SlideShare a Scribd company logo
@TechTrainerTim techtrainertim.com
AUTHOR/TECH EVANGELIST, PLURALSIGHT
Tim Warner
Predicting the Future of Endpoint
Management in a Mobile World
Define our terms
Review endpoint systems management trends
Present an endpoint management “wish list”
Overview
Relevant vocabulary
An Internet-capable computer hardware device on a
TCP/IP network.
Endpoint device
timw.info/ed
Endpoint Examples
Server and desktop PCs (Windows, Linux, macOS)
Laptop PC
Thin-client devices (Chromebooks)
Tablet
Smartphone
Printers
POS systems
IoT devices (smart meters)
Bring Your Own Device. The policy of permitting employees
to bring personally owned devices to their workplace, and to
to use those devices to access privileged company
information and applications.
BYOD
timw.info/byod
Customer Owned, Personally Enabled. A policy in which the
company purchases the devices to provide to their
employees; the functionality of a private device is enabled to
to allow personal usage.
COPE
timw.info/byod
Endpoint systems management trends
Mobile Workforce Trends
“Road
warrior”
salespeople
Broadband
home office
workers
BYOD
Endpoint Device Confetti
One user, multiple devices Fragmentation
Open-source components 0-day vulnerabilities
Endpoint Device Confetti
This situation is made worse with non-integrated management
systems
Lack of Enforcement
How can you detect and
remediate compromised
systems?
Lack of Policy
How well documented is
your inventory?
Compliance reports?
Lack of Visibility
Can you view all
endpoints, in all their
forms, through a “single
pane of glass”?
Security Hazards
Endpoint management “wish list”
Service desk/support
Application
deployment
Patch management
Compliance
evaluation
OSD (and licensing)Asset management
Elements of Endpoint Management
An Umbrella (Appliance) Solution
Support
What is the vendor’s
policy?
Integration
How does the solution
“play”?
Feature Set
Is it an “umbrella”
solution?
Scalability
Can the solution grow
with your business?
Complexity
Does the solution match
your business needs?
Considerations in Choosing an Endpoint
Management Solution
KACE Endpoint Systems
Management for growing
organizations
18
Endpoint systems management lifecycle
• Image capture
• Zero touch OS
deployment
• Multicasting
• User state migration
• Remote site support
• Service desk
• User portal & self
service
• Monitoring & alerting
• Remote control
• Mobile access
• Patch management
• Configuration
management
• Policy enforcement
• Vulnerability scanning
• Discovery & inventory
• Asset management
• Software distribution
• Reporting &
compliance
19
• Reduce infrastructure costs
• Expedite time to value
• Automate asset inventory
and patching
• Save time on asset
discovery and inventory
using consolidated
reporting
• Improve control, security,
response time and user
productivity
• Cut downtime and risk
• Ensure license compliance
• Perform application updates
in minutes
• Upgrade suites in days, not
weeks
Optimize
application
experience
Modernize
infrastructure
for the cloud
Automate
complex
processes
Enable a
data-driven
business
• Reduce IT time and
resources for system
provisioning, deployments,
patching and service request
responses
KACE can help
20
Optimize
application
experience
Modernize
infrastructure
for the cloud
Automate
complex
processes
Enable a
data-driven
business
Customer validation
• 68% of surveyed IT
organizations have more
accurate hardware and
software inventory to better
inform purchasing and
maximize use of existing
assets as a result of
purchasing KACE K1000.
• 50% of surveyed IT
organizations have simplified
application distribution and
maintenance to ensure
applications are up to date and
secure as a result of purchasing
KACE.
• 53% of IT organizations chose
the KACE Systems
Management Deployment
Appliance because they were
overwhelmed by the amount of
manual chores to simply keep
operating systems up to date
and running.
• 70% of customers
implemented KACE in less
than 2 weeks.
Add Image Here
21
KACE Systems Management Appliance
The KACE Systems
Management Appliance
is the most
comprehensive systems
management solution
that streamlines asset
management, better
secures all network
connected devices, and
more efficiently services
end user systems –
giving resource
constrained IT
organizations more time
to innovate.
Inventory & IT asset
management
Software distribution
Transform insight into action with
turnkey reporting.
Keep your organization safe with set-it-and-
forget-it patching.
Deliver the right software to the right
person at the right time.
Make delivering a great help desk user
experience look easy.
Patch management
& security
Software distribution
Service desk
Add Image Here
22
KACE Systems Deployment Appliance
The KACE Systems
Deployment
Appliance offers a
multi-platform
solution that provides
initial provisioning
and ongoing
administration of
master system
images and driver
updates faster and
easier, ensuring
connected systems
remain up to date and
secure.
Plan
Configure
Deploy
Centralized
Administration
Remote site
Management and
administration
• Mobile interface for the Systems Management Appliance
• Enhanced mobile productivity for systems administrators
• Ability to cut through email noise and identify critical issues
• Task engine
• Pre- and post-install tasks
• User state migration
• Remote systems recovery
• Disk imaging
• Centralized deployment library
• Multicasting
• Network OS install
Thank you so much for your time today!
Twitter: @TechTrainerTim
Website: techtrainertim.com
Email: tim-warner@pluralsight.com
On demand webcast:
http://ow.ly/pOwW30eF1ys
Summary

More Related Content

What's hot

VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
MarketingArrowECS_CZ
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsCTI Group
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
Amit Gatenyo
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionLumension
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
Kimber Spradlin
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
Microsoft TechNet - Belgium and Luxembourg
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural OverviewBrian Dickhaus
 
V mware view
V mware viewV mware view
V mware view
Sistemi Qualità
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentials
solsoft
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
Kimber Spradlin
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
Belarmino Tomicha
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
James W. De Rienzo
 
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld
 
Troubleshooting and debugging Citrix Receiver for iOS and Android
Troubleshooting and debugging Citrix Receiver for iOS and AndroidTroubleshooting and debugging Citrix Receiver for iOS and Android
Troubleshooting and debugging Citrix Receiver for iOS and Android
Citrix
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
Spiceworks
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager Overview
ManageEngine
 
AutomateandsimAutomate and Simplify Your IT Management Operations
AutomateandsimAutomate and Simplify Your IT Management OperationsAutomateandsimAutomate and Simplify Your IT Management Operations
AutomateandsimAutomate and Simplify Your IT Management Operations
Dell World
 
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
Jürgen Ambrosi
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
eG Innovations
 

What's hot (19)

VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
Dell Endpoint Systems Management Solutions
Dell Endpoint Systems Management SolutionsDell Endpoint Systems Management Solutions
Dell Endpoint Systems Management Solutions
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
 
V mware view
V mware viewV mware view
V mware view
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentials
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
 
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
 
Troubleshooting and debugging Citrix Receiver for iOS and Android
Troubleshooting and debugging Citrix Receiver for iOS and AndroidTroubleshooting and debugging Citrix Receiver for iOS and Android
Troubleshooting and debugging Citrix Receiver for iOS and Android
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager Overview
 
AutomateandsimAutomate and Simplify Your IT Management Operations
AutomateandsimAutomate and Simplify Your IT Management OperationsAutomateandsimAutomate and Simplify Your IT Management Operations
AutomateandsimAutomate and Simplify Your IT Management Operations
 
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
 

Similar to Predicting the Future of Endpoint Management in a Mobile World

Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
apprize360
 
Entuity Network Management Product Overview
Entuity Network Management Product OverviewEntuity Network Management Product Overview
Entuity Network Management Product Overview
Entuity
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
apprize360
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
Eurotech
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
Eurotech
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
Andrew Miller
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Eurotech
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
Parallels Inc
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
Parallels Inc
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native Stack
Apcera
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
VMworld
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
SolarWinds
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
SolarWinds
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenter
jmustac
 
Sutedjo - Introduction to Cloud
Sutedjo - Introduction to CloudSutedjo - Introduction to Cloud
Sutedjo - Introduction to Cloud
PT Datacomm Diangraha
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
DellNMS
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DNUG e.V.
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
jckirby
 

Similar to Predicting the Future of Endpoint Management in a Mobile World (20)

Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Whitepaper factors to consider commercial infrastructure management vendors
Whitepaper  factors to consider commercial infrastructure management vendorsWhitepaper  factors to consider commercial infrastructure management vendors
Whitepaper factors to consider commercial infrastructure management vendors
 
Entuity Network Management Product Overview
Entuity Network Management Product OverviewEntuity Network Management Product Overview
Entuity Network Management Product Overview
 
Whitepaper factors to consider when selecting an open source infrastructure ...
Whitepaper  factors to consider when selecting an open source infrastructure ...Whitepaper  factors to consider when selecting an open source infrastructure ...
Whitepaper factors to consider when selecting an open source infrastructure ...
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in LondonIoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
IoT and the Oil & Gas industry at M2M Oil & Gas 2014 in London
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
Addressing the Complexity and Risks of M2M Projects - M2M World Congress Apri...
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
 
VAS - VMware CMP
VAS - VMware CMPVAS - VMware CMP
VAS - VMware CMP
 
Securing the Cloud Native Stack
Securing the Cloud Native StackSecuring the Cloud Native Stack
Securing the Cloud Native Stack
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Systemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenterSystemology presentation- System Center & the modern datacenter
Systemology presentation- System Center & the modern datacenter
 
Sutedjo - Introduction to Cloud
Sutedjo - Introduction to CloudSutedjo - Introduction to Cloud
Sutedjo - Introduction to Cloud
 
Visualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your NetworkVisualizing Your Network Health - Know your Network
Visualizing Your Network Health - Know your Network
 
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdfDACHNUG50 BigFix WorkspaceAndAutomation.pdf
DACHNUG50 BigFix WorkspaceAndAutomation.pdf
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
 

More from Quest

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
Quest
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
Quest
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
Quest
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Quest
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
Quest
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
Quest
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
Quest
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Quest
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
Quest
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
Quest
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
Quest
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
Quest
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
Quest
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
Quest
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Quest
 
Your Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemYour Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome Them
Quest
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
Quest
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
Quest
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active Directory
Quest
 

More from Quest (20)

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
Your Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemYour Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome Them
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active Directory
 

Recently uploaded

Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 

Recently uploaded (20)

Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 

Predicting the Future of Endpoint Management in a Mobile World

  • 1. @TechTrainerTim techtrainertim.com AUTHOR/TECH EVANGELIST, PLURALSIGHT Tim Warner Predicting the Future of Endpoint Management in a Mobile World
  • 2. Define our terms Review endpoint systems management trends Present an endpoint management “wish list” Overview
  • 4. An Internet-capable computer hardware device on a TCP/IP network. Endpoint device timw.info/ed
  • 5. Endpoint Examples Server and desktop PCs (Windows, Linux, macOS) Laptop PC Thin-client devices (Chromebooks) Tablet Smartphone Printers POS systems IoT devices (smart meters)
  • 6. Bring Your Own Device. The policy of permitting employees to bring personally owned devices to their workplace, and to to use those devices to access privileged company information and applications. BYOD timw.info/byod
  • 7. Customer Owned, Personally Enabled. A policy in which the company purchases the devices to provide to their employees; the functionality of a private device is enabled to to allow personal usage. COPE timw.info/byod
  • 10. Endpoint Device Confetti One user, multiple devices Fragmentation Open-source components 0-day vulnerabilities
  • 11. Endpoint Device Confetti This situation is made worse with non-integrated management systems
  • 12. Lack of Enforcement How can you detect and remediate compromised systems? Lack of Policy How well documented is your inventory? Compliance reports? Lack of Visibility Can you view all endpoints, in all their forms, through a “single pane of glass”? Security Hazards
  • 14. Service desk/support Application deployment Patch management Compliance evaluation OSD (and licensing)Asset management Elements of Endpoint Management
  • 16. Support What is the vendor’s policy? Integration How does the solution “play”? Feature Set Is it an “umbrella” solution? Scalability Can the solution grow with your business? Complexity Does the solution match your business needs? Considerations in Choosing an Endpoint Management Solution
  • 17. KACE Endpoint Systems Management for growing organizations
  • 18. 18 Endpoint systems management lifecycle • Image capture • Zero touch OS deployment • Multicasting • User state migration • Remote site support • Service desk • User portal & self service • Monitoring & alerting • Remote control • Mobile access • Patch management • Configuration management • Policy enforcement • Vulnerability scanning • Discovery & inventory • Asset management • Software distribution • Reporting & compliance
  • 19. 19 • Reduce infrastructure costs • Expedite time to value • Automate asset inventory and patching • Save time on asset discovery and inventory using consolidated reporting • Improve control, security, response time and user productivity • Cut downtime and risk • Ensure license compliance • Perform application updates in minutes • Upgrade suites in days, not weeks Optimize application experience Modernize infrastructure for the cloud Automate complex processes Enable a data-driven business • Reduce IT time and resources for system provisioning, deployments, patching and service request responses KACE can help
  • 20. 20 Optimize application experience Modernize infrastructure for the cloud Automate complex processes Enable a data-driven business Customer validation • 68% of surveyed IT organizations have more accurate hardware and software inventory to better inform purchasing and maximize use of existing assets as a result of purchasing KACE K1000. • 50% of surveyed IT organizations have simplified application distribution and maintenance to ensure applications are up to date and secure as a result of purchasing KACE. • 53% of IT organizations chose the KACE Systems Management Deployment Appliance because they were overwhelmed by the amount of manual chores to simply keep operating systems up to date and running. • 70% of customers implemented KACE in less than 2 weeks.
  • 21. Add Image Here 21 KACE Systems Management Appliance The KACE Systems Management Appliance is the most comprehensive systems management solution that streamlines asset management, better secures all network connected devices, and more efficiently services end user systems – giving resource constrained IT organizations more time to innovate. Inventory & IT asset management Software distribution Transform insight into action with turnkey reporting. Keep your organization safe with set-it-and- forget-it patching. Deliver the right software to the right person at the right time. Make delivering a great help desk user experience look easy. Patch management & security Software distribution Service desk
  • 22. Add Image Here 22 KACE Systems Deployment Appliance The KACE Systems Deployment Appliance offers a multi-platform solution that provides initial provisioning and ongoing administration of master system images and driver updates faster and easier, ensuring connected systems remain up to date and secure. Plan Configure Deploy Centralized Administration Remote site Management and administration • Mobile interface for the Systems Management Appliance • Enhanced mobile productivity for systems administrators • Ability to cut through email noise and identify critical issues • Task engine • Pre- and post-install tasks • User state migration • Remote systems recovery • Disk imaging • Centralized deployment library • Multicasting • Network OS install
  • 23. Thank you so much for your time today! Twitter: @TechTrainerTim Website: techtrainertim.com Email: tim-warner@pluralsight.com On demand webcast: http://ow.ly/pOwW30eF1ys Summary