-call resolution. Zero-call resolution moves this from $30 per call to $5 per call.Also prevents acceleration to level 2 or 3, where costs go to $75-100 per incident.For more complex problems, service desk technicians can tap directly into various IT systems tools and resources to diagnose and resolve problems, by using remote control, inventory, patch management, and more. These types of interactions are managed and automated through the LANDesk process automation engine, will lower overall incident response times by around one-third while increasing first call resolution statistics. This will ultimately free your service desk and IT staff to focus their attention on more serious, strategic, and business-critical issues.
(info here on dashboards)
This unified, cross-discipline approach to IT service management translates into obvious opportunities for saving money, lowering risks, increasing efficiency, and improving business operations. Using an intelligent process engine to integrate front-end service desk capabilities with back-end asset and client endpoint management, infrastructure management, and security and compliance management systems makes it possible to measure and analyze the total impact of changes and incidents on your entire organization. It also provides an easy way to document the complete end-to-end processes behind every request, incident and change, which enhances your regulatory and compliance programs.
The thing that makes LANDesk truly unique—the thing no other vendor can offer—is the ability to unify and automate all those disciplines through a flexible and intelligent process platform, allowing you to finally achieve the cost savings, increased productivity, and business-level intelligence that come from true end-to-end IT service management.
Where you get ROI from the End-to-End IT Service Management solution…
The thing that makes LANDesk truly unique—the thing no other vendor can offer—is the ability to unify and automate all those disciplines through a flexible and intelligent process platform, allowing you to finally achieve the cost savings, increased productivity, and business-level intelligence that come from true end-to-end IT service management.
And finally, LANDesk is the only company that provides solutions in three of the key Gartner Magic quadrants surrounding end-to-end IT services:IT Service DeskPC Lifecycle Configuration ManagementEndpoint Protection