SlideShare a Scribd company logo
LANDesk Software Confidential
Don Moss – Central Region Systems Engineer
End-to-End IT Service Management
Welcome To Our Webinar
LANDesk Software Confidential
The LANDesk ITSM Features
 Pink Verified on…
ALL 15 ITIL Disciplines
 Workflow Automation
 Self Service
 Service Catalog
 Incident Management
 Problem Management
 Change Management
 Configuration Management
 Knowledge Management
 Service Level Management
 Password Management
 Event Management
 Executive Dashboarding
Service Management Asset Management
 Discovery
 State Management
 Software License Detection
 Workflow Automation
 Vendor Integration
 Warranty Management
 Contract Management
 Request Management
 Barcoding / RFID
 Web Console
 SNMP Device Management
Printers, Switches, Etc…
 Executive Dashboarding
LANDesk Software Confidential
Typical Business IT Infrastructure
Systems Management
Asset Management
Security Management
Service Management
LANDesk Software Confidential
Examples of Service Desk Requests
 Employee onboarding/off-boarding
 Access rights
 Group changes
 Desk moves
 Password reset
 Hardware requests
 Software – free v. purchase
“I want”
vs.
“I need” ?
LANDesk Software Confidential
Example 1: Software Request
INCIDENT
I want new software
• Discovery/Inventory
• Power Mgmt
• Remote Control
• SLM
• Mobility
• Software Distribution
• Licensing
• Versioning
• Materials Management
• White List
• Patch
• Settings
• Audit
• Policy
• Malware
SERVICE
DESK
Asset Management
Security ManagementREQUEST
Systems Management
LANDesk Software Confidential
Example 2: Access Request (Incident)
I need access
SERVICE
DESK
• Discovery/Inventory
• Power Mgmt
• Remote Control
• SLM
• Mobility
• Software Distribution
Asset Management
Security ManagementREQUEST
INCIDENT
SERVICE
DESK
Systems Management
LANDesk Software Confidential
Erasing the Barriers
Systems Management
Asset Management
Security Management
Service ManagementP
P
P
P
P
SERVICE
DESK
REQUEST
INCIDENT
Data Analytics
LANDesk Software Confidential
LANDesk Service Desk in Action
I want new software
• Discovery/Inventory
• Power Mgmt
• Remote Control
• SLM
• Mobility
• Software Distribution
• B2B Connectors
• Data Management
• Asset Control
• SAM
• EULA Analytics
• Compliance Reports
• White List
• Patch
• Settings
• Audit
• Policy
• Malware
Data Analytics
Security Management
Systems Management
REQUEST
INCIDENT
P
P
P
P
P
Installing on user’s machine
Service Management
LANDesk Software Confidential
LANDesk Service Desk in Action
I need access
• Discovery/Inventory
• Power Mgmt
• Remote Control
• SLM
• Mobility
• Software Distribution
• B2B Connectors
• Data Management
• Asset Control
• SAM
• EULA Analytics
• Compliance Reports
• White List
• Patch
• Settings
• Audit
• Policy
• Malware
Data Analytics
Security Management
Systems Management
Service Management
REQUEST
INCIDENT
P
P
P
P
P
Self-service portal
Zero Call Resolution
LANDesk Software Confidential
Zero Call Resolution Customers
LANDesk Software Confidential
P
P
P
P
P
Dashboards
DASHBOARDS
SLA / KPI
Scorecard
Event
Management
Impact
Analysis
User Notification/
Surveys
Data Analytics
Security Management
Systems Management
Service Management
LANDesk Software Confidential
End-to-End IT Service Management
• Save money
• Reduce risk
• Increase efficiency
• Improve business
operations
P
P
P
P
P
Data Analytics
Security Management
Systems Management
Service Management
LANDesk Software Confidential
Magic Quadrant for IT Service Support Management Tools
The LANDesk Difference
Magic Quadrant for Client Management Tools
Magic Quadrant for Endpoint Protection Platforms
– Quadrant presence unmatched !
LANDesk Software Confidential
End-to-End IT Service Management = Value
 Number of incidents per month
› Request offload 30%
› 30% quicker
 Annual or semi-annual software audit
 Patch management/software rollouts/true-ups
 CSAT/Promoter score
 Failed changes
 Power management cost savings
 SOX/HIPAA/PCI/SAS70 audits/compliance
 Employee onboarding/off-boarding
LANDesk Software Confidential
The LANDesk Difference
What makes LANDesk truly unique?
(what no other vendor can offer)
 ability to unify and automate all those disciplines
 a flexible and intelligent process platform, allowing you
 cost savings,
 increased productivity,
 business-level intelligence
 true end-to-end IT service management.
LANDesk Software Confidential
• LANDesk is uniquely positioned to provide service management across the enterprise
and automate processes like no other vendor
• Bringing together Service Management, Process Automation, Asset Management,
Desktop Management, and Datacenter Monitoring, LANDesk provides a unique and
leading solution
• LANDesk is the only company that provides solutions in three of the key Gartner
Magic Quadrants surrounding end-to-end IT services
End-to-End IT Service Management
Magic Quadrant for IT Service Support Management ToolsMagic Quadrant for Client Management ToolsMagic Quadrant for Endpoint Protection Platforms
LANDesk Software Confidential
Get IN Touch!
Phone:
714-408-4700
www:
www.irontouchms.com
SocialMedia
CONTACT
in
18
Thank You!
The information herein is the confidential information and/or proprietary property of LANDesk Software, Inc. and its affiliates (referred to collectively as “LANDesk”), and may not be
disclosed or copied without prior written consent of LANDesk.
To the maximum extent permitted under applicable law, LANDesk assumes no liability whatsoever, and disclaims any express or implied warranty, relating to the sale and/or use of
LANDesk products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property
right, without limiting the rights under copyright.
LANDesk retains the right to make changes to the information herein or related product specifications and descriptions, at any time, without notice. LANDesk makes no warranty for
the use of the information herein and assumes no responsibility for any errors that can appear nor does it make a commitment to update the information contained herein. For the
most current product information, please visit landesk.com or wavelink.com.
Copyright © 2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks of LANDesk Software, Inc. and its
affiliates in the United States and/or other countries. Other brands and names may be claimed as the property of others.

More Related Content

What's hot

Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Business Cable Collaboration Group
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
Flexera
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services PresentationEduardo Garcia
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
SteveAtHPE
 
Rhea corporate presentation v2
Rhea corporate presentation v2Rhea corporate presentation v2
Rhea corporate presentation v2
Mark Adam
 
Why Zenoss is Right for You
Why Zenoss is Right for YouWhy Zenoss is Right for You
Why Zenoss is Right for You
Zenoss
 
Isms5
Isms5Isms5
Isms5
aaditya
 
Technology Assesment
Technology AssesmentTechnology Assesment
Technology AssesmentDavid Duncan
 
Saragh erp
Saragh erpSaragh erp
Saragh erp
Pramod Kumar M
 
LogicMonitor: An Overview
LogicMonitor: An Overview LogicMonitor: An Overview
LogicMonitor: An Overview
James McCabe
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big Data
Cloudera, Inc.
 
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire Systems
 
SIEM game changer
SIEM game changerSIEM game changer
SIEM game changer
Security Dialog
 
Salesforce Monitoring Best Practices
Salesforce Monitoring Best PracticesSalesforce Monitoring Best Practices
Salesforce Monitoring Best Practices
Angelique Medina
 
Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
HCL Technologies
 
How to Handle the Realities of DevOps Monitoring Today
How to Handle the Realities of DevOps Monitoring TodayHow to Handle the Realities of DevOps Monitoring Today
How to Handle the Realities of DevOps Monitoring Today
DevOps.com
 
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
ExtraHop Networks
 
Who Broke My Cloud? SaaS Monitoring Best Practices
Who Broke My Cloud? SaaS Monitoring Best PracticesWho Broke My Cloud? SaaS Monitoring Best Practices
Who Broke My Cloud? SaaS Monitoring Best Practices
ThousandEyes
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseSplunk
 

What's hot (20)

Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
Making Smart Telecom & Network Choices: 8 Reasons Business Customers Partner ...
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Rhea corporate presentation v2
Rhea corporate presentation v2Rhea corporate presentation v2
Rhea corporate presentation v2
 
Why Zenoss is Right for You
Why Zenoss is Right for YouWhy Zenoss is Right for You
Why Zenoss is Right for You
 
Isms5
Isms5Isms5
Isms5
 
Technology Assesment
Technology AssesmentTechnology Assesment
Technology Assesment
 
Saragh erp
Saragh erpSaragh erp
Saragh erp
 
8MANOverview
8MANOverview8MANOverview
8MANOverview
 
LogicMonitor: An Overview
LogicMonitor: An Overview LogicMonitor: An Overview
LogicMonitor: An Overview
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big Data
 
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
 
SIEM game changer
SIEM game changerSIEM game changer
SIEM game changer
 
Salesforce Monitoring Best Practices
Salesforce Monitoring Best PracticesSalesforce Monitoring Best Practices
Salesforce Monitoring Best Practices
 
Emergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and ManagementEmergence of ITOA: An Evolution in IT Monitoring and Management
Emergence of ITOA: An Evolution in IT Monitoring and Management
 
How to Handle the Realities of DevOps Monitoring Today
How to Handle the Realities of DevOps Monitoring TodayHow to Handle the Realities of DevOps Monitoring Today
How to Handle the Realities of DevOps Monitoring Today
 
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...EMA Presentation: Driving Business Value with Continuous Operational Intellig...
EMA Presentation: Driving Business Value with Continuous Operational Intellig...
 
Who Broke My Cloud? SaaS Monitoring Best Practices
Who Broke My Cloud? SaaS Monitoring Best PracticesWho Broke My Cloud? SaaS Monitoring Best Practices
Who Broke My Cloud? SaaS Monitoring Best Practices
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 

Similar to LANDesk End to End Service Management

Reduce the Cost of Your Software Licenses Across Your Business
Reduce the Cost of Your Software Licenses Across Your BusinessReduce the Cost of Your Software Licenses Across Your Business
Reduce the Cost of Your Software Licenses Across Your Business
Lead Beyond Consultancy
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Georg Knon
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
Georg Knon
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
Jad Bejjani
 
Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee
 
How Remote infrastructure Management works
How Remote infrastructure Management worksHow Remote infrastructure Management works
How Remote infrastructure Management works
Jayashree Skylark
 
Splunk company overview april. 2015
Splunk company overview   april. 2015Splunk company overview   april. 2015
Splunk company overview april. 2015
Timur Bagirov
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
Splunk
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
akquinet enterprise solutions GmbH
 
SplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT Operations
Splunk
 
Implementing access and security controls across your applications
Implementing access and security controls across your applicationsImplementing access and security controls across your applications
Implementing access and security controls across your applications
Dave Reik
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
Delivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT OperationsDelivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT Operations
Gabrielle Knowles
 
SplunkLive Wellington 2015 - Operational Intelligence
SplunkLive Wellington 2015 - Operational IntelligenceSplunkLive Wellington 2015 - Operational Intelligence
SplunkLive Wellington 2015 - Operational Intelligence
Splunk
 
SplunkLive Auckland - Operational Intelligence
SplunkLive Auckland - Operational IntelligenceSplunkLive Auckland - Operational Intelligence
SplunkLive Auckland - Operational Intelligence
Splunk
 

Similar to LANDesk End to End Service Management (20)

Reduce the Cost of Your Software Licenses Across Your Business
Reduce the Cost of Your Software Licenses Across Your BusinessReduce the Cost of Your Software Licenses Across Your Business
Reduce the Cost of Your Software Licenses Across Your Business
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
 
Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24Chanchal Chatterjee PARTNERS 2017 Oct24
Chanchal Chatterjee PARTNERS 2017 Oct24
 
How Remote infrastructure Management works
How Remote infrastructure Management worksHow Remote infrastructure Management works
How Remote infrastructure Management works
 
Splunk company overview april. 2015
Splunk company overview   april. 2015Splunk company overview   april. 2015
Splunk company overview april. 2015
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
HPE_Software_Portfolio_VKS2016
HPE_Software_Portfolio_VKS2016HPE_Software_Portfolio_VKS2016
HPE_Software_Portfolio_VKS2016
 
SplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT OperationsSplunkLive! - Splunk for IT Operations
SplunkLive! - Splunk for IT Operations
 
Implementing access and security controls across your applications
Implementing access and security controls across your applicationsImplementing access and security controls across your applications
Implementing access and security controls across your applications
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Delivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT OperationsDelivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT Operations
 
SplunkLive Wellington 2015 - Operational Intelligence
SplunkLive Wellington 2015 - Operational IntelligenceSplunkLive Wellington 2015 - Operational Intelligence
SplunkLive Wellington 2015 - Operational Intelligence
 
SplunkLive Auckland - Operational Intelligence
SplunkLive Auckland - Operational IntelligenceSplunkLive Auckland - Operational Intelligence
SplunkLive Auckland - Operational Intelligence
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

LANDesk End to End Service Management

  • 1. LANDesk Software Confidential Don Moss – Central Region Systems Engineer End-to-End IT Service Management Welcome To Our Webinar
  • 2. LANDesk Software Confidential The LANDesk ITSM Features  Pink Verified on… ALL 15 ITIL Disciplines  Workflow Automation  Self Service  Service Catalog  Incident Management  Problem Management  Change Management  Configuration Management  Knowledge Management  Service Level Management  Password Management  Event Management  Executive Dashboarding Service Management Asset Management  Discovery  State Management  Software License Detection  Workflow Automation  Vendor Integration  Warranty Management  Contract Management  Request Management  Barcoding / RFID  Web Console  SNMP Device Management Printers, Switches, Etc…  Executive Dashboarding
  • 3. LANDesk Software Confidential Typical Business IT Infrastructure Systems Management Asset Management Security Management Service Management
  • 4. LANDesk Software Confidential Examples of Service Desk Requests  Employee onboarding/off-boarding  Access rights  Group changes  Desk moves  Password reset  Hardware requests  Software – free v. purchase “I want” vs. “I need” ?
  • 5. LANDesk Software Confidential Example 1: Software Request INCIDENT I want new software • Discovery/Inventory • Power Mgmt • Remote Control • SLM • Mobility • Software Distribution • Licensing • Versioning • Materials Management • White List • Patch • Settings • Audit • Policy • Malware SERVICE DESK Asset Management Security ManagementREQUEST Systems Management
  • 6. LANDesk Software Confidential Example 2: Access Request (Incident) I need access SERVICE DESK • Discovery/Inventory • Power Mgmt • Remote Control • SLM • Mobility • Software Distribution Asset Management Security ManagementREQUEST INCIDENT SERVICE DESK Systems Management
  • 7. LANDesk Software Confidential Erasing the Barriers Systems Management Asset Management Security Management Service ManagementP P P P P SERVICE DESK REQUEST INCIDENT Data Analytics
  • 8. LANDesk Software Confidential LANDesk Service Desk in Action I want new software • Discovery/Inventory • Power Mgmt • Remote Control • SLM • Mobility • Software Distribution • B2B Connectors • Data Management • Asset Control • SAM • EULA Analytics • Compliance Reports • White List • Patch • Settings • Audit • Policy • Malware Data Analytics Security Management Systems Management REQUEST INCIDENT P P P P P Installing on user’s machine Service Management
  • 9. LANDesk Software Confidential LANDesk Service Desk in Action I need access • Discovery/Inventory • Power Mgmt • Remote Control • SLM • Mobility • Software Distribution • B2B Connectors • Data Management • Asset Control • SAM • EULA Analytics • Compliance Reports • White List • Patch • Settings • Audit • Policy • Malware Data Analytics Security Management Systems Management Service Management REQUEST INCIDENT P P P P P Self-service portal Zero Call Resolution
  • 10. LANDesk Software Confidential Zero Call Resolution Customers
  • 11. LANDesk Software Confidential P P P P P Dashboards DASHBOARDS SLA / KPI Scorecard Event Management Impact Analysis User Notification/ Surveys Data Analytics Security Management Systems Management Service Management
  • 12. LANDesk Software Confidential End-to-End IT Service Management • Save money • Reduce risk • Increase efficiency • Improve business operations P P P P P Data Analytics Security Management Systems Management Service Management
  • 13. LANDesk Software Confidential Magic Quadrant for IT Service Support Management Tools The LANDesk Difference Magic Quadrant for Client Management Tools Magic Quadrant for Endpoint Protection Platforms – Quadrant presence unmatched !
  • 14. LANDesk Software Confidential End-to-End IT Service Management = Value  Number of incidents per month › Request offload 30% › 30% quicker  Annual or semi-annual software audit  Patch management/software rollouts/true-ups  CSAT/Promoter score  Failed changes  Power management cost savings  SOX/HIPAA/PCI/SAS70 audits/compliance  Employee onboarding/off-boarding
  • 15. LANDesk Software Confidential The LANDesk Difference What makes LANDesk truly unique? (what no other vendor can offer)  ability to unify and automate all those disciplines  a flexible and intelligent process platform, allowing you  cost savings,  increased productivity,  business-level intelligence  true end-to-end IT service management.
  • 16. LANDesk Software Confidential • LANDesk is uniquely positioned to provide service management across the enterprise and automate processes like no other vendor • Bringing together Service Management, Process Automation, Asset Management, Desktop Management, and Datacenter Monitoring, LANDesk provides a unique and leading solution • LANDesk is the only company that provides solutions in three of the key Gartner Magic Quadrants surrounding end-to-end IT services End-to-End IT Service Management Magic Quadrant for IT Service Support Management ToolsMagic Quadrant for Client Management ToolsMagic Quadrant for Endpoint Protection Platforms
  • 17. LANDesk Software Confidential Get IN Touch! Phone: 714-408-4700 www: www.irontouchms.com SocialMedia CONTACT in
  • 18. 18 Thank You! The information herein is the confidential information and/or proprietary property of LANDesk Software, Inc. and its affiliates (referred to collectively as “LANDesk”), and may not be disclosed or copied without prior written consent of LANDesk. To the maximum extent permitted under applicable law, LANDesk assumes no liability whatsoever, and disclaims any express or implied warranty, relating to the sale and/or use of LANDesk products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right, without limiting the rights under copyright. LANDesk retains the right to make changes to the information herein or related product specifications and descriptions, at any time, without notice. LANDesk makes no warranty for the use of the information herein and assumes no responsibility for any errors that can appear nor does it make a commitment to update the information contained herein. For the most current product information, please visit landesk.com or wavelink.com. Copyright © 2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks of LANDesk Software, Inc. and its affiliates in the United States and/or other countries. Other brands and names may be claimed as the property of others.

Editor's Notes

  1. A “typical” business IT infrastructure is silo-ed and there is limited automation for seamless collaboration between departments. Even the most basic IT service requests (or problems) can involve dozens of complex interactions among different departments, people, and disciplines—from frontline service desks and change management engines to backend asset, lifecycle, infrastructure, and security management systems. To complicate matters even more, these different areas are nearly always separated by technological and organizational barriers, and crossing those barriers takes time, costs money, and limits efficiency.
  2. A “typical” business IT infrastructure is silo-ed and there is limited automation for seamless collaboration between departments. Even the most basic IT service requests (or problems) can involve dozens of complex interactions among different departments, people, and disciplines—from frontline service desks and change management engines to backend asset, lifecycle, infrastructure, and security management systems. To complicate matters even more, these different areas are nearly always separated by technological and organizational barriers, and crossing those barriers takes time, costs money, and limits efficiency.
  3. When it comes to IT Service Management, a tremendous variety of requests come in to the help desk. Some are vital needs and many are non-urgent “wants.”According to the Help Desk Institute, 30-40% of Service Desk calls are non-critical “I wants.” You can offload those Service Desk “I wants” by building an automated Self-Service Catalog. Estimate $35 per call, and if you have 10,000 calls per month, 30% of those resolved through self-service will save in excess of $100,000.
  4. Here is an example of a Service Desk call at a “typical” company:An end user calls the help desk and asks for an updated version of Adobe Acrobat Professional. The Helpdesk employee must contact the desktop management team, who would have to first call the employee’s manager for budget approval. They would then have to purchase the software. Finally, the desktop team would either contact the employee to self-install via a link, or push the install from IT.Typically the company’s Asset Manager willmanually inventory that Acrobat Pro purchase in a spreadsheet. That record usually includes the licensing info, the version, what machine it’s loaded on, etc. Then when new software versions become available, the desktop team either automates updates or physically goes to the employee’s desk again. Sometimes they need to check with the asset manager before doing so.
  5. LANDesk can erase these types of gaps and barriers between different organizational and IT disciplines to deliver a more unified, automated, and comprehensive approach to IT service management. LANDesk has developed an advanced intelligent process engine, the Federated CMDB, that brings all these different areas together and enables them to interact with each other in important new ways. (note: in this scenario, “asset management” becomes LANDesk Data Analytics, a far more powerful way to manage hardware and software assets)
  6. So here is an example of the Federated CMDB in action: The employee submits a helpdesk ticket, requesting Adobe Acrobat Professional. The process engine checks inventory and then makes a request of the manager. It tracks the approval process. Then the CMDB picks it up, and Systems Management deploys, inventories, and discovers the software.Data Analytics tracks the license from purchase through to end of life, and Security Management makes sure it is automatically patched.Service Desk keeps track of the overall service to the end user – all of which is coordinated by the CMDB.
  7. In addition to making service requests more efficient, this kind of cross-discipline automation also lowers the cost and effort required to resolve incidents. Access Requests are a common and obvious example. With LANDesk, users can initiate access requests through the self-service portal, which automatically triggers appropriate events in various IT and security management systems to achieve a low-cost, zero-call resolution. Zero-call resolution moves this from $30 per call to $5 per call.Also prevents acceleration to level 2 or 3, where costs go to $75-100 per incident.For more complex problems, service desk technicians can tap directly into various IT systems tools and resources to diagnose and resolve problems, by using remote control, inventory, patch management, and more. These types of interactions are managed and automated through the LANDesk process automation engine, will lower overall incident response times by around one-third while increasing first call resolution statistics. This will ultimately free your service desk and IT staff to focus their attention on more serious, strategic, and business-critical issues.
  8. (info here on dashboards)
  9. This unified, cross-discipline approach to IT service management translates into obvious opportunities for saving money, lowering risks, increasing efficiency, and improving business operations. Using an intelligent process engine to integrate front-end service desk capabilities with back-end asset and client endpoint management, infrastructure management, and security and compliance management systems makes it possible to measure and analyze the total impact of changes and incidents on your entire organization. It also provides an easy way to document the complete end-to-end processes behind every request, incident and change, which enhances your regulatory and compliance programs.
  10. The thing that makes LANDesk truly unique—the thing no other vendor can offer—is the ability to unify and automate all those disciplines through a flexible and intelligent process platform, allowing you to finally achieve the cost savings, increased productivity, and business-level intelligence that come from true end-to-end IT service management.
  11. Where you get ROI from the End-to-End IT Service Management solution…
  12. The thing that makes LANDesk truly unique—the thing no other vendor can offer—is the ability to unify and automate all those disciplines through a flexible and intelligent process platform, allowing you to finally achieve the cost savings, increased productivity, and business-level intelligence that come from true end-to-end IT service management.
  13. And finally, LANDesk is the only company that provides solutions in three of the key Gartner Magic quadrants surrounding end-to-end IT services:IT Service DeskPC Lifecycle Configuration ManagementEndpoint Protection