SlideShare a Scribd company logo
1
© 2016 RES SOFTWARE – ALL RIGHTS RESERVED
Ein Überblick…
Vision – Strategie - Lösungen
28.09.2016
Oliver Lomberg
2
Vorstellung von RES
3
RES auf einem Blick
• Vision: People Centric IT -as a Service-
• 1999 in NL gegründet von Bob Janssen mit Fokus auf Hybride Umgebungen
• Hauptsitz in Philadelphia, US – EMEA HQ in DenBosch, NL
• Über 3.000 Kunden, 10 Mio Anwender in 27 Länder
• Große skalierbare Installationen mit über 1.5 Mio Anwendern
• 100% Indirektes Vertriebsmodell
Extended Partner Ecosystem of 800+ Partners
44
• Schnelles On- Offboarding
• Roll-Out	Win10/VDI/App-Virt
• Security/”context	awarness”
• Compliance/Governance
• Agilität/Geschwindigkeit
• IT	behält die	Kontrolle
• Userzufriedenheit
• Reduzierung Tickets	/	Kosten
Benefits =
RES	ONE	Service	Store
User Profile
---------------------
---------------------
IT
Win 10 CTXS VMW MDM DB-App Cloud-Services
RES ONE Workspace / Automation
SCCM
Digitaler IT-Arbeitsplatz
Browser WIN 10 Citrix 3D Print
Testing PwR Mobile Reise
5
Service App StoreWorkspace Optimization
Predictive Service Delivery Platform
AUTOMATION
How RES Software Brings Agility to Your Workforce
RES ONE
Automation
RES ONE
Workspace
RES ONE
Service Store
RES ONE Automation
ITSM, PCLM
MDM
Virtualization
SaaS, IaaS
Automation
Packs
6
7
Centrally manage and secure your
workforce’s apps and services across even
the most complex virtual and physical
environments
8
Centralized Management Console
• Manage all user settings,
policies, configurations
and more from a single
console
• Make changes and
updates easily
• Full auditing of all
administrative actions
• Detailed administrative
delegation capabilities
9
Advanced Configuration
• Dynamic, just-in-time configuration
• File types, e-mail settings and data
sources
• Application actions
o Drive and Port Mappings
o Printers
o Registry Settings and Policies
o Profile and Home Directory
o Folder Sync
o Automation
o PC Lifecycle Management
10
Context Awareness
• Dynamically adapt a user’s
workspace based on
context, ensuring proper
access to printers, data,
and apps based on their
real-time working
conditions
• Apply policy rules ranging
from very broad to very
granular factors for
increased security
Active
Directory
Computer Configuration Network
Remote
Desktop
Site
Hardware
(CPU
speed,
memory)
Environment
Variable
Computer
Name
IP Address
(IP address,
range)
Group
Membership
IP Address
Files & Folders
(file version,
folder exists)
IP Address
(IP address,
range)
Client Name
Organizational
Unit
Membership
Name
FIPS
Compliancy
Remote
Host/URL
Client Type
(Citrix Receiver
only)
User Property
Operating
System
(Bit )
version
Hardware
Token
(serial #,
vendor ID, USB)
Terminal Server
Listener Name
Session Type
USB
Storage
Device
(serial #,
vendor ID)
Operating
System
(Bit ) version
Wireless
(Connected
(SSID) or
nearest access
point (BSSID))
Terminal Server
Listener Name
Registry Setting
VDX /
Workspace
Extender
11
Usage Tracking and Auditing
• Real-time and historical usage reporting
• Control licenses based on actual usage
• Minimize time spent on audits
• Reduce overspending on licenses
• Prove compliance
12
Adaptive Security
• Prevent vulnerabilities across all sources
o Careless users are as large of risks as malicious external threats
• People-centric
o Dynamically secure services based on user context
• Flexible security levels
o Adjust security at granular level to meet the needs of the organization
o Based on user, span from total lock down to fully open
Examples:
• Data & USB Storage
• Privilege management
• Application access, including user installed applications
• Web access and usage
• Network-based/IP restrictions
13
Adaptive Security (cont.)
Protect from internal and
external threats:
• File Hash based application
security
• Whitelisting/blacklisting
• Dynamic privileges
• User-installed apps
• Context aware policy
enforcement
• USB storage control
• Read-only blanketing
• Lockdown
14
Step-by-Step Transformation with RES
Unmanaged Live
Desktop
Environment
Collect Data
(Desktop
Sampler)
Analyze Data
(Workspace
Designer)
Partly Managed
Desktop
(Workspace
Model)
Fully Managed
(Workspace)
Predict Future
Changes
(Workspace
Simulation)
15
16
Drive
competitive advantage
by automating the
delivery and return
of business
and IT services
17
Extensive Out-of-the-Box Tasks
• Over 270 Tasks & Activities
o Configuration
o Provisioning
o Virtualization
o Security
o Advanced
o System State
o Cloud Provisioning
o Infrastructure as a Service
o PC Life Cycle Management
o Service Desk Integration
o Mobile Device Management
• Heterogeneous
Support
o Windows
o Unix
o Linux
o Mac OSX
Quick implementation and easy automation management
18
Extending Your Existing Investments
Free Automation Packs
• Extensible via APIs &
Web Services
• Integrates with
o EMM/MDM
o ITSM
o PLCM
o SaaS
o Virtualization / Cloud
provisioning
19
Predefined Automation Tasks Overview
20
21
Transform the digital
experience of your
workforce
with an
automated, intuitive
service app store
22
Intuitive Self Service Interface
• View active and
available services
offered through the
RES ONE Service Store
• Services can be both
IT and non-IT related
(i.e., business process
related)
• Easily customizable
(language, logo,
colors)
23
Access Service Store from Various Devices
• Service Store Web Front
• New Mobile UI
(Free Download)
Workforce
v Easily view, request and manage
available corporate applications
and services from iOS and
Android devices.
Managers
v Easily use apps to approve
requests for apps & services, and
order relevant apps & services on
behalf of employees.
24
Simplified Visual Workflow
• IT can quickly
automate business
workflow processes
• Business logic & IT
process information
are stored to
determine what
should happen
during the delivery
and return workflow
25
Identity and Classification
• Personalization of Services with Identity Warehouse
• Identity warehouse collects information from HR & Payroll systems
to determine the “identity” of a person
• 80% of services can be predicted automatically
26
Subscription Engine
• Easily track service status
• Service workflows
• Can be triggered manually or
automatically
• Services can be automatically
delivered & returned
• On Day 1 or when employees
transition to ensure proper
and secure offboarding
27
Delegation via Service Panel
• Enables Delegation of
Requests
• Managers or
designated users can
request services on
behalf of others
• Empowers Business, User
and Service Desk to Do
More
28
Pause
29
Live Demo
30
Use Cases
31
© 2016 RES SOFTWARE – ALL RIGHTS RESERVED
Use Cases
Alle Prozesse und Abläufe, die sich über die IT
abbilden lassen und deren Ursprung originär
nicht unbedingt in der IT liegen muss.
Abläufe werden auf das wesentliche reduziert,
beschleunigt und bleiben transparent, sowie
nachvollziehbar.
No Limits
32
Vielen Dank!

More Related Content

What's hot

Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006
guest879489
 
Microsoft azure
Microsoft azureMicrosoft azure
Microsoft azure
Mohammad Ilyas Malik
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
WSO2
 
The New Office in Today's Social Enterprise from Atidan
The New Office in Today's Social Enterprise from AtidanThe New Office in Today's Social Enterprise from Atidan
The New Office in Today's Social Enterprise from Atidan
David J Rosenthal
 

What's hot (20)

SplunkLive! Wien 2016 - Splunk Enterprise 6.4
SplunkLive! Wien 2016 - Splunk Enterprise 6.4SplunkLive! Wien 2016 - Splunk Enterprise 6.4
SplunkLive! Wien 2016 - Splunk Enterprise 6.4
 
Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006
 
Microsoft azure
Microsoft azureMicrosoft azure
Microsoft azure
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
Azure 101
Azure 101Azure 101
Azure 101
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case SwisscomSplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case Swisscom
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
SplunkLive! Wien 2016 - Use Case TTTech Computertechnik
SplunkLive! Wien 2016 - Use Case TTTech ComputertechnikSplunkLive! Wien 2016 - Use Case TTTech Computertechnik
SplunkLive! Wien 2016 - Use Case TTTech Computertechnik
 
Micro Focus Corporate Overview
Micro Focus Corporate OverviewMicro Focus Corporate Overview
Micro Focus Corporate Overview
 
Cloud Email Firewall
Cloud Email FirewallCloud Email Firewall
Cloud Email Firewall
 
Allianz x api_management_servic_fabric
Allianz x api_management_servic_fabricAllianz x api_management_servic_fabric
Allianz x api_management_servic_fabric
 
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
Tiago Fonseca & Rui Velho - Syone & Leroy Merlin - OSL19
 
Build apps
Build appsBuild apps
Build apps
 
Oracle's Cloud Strategy
Oracle's Cloud StrategyOracle's Cloud Strategy
Oracle's Cloud Strategy
 
The New Office in Today's Social Enterprise from Atidan
The New Office in Today's Social Enterprise from AtidanThe New Office in Today's Social Enterprise from Atidan
The New Office in Today's Social Enterprise from Atidan
 
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICSHIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
HIGH-IMPACT USE CASES POWERED BY NEXT-GENERATION NETWORK ANALYTICS
 
PLNOG 22 - Jarosław Zieliński - Skrzyżowanie datacenter z chmurą II. Jak utrz...
PLNOG 22 - Jarosław Zieliński - Skrzyżowanie datacenter z chmurą II. Jak utrz...PLNOG 22 - Jarosław Zieliński - Skrzyżowanie datacenter z chmurą II. Jak utrz...
PLNOG 22 - Jarosław Zieliński - Skrzyżowanie datacenter z chmurą II. Jak utrz...
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 

Viewers also liked

10223-60712_CLS Campaign Report 2015-proof
10223-60712_CLS Campaign Report 2015-proof10223-60712_CLS Campaign Report 2015-proof
10223-60712_CLS Campaign Report 2015-proof
Sarah Palermo
 

Viewers also liked (17)

Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
Trabajo imagenes del romanticismo
Trabajo imagenes del romanticismoTrabajo imagenes del romanticismo
Trabajo imagenes del romanticismo
 
Content research
Content researchContent research
Content research
 
Simulado
SimuladoSimulado
Simulado
 
ENGINE
ENGINEENGINE
ENGINE
 
Simulador Res Q
Simulador Res QSimulador Res Q
Simulador Res Q
 
Tips
TipsTips
Tips
 
Ansvar for datasikkerhet
Ansvar for datasikkerhetAnsvar for datasikkerhet
Ansvar for datasikkerhet
 
Elenco applicazioni centralina_cambio_elettronico_dynojet_ quick_shifter
Elenco applicazioni centralina_cambio_elettronico_dynojet_ quick_shifterElenco applicazioni centralina_cambio_elettronico_dynojet_ quick_shifter
Elenco applicazioni centralina_cambio_elettronico_dynojet_ quick_shifter
 
10223-60712_CLS Campaign Report 2015-proof
10223-60712_CLS Campaign Report 2015-proof10223-60712_CLS Campaign Report 2015-proof
10223-60712_CLS Campaign Report 2015-proof
 
GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...
GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...
GROWING AND PRESERVING ASSETS THROUGH TAX AND ESTATE PLANNING - Tina Davis, C...
 
Tibet
TibetTibet
Tibet
 
smartACCESS
smartACCESSsmartACCESS
smartACCESS
 
2bandreagarcia
2bandreagarcia2bandreagarcia
2bandreagarcia
 
VMware: AirWatch Unternehmensmobilität - Kinoforum 2016
VMware: AirWatch Unternehmensmobilität - Kinoforum 2016VMware: AirWatch Unternehmensmobilität - Kinoforum 2016
VMware: AirWatch Unternehmensmobilität - Kinoforum 2016
 
Artritis enfoque holistico
Artritis enfoque holisticoArtritis enfoque holistico
Artritis enfoque holistico
 
880 bab 2_kuantor
880 bab 2_kuantor880 bab 2_kuantor
880 bab 2_kuantor
 

Similar to RES: Vision und Lösungen - Kinoforum 2016

Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
indradipg
 

Similar to RES: Vision und Lösungen - Kinoforum 2016 (20)

VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
An introduction and overview to Software as a Service
An introduction and overview to Software as a Service An introduction and overview to Software as a Service
An introduction and overview to Software as a Service
 
Testting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internetTestting application with a presentation downloaded from the internet
Testting application with a presentation downloaded from the internet
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
 
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
7 12-2010 - UU - Microsoft Cloud Services - peter de haas -final
 
WinDays15 - RemoteApp
WinDays15 - RemoteAppWinDays15 - RemoteApp
WinDays15 - RemoteApp
 
inmation Presentation
inmation Presentationinmation Presentation
inmation Presentation
 
User activity monitoring with SysKit
User activity monitoring with SysKitUser activity monitoring with SysKit
User activity monitoring with SysKit
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Bsm mw10
Bsm mw10Bsm mw10
Bsm mw10
 
VMworld 2013: The Software Defined Datacenter Meets End User Computing
VMworld 2013: The Software Defined Datacenter Meets End User Computing VMworld 2013: The Software Defined Datacenter Meets End User Computing
VMworld 2013: The Software Defined Datacenter Meets End User Computing
 
TechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud EssentialsTechNet Event: August 2011 Cloud Essentials
TechNet Event: August 2011 Cloud Essentials
 
Packaging Machine Automation Trends, Solutions and Operations
Packaging Machine Automation Trends, Solutions and OperationsPackaging Machine Automation Trends, Solutions and Operations
Packaging Machine Automation Trends, Solutions and Operations
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
 
InterConnect 2015 session 2825 cics_and_the_new soa
InterConnect 2015 session 2825  cics_and_the_new soaInterConnect 2015 session 2825  cics_and_the_new soa
InterConnect 2015 session 2825 cics_and_the_new soa
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
La Cics Tools Overview April 2009
La   Cics Tools Overview   April 2009La   Cics Tools Overview   April 2009
La Cics Tools Overview April 2009
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
AdminCamp 2018 - ApplicationInsights für Administratoren
AdminCamp 2018 - ApplicationInsights für AdministratorenAdminCamp 2018 - ApplicationInsights für Administratoren
AdminCamp 2018 - ApplicationInsights für Administratoren
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 

RES: Vision und Lösungen - Kinoforum 2016

  • 1. 1 © 2016 RES SOFTWARE – ALL RIGHTS RESERVED Ein Überblick… Vision – Strategie - Lösungen 28.09.2016 Oliver Lomberg
  • 3. 3 RES auf einem Blick • Vision: People Centric IT -as a Service- • 1999 in NL gegründet von Bob Janssen mit Fokus auf Hybride Umgebungen • Hauptsitz in Philadelphia, US – EMEA HQ in DenBosch, NL • Über 3.000 Kunden, 10 Mio Anwender in 27 Länder • Große skalierbare Installationen mit über 1.5 Mio Anwendern • 100% Indirektes Vertriebsmodell Extended Partner Ecosystem of 800+ Partners
  • 4. 44 • Schnelles On- Offboarding • Roll-Out Win10/VDI/App-Virt • Security/”context awarness” • Compliance/Governance • Agilität/Geschwindigkeit • IT behält die Kontrolle • Userzufriedenheit • Reduzierung Tickets / Kosten Benefits = RES ONE Service Store User Profile --------------------- --------------------- IT Win 10 CTXS VMW MDM DB-App Cloud-Services RES ONE Workspace / Automation SCCM Digitaler IT-Arbeitsplatz Browser WIN 10 Citrix 3D Print Testing PwR Mobile Reise
  • 5. 5 Service App StoreWorkspace Optimization Predictive Service Delivery Platform AUTOMATION How RES Software Brings Agility to Your Workforce RES ONE Automation RES ONE Workspace RES ONE Service Store RES ONE Automation ITSM, PCLM MDM Virtualization SaaS, IaaS Automation Packs
  • 6. 6
  • 7. 7 Centrally manage and secure your workforce’s apps and services across even the most complex virtual and physical environments
  • 8. 8 Centralized Management Console • Manage all user settings, policies, configurations and more from a single console • Make changes and updates easily • Full auditing of all administrative actions • Detailed administrative delegation capabilities
  • 9. 9 Advanced Configuration • Dynamic, just-in-time configuration • File types, e-mail settings and data sources • Application actions o Drive and Port Mappings o Printers o Registry Settings and Policies o Profile and Home Directory o Folder Sync o Automation o PC Lifecycle Management
  • 10. 10 Context Awareness • Dynamically adapt a user’s workspace based on context, ensuring proper access to printers, data, and apps based on their real-time working conditions • Apply policy rules ranging from very broad to very granular factors for increased security Active Directory Computer Configuration Network Remote Desktop Site Hardware (CPU speed, memory) Environment Variable Computer Name IP Address (IP address, range) Group Membership IP Address Files & Folders (file version, folder exists) IP Address (IP address, range) Client Name Organizational Unit Membership Name FIPS Compliancy Remote Host/URL Client Type (Citrix Receiver only) User Property Operating System (Bit ) version Hardware Token (serial #, vendor ID, USB) Terminal Server Listener Name Session Type USB Storage Device (serial #, vendor ID) Operating System (Bit ) version Wireless (Connected (SSID) or nearest access point (BSSID)) Terminal Server Listener Name Registry Setting VDX / Workspace Extender
  • 11. 11 Usage Tracking and Auditing • Real-time and historical usage reporting • Control licenses based on actual usage • Minimize time spent on audits • Reduce overspending on licenses • Prove compliance
  • 12. 12 Adaptive Security • Prevent vulnerabilities across all sources o Careless users are as large of risks as malicious external threats • People-centric o Dynamically secure services based on user context • Flexible security levels o Adjust security at granular level to meet the needs of the organization o Based on user, span from total lock down to fully open Examples: • Data & USB Storage • Privilege management • Application access, including user installed applications • Web access and usage • Network-based/IP restrictions
  • 13. 13 Adaptive Security (cont.) Protect from internal and external threats: • File Hash based application security • Whitelisting/blacklisting • Dynamic privileges • User-installed apps • Context aware policy enforcement • USB storage control • Read-only blanketing • Lockdown
  • 14. 14 Step-by-Step Transformation with RES Unmanaged Live Desktop Environment Collect Data (Desktop Sampler) Analyze Data (Workspace Designer) Partly Managed Desktop (Workspace Model) Fully Managed (Workspace) Predict Future Changes (Workspace Simulation)
  • 15. 15
  • 16. 16 Drive competitive advantage by automating the delivery and return of business and IT services
  • 17. 17 Extensive Out-of-the-Box Tasks • Over 270 Tasks & Activities o Configuration o Provisioning o Virtualization o Security o Advanced o System State o Cloud Provisioning o Infrastructure as a Service o PC Life Cycle Management o Service Desk Integration o Mobile Device Management • Heterogeneous Support o Windows o Unix o Linux o Mac OSX Quick implementation and easy automation management
  • 18. 18 Extending Your Existing Investments Free Automation Packs • Extensible via APIs & Web Services • Integrates with o EMM/MDM o ITSM o PLCM o SaaS o Virtualization / Cloud provisioning
  • 20. 20
  • 21. 21 Transform the digital experience of your workforce with an automated, intuitive service app store
  • 22. 22 Intuitive Self Service Interface • View active and available services offered through the RES ONE Service Store • Services can be both IT and non-IT related (i.e., business process related) • Easily customizable (language, logo, colors)
  • 23. 23 Access Service Store from Various Devices • Service Store Web Front • New Mobile UI (Free Download) Workforce v Easily view, request and manage available corporate applications and services from iOS and Android devices. Managers v Easily use apps to approve requests for apps & services, and order relevant apps & services on behalf of employees.
  • 24. 24 Simplified Visual Workflow • IT can quickly automate business workflow processes • Business logic & IT process information are stored to determine what should happen during the delivery and return workflow
  • 25. 25 Identity and Classification • Personalization of Services with Identity Warehouse • Identity warehouse collects information from HR & Payroll systems to determine the “identity” of a person • 80% of services can be predicted automatically
  • 26. 26 Subscription Engine • Easily track service status • Service workflows • Can be triggered manually or automatically • Services can be automatically delivered & returned • On Day 1 or when employees transition to ensure proper and secure offboarding
  • 27. 27 Delegation via Service Panel • Enables Delegation of Requests • Managers or designated users can request services on behalf of others • Empowers Business, User and Service Desk to Do More
  • 31. 31 © 2016 RES SOFTWARE – ALL RIGHTS RESERVED Use Cases Alle Prozesse und Abläufe, die sich über die IT abbilden lassen und deren Ursprung originär nicht unbedingt in der IT liegen muss. Abläufe werden auf das wesentliche reduziert, beschleunigt und bleiben transparent, sowie nachvollziehbar. No Limits