SlideShare a Scribd company logo
Well Managed Systems
    Endpoint Management and Mobility



Well Managed Systems                   1
Agenda


          1       Key trends that are changing how we work

          2       Solutions and conversation starters

          3       Resonate with C-Level IT




Well Managed Systems                                         2
The Traditional Desktop World No Longer Exists

Well Managed Systems                                 3
Struggling with New Perceptions and Technology


                                                                                                    End Users


                                                                                                   Technology


> End Users Expect More                     > Rapid Technology Changes                    > IT Can’t Keep Pace
•49% of millenials want to choose their     •By the end of 2011, there will be 120        •The office is now a technological bone
own technology in the workplace             million more combined smartphones and         yard where you're perpetually trapped
                                            tablets shipped worldwide than PCs            about three years in the past
•32% of employees globally now rely on
more than one device during their typical   •By the end of 2011, there will be over 1.3   •Work and life should not require such a
workday.                                    million apps on smartphones and tablets       change in gears in order to communicate
                                            versus 75 thousand on PCs                     with one another
•61% of employees don’t believe they need
to be in the office to be productive

 Well Managed Systems                                                                                                                4
Key Trends that are Changing How We Work
                       Embrace Personally-owned and Unmanaged
Info/App Only Access




                                                                                                       Evolving
                                                                                                         Focus
                         Unmanaged




                                                                              246M Corp PCs
                                                                              293M Personal PCs                   Relevent
                                                                              819M Smartphones                    Devices
                                                                              116M Tablets                         Today


                                                                                                                  Future
                                                                                                                  Devices
                                                      177M Corp PCs
Full Control

                         Managed




                                                      300M Smarphones
                                                      15M Tablets

                                     Traditional
                                     Focus

                                              Corporate-Owned                       Personally-Owned

                                                                    Devices
                       Well Managed Systems                                                                           5
What it Means to the End User

     LEVERAGE THE DEVICES THAT   FASTER ACCESS TO APPLICATIONS
               WORK FOR THEM     AND CONTENT




       TRANSPARENT BOUNDARY      GREATER PRODUCTIVITY,
      BETWEEEN WORK AND PLAY     BETTER BUSINESS RESULTS




Well Managed Systems                                         6
What it Means to the IT Industry

              INCREASINGLY DIFFICULT   CAN’T KEEP PACE WITH
       TO DRIVE EFFICIENCY AND SCALE   NEW TECHNOLOGIES




LIMITED SOLUTIONS THAT PROTECT DATA    CAN’T MANAGE AT THE LOWEST COST
             AND ENSURE COMPLIANCE     WITH HIGHEST PERFORMANCE




    Well Managed Systems                                         7
Symantec Addresses These Challenges

     Trend             IT Challenges                                          Symantec Solution

                       • Enterprise activation and provisioning          • Enterprise policy management and controls
                       • Application certification, control & delivery   • Secure application provisioning, access and
                                                                           collaboration
                       • Enterprise security policy enforcement
                                                                         • Mobile malware threat protection


                                                                         • Application delivery across physical and multi-
                   • “End-user computing environment” sprawl
                                                                           layered virtualization
                   • Application provisioning and management
                                                                         • Heterogeneous configuration management –
                   • Performance and availability                          across virtual and physical


                   • Increasing Mac adoption forcing support             • Multi-platform management with specific Mac
                   • Facilitating the move to Microsoft®                   based guidelines
                     Windows 7                                           • Best of breed migration tools and virtualization
                                                                           to drive OS migrations




Well Managed Systems                                                                                                          8
Conversation 1:
    Tackling Mobility




Well Managed Systems    9
Enterprise Challenges
4 Major Pain Points
       Explosion of                New Apps Must     Increased Risk       Infrastructure
       New Devices                  Be Supported      of Data Loss             Silos
   • How do I            • How do I manage         • How do I protect   • Who will own
     enterprise-activate application                 corporate            enterprise
     these devices?        deployment &              secrets, protect     mobility?
                           associated costs?         the brand &
                                                     comply with
                                                     regulations?




       1B+ SmartPhones / Tablets
               by 2014




Well Managed Systems                                                                       10
Protecting People, Information & Devices

• Delivers enterprise policy and
  configuration management
  across heterogeneous mobile
  platforms

• Authenticates people and
  devices accessing authorized
  applications and data

• Secures information and devices
  against the evolving mobile
  threat landscape


Well Managed Systems                       11
Mobile Device Management and Security
A New Approach - End To End Mobility


              Enterprise                    Secure                      Information
                Policy                      Access                       Protection




    • Security and Compliance    • Strong authentication        • DLP and Messaging Security
    • Application Management     • Complete PKI/OTP lifecycle   • Data Encryption
    • Configuration Management   • Authentication for app       • Threat Protection

                                    Enterprise Integration


     Endpoint                         Security                          Business
      Management                        Infrastructure                   Processes


Well Managed Systems                                                                           12
Conversation 2:
    Leveraging Virtualization




Well Managed Systems            13
Enterprise Challenges
4 Major Pain Points
         VDI               Unmanaged               License            Windows 7
      Enablement              PCs                Compliance           Migration
 • How do I simplify    • How do I manage     • How do I ensure   • How do I make the
   and accelerate VDI     software and          compliance and      transition as easy
   deployments            maintain control?     optimize costs?     as possible for me
                                                                    and the users




Well Managed Systems                                                                 14
Automating Delivery and Optimizing Costs

• On-demand delivery of
  applications to any PC:
    • Physical or Virtual (VDI)
    • Local or Remote
    • Managed or Unmanaged

• Clear containment of apps to
  maximize flexibility and minimize
  helpdesk calls and downtime
                                      Dynamic Workspace Configuration
• Real-time license management
  eases management and
  compliance while optimizing cost

Well Managed Systems                                                15
Conversation 3:
    OS Diversity in the Enterprise




Well Managed Systems                 16
Enterprise Challenges
4 Major Pain Points
         Executive                 Too Many                  Lack of
                                                                                   Higher Costs
         Pressure                Windows Apps             Specialization
   • How can I resist          • How can I deliver • Do I have to hire          • How can I
     executive                   the same services new talent? How                manage these
     pressures to                and applications    I can retrain my             systems without
     support Macs?               without new         Windows-centric              breaking the
                                 development?        administrators?              bank?




      Macs in the Enterprise
      set to double by 2013

                                  In 2012 the typical
                                                          Experienced vendors
                                organization will amass
                                                          may have checklists
                                 more OS-neutral than
     Symantec IT announces                                and other job aids.
                                 Windows applications
     Mac support June 2011



Well Managed Systems                                                                                17
Supporting a Diverse Client Environment with a Single
Pane of Glass

• Delivers enterprise configuration
  management for Mac from
  provisioning to ongoing support

• Reduces multiple consoles for
  supporting and patching
  heterogeneous client environment

• Assists Windows centric IT shops
  with the transition to Mac
  management, while providing a
  familiar look and feel for end-users

Well Managed Systems                                    18
Summary

Start a conversation with key hot topics that resonate with
C-Level IT and Desktop Operations



            Mobility                       Virtualization                      Mac
 • Hot topic on every CIO         • Virtualization is a critical   • Hot debate for desktop
   agenda                           factor in future client          operations
                                    infrastructures
 • Key starting point for Bring                                    • Mac in the enterprise now
   Your Own Device programs       • Essential element for            at 11% and growing rapidly
                                    supporting unmanaged
 • Entry point for broader                                         • Competitive differentiator
                                    systems
   client management                                                 over Microsoft
   discussions                    • Key technology for
                                    Windows 7 migrations




Well Managed Systems                                                                              19
Thank you!
    For more information, download:
      Whitepaper: Mobile Device Security

      Forrester Report: The Total Economic Impact Of Altiris™ IT
      Management Suite 7 From Symantec Multicompany Analysis
    Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Well Managed Systems                                                                                                                                                                        20

More Related Content

What's hot

Mobile frame data sheet
Mobile frame data sheetMobile frame data sheet
Mobile frame data sheet
MobileWorxs
 
Desktop Transformation
Desktop Transformation Desktop Transformation
Desktop Transformation
InnoTech
 
Ibm endpoint manager pulse
Ibm endpoint manager   pulseIbm endpoint manager   pulse
Ibm endpoint manager pulse
RMayo22
 
Flexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardmanFlexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardmanMicrosoft Singapore
 
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft Private Cloud
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2
Balaji Singh
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
Endeavour Software Technologies
 
Embrace private cloud with confidence
Embrace private cloud with confidenceEmbrace private cloud with confidence
Embrace private cloud with confidence
ManageEngine, Zoho Corporation
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...AIP Foundation
 
Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12
Wireless_Analytics
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration Strategies
Joe Honan
 
AMI MDM Service Offerings
AMI MDM Service OfferingsAMI MDM Service Offerings
AMI MDM Service Offerings
Infosys
 
BlackBerry Mobile Fusion
BlackBerry Mobile FusionBlackBerry Mobile Fusion
BlackBerry Mobile Fusion
SepiloguE18
 
Curated Computing
Curated Computing Curated Computing
Curated Computing
Dr. Jimmy Schwarzkopf
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft Singapore
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
Northernstar
 
Secure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed ServicesSecure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed ServicesRNelson20
 

What's hot (19)

Mobile frame data sheet
Mobile frame data sheetMobile frame data sheet
Mobile frame data sheet
 
Desktop Transformation
Desktop Transformation Desktop Transformation
Desktop Transformation
 
Ibm endpoint manager pulse
Ibm endpoint manager   pulseIbm endpoint manager   pulse
Ibm endpoint manager pulse
 
Flexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardmanFlexible workstyle windows roadmap for solution day matthew hardman
Flexible workstyle windows roadmap for solution day matthew hardman
 
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy WhitepaperMicrosoft India - System Center Desktop Virtualization Strategy Whitepaper
Microsoft India - System Center Desktop Virtualization Strategy Whitepaper
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Embrace private cloud with confidence
Embrace private cloud with confidenceEmbrace private cloud with confidence
Embrace private cloud with confidence
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
 
Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12
 
Windows7/8 Migration Strategies
Windows7/8 Migration StrategiesWindows7/8 Migration Strategies
Windows7/8 Migration Strategies
 
Mobco session
Mobco sessionMobco session
Mobco session
 
AMI MDM Service Offerings
AMI MDM Service OfferingsAMI MDM Service Offerings
AMI MDM Service Offerings
 
BlackBerry Mobile Fusion
BlackBerry Mobile FusionBlackBerry Mobile Fusion
BlackBerry Mobile Fusion
 
Curated Computing
Curated Computing Curated Computing
Curated Computing
 
Microsoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estoninaMicrosoft desktop virtualization_offerings - chris_estonina
Microsoft desktop virtualization_offerings - chris_estonina
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
 
Secure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed ServicesSecure Network Administration, Inc. ProActive IT Managed Services
Secure Network Administration, Inc. ProActive IT Managed Services
 

Viewers also liked

Build Resilient Private Cloud
Build Resilient Private CloudBuild Resilient Private Cloud
Build Resilient Private CloudSymantec APJ
 
2011 SMB Disaster Preparedness Report
2011 SMB Disaster Preparedness Report2011 SMB Disaster Preparedness Report
2011 SMB Disaster Preparedness ReportSymantec APJ
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONETechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONE
Robb Boyd
 
Cisco one partner roadshow cisco one smart licensing v10
Cisco one partner roadshow   cisco one smart licensing v10Cisco one partner roadshow   cisco one smart licensing v10
Cisco one partner roadshow cisco one smart licensing v10
Trinny Chacko
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy ciscoOpenSourceCamp
 

Viewers also liked (7)

Build Resilient Private Cloud
Build Resilient Private CloudBuild Resilient Private Cloud
Build Resilient Private Cloud
 
2011 SMB Disaster Preparedness Report
2011 SMB Disaster Preparedness Report2011 SMB Disaster Preparedness Report
2011 SMB Disaster Preparedness Report
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONETechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONE
 
Cisco one partner roadshow cisco one smart licensing v10
Cisco one partner roadshow   cisco one smart licensing v10Cisco one partner roadshow   cisco one smart licensing v10
Cisco one partner roadshow cisco one smart licensing v10
 
Cisco cloud strategy cisco
Cisco cloud strategy ciscoCisco cloud strategy cisco
Cisco cloud strategy cisco
 

Similar to Well Managed Systems - Endpoint Management and Mobility

Mobile Management
Mobile ManagementMobile Management
Mobile Management
Carahsoft
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
Windstream Enterprise
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Sverige
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
Omega Peripherals
 
Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2
Balaji Singh
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
Shetal Patel
 
Consumerization 5 Steps Ds
Consumerization 5 Steps DsConsumerization 5 Steps Ds
Consumerization 5 Steps Ds
Paul Crone
 
The Mobile Way Brochure
The Mobile Way BrochureThe Mobile Way Brochure
The Mobile Way Brochuremartgroot
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Sverige
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce
Pactera_US
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterGeneXus
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
Warpcare
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
Quest
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint Evolution
Carahsoft
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Dirk Nicol
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Sverige
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
Mobile March
 
Infrastructure Management Services
Infrastructure Management ServicesInfrastructure Management Services
Infrastructure Management Services
Netmagic Solutions Pvt. Ltd.
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and EndpointsSymantec
 

Similar to Well Managed Systems - Endpoint Management and Mobility (20)

Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Windstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data CenterWindstream Webinar: The Evolution of the Data Center
Windstream Webinar: The Evolution of the Data Center
 
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
IBM Smarter Business 2012 - BYOD: "So what?" – Enabling mobile and mixed endp...
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
 
Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2Challenges in adopting_mobility_v2
Challenges in adopting_mobility_v2
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
Consumerization 5 Steps Ds
Consumerization 5 Steps DsConsumerization 5 Steps Ds
Consumerization 5 Steps Ds
 
The Mobile Way Brochure
The Mobile Way BrochureThe Mobile Way Brochure
The Mobile Way Brochure
 
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nuIBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
IBM Smarter Business 2012 - 11 trender för Enterprise Mobile just nu
 
Siebel to Salesforce
Siebel to Salesforce Siebel to Salesforce
Siebel to Salesforce
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012WarpCare Enterprise Mobility Strategy Introduction 2012
WarpCare Enterprise Mobility Strategy Introduction 2012
 
Predicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile WorldPredicting the Future of Endpoint Management in a Mobile World
Predicting the Future of Endpoint Management in a Mobile World
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint Evolution
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011IBM Tivoli Endpoint Manager - PCTY 2011
IBM Tivoli Endpoint Manager - PCTY 2011
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
Infrastructure Management Services
Infrastructure Management ServicesInfrastructure Management Services
Infrastructure Management Services
 
[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints[Infographic]]Managing Assets and Endpoints
[Infographic]]Managing Assets and Endpoints
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 

Well Managed Systems - Endpoint Management and Mobility

  • 1. Well Managed Systems Endpoint Management and Mobility Well Managed Systems 1
  • 2. Agenda 1 Key trends that are changing how we work 2 Solutions and conversation starters 3 Resonate with C-Level IT Well Managed Systems 2
  • 3. The Traditional Desktop World No Longer Exists Well Managed Systems 3
  • 4. Struggling with New Perceptions and Technology End Users Technology > End Users Expect More > Rapid Technology Changes > IT Can’t Keep Pace •49% of millenials want to choose their •By the end of 2011, there will be 120 •The office is now a technological bone own technology in the workplace million more combined smartphones and yard where you're perpetually trapped tablets shipped worldwide than PCs about three years in the past •32% of employees globally now rely on more than one device during their typical •By the end of 2011, there will be over 1.3 •Work and life should not require such a workday. million apps on smartphones and tablets change in gears in order to communicate versus 75 thousand on PCs with one another •61% of employees don’t believe they need to be in the office to be productive Well Managed Systems 4
  • 5. Key Trends that are Changing How We Work Embrace Personally-owned and Unmanaged Info/App Only Access Evolving Focus Unmanaged 246M Corp PCs 293M Personal PCs Relevent 819M Smartphones Devices 116M Tablets Today Future Devices 177M Corp PCs Full Control Managed 300M Smarphones 15M Tablets Traditional Focus Corporate-Owned Personally-Owned Devices Well Managed Systems 5
  • 6. What it Means to the End User LEVERAGE THE DEVICES THAT FASTER ACCESS TO APPLICATIONS WORK FOR THEM AND CONTENT TRANSPARENT BOUNDARY GREATER PRODUCTIVITY, BETWEEEN WORK AND PLAY BETTER BUSINESS RESULTS Well Managed Systems 6
  • 7. What it Means to the IT Industry INCREASINGLY DIFFICULT CAN’T KEEP PACE WITH TO DRIVE EFFICIENCY AND SCALE NEW TECHNOLOGIES LIMITED SOLUTIONS THAT PROTECT DATA CAN’T MANAGE AT THE LOWEST COST AND ENSURE COMPLIANCE WITH HIGHEST PERFORMANCE Well Managed Systems 7
  • 8. Symantec Addresses These Challenges Trend IT Challenges Symantec Solution • Enterprise activation and provisioning • Enterprise policy management and controls • Application certification, control & delivery • Secure application provisioning, access and collaboration • Enterprise security policy enforcement • Mobile malware threat protection • Application delivery across physical and multi- • “End-user computing environment” sprawl layered virtualization • Application provisioning and management • Heterogeneous configuration management – • Performance and availability across virtual and physical • Increasing Mac adoption forcing support • Multi-platform management with specific Mac • Facilitating the move to Microsoft® based guidelines Windows 7 • Best of breed migration tools and virtualization to drive OS migrations Well Managed Systems 8
  • 9. Conversation 1: Tackling Mobility Well Managed Systems 9
  • 10. Enterprise Challenges 4 Major Pain Points Explosion of New Apps Must Increased Risk Infrastructure New Devices Be Supported of Data Loss Silos • How do I • How do I manage • How do I protect • Who will own enterprise-activate application corporate enterprise these devices? deployment & secrets, protect mobility? associated costs? the brand & comply with regulations? 1B+ SmartPhones / Tablets by 2014 Well Managed Systems 10
  • 11. Protecting People, Information & Devices • Delivers enterprise policy and configuration management across heterogeneous mobile platforms • Authenticates people and devices accessing authorized applications and data • Secures information and devices against the evolving mobile threat landscape Well Managed Systems 11
  • 12. Mobile Device Management and Security A New Approach - End To End Mobility Enterprise Secure Information Policy Access Protection • Security and Compliance • Strong authentication • DLP and Messaging Security • Application Management • Complete PKI/OTP lifecycle • Data Encryption • Configuration Management • Authentication for app • Threat Protection Enterprise Integration Endpoint Security Business Management Infrastructure Processes Well Managed Systems 12
  • 13. Conversation 2: Leveraging Virtualization Well Managed Systems 13
  • 14. Enterprise Challenges 4 Major Pain Points VDI Unmanaged License Windows 7 Enablement PCs Compliance Migration • How do I simplify • How do I manage • How do I ensure • How do I make the and accelerate VDI software and compliance and transition as easy deployments maintain control? optimize costs? as possible for me and the users Well Managed Systems 14
  • 15. Automating Delivery and Optimizing Costs • On-demand delivery of applications to any PC: • Physical or Virtual (VDI) • Local or Remote • Managed or Unmanaged • Clear containment of apps to maximize flexibility and minimize helpdesk calls and downtime Dynamic Workspace Configuration • Real-time license management eases management and compliance while optimizing cost Well Managed Systems 15
  • 16. Conversation 3: OS Diversity in the Enterprise Well Managed Systems 16
  • 17. Enterprise Challenges 4 Major Pain Points Executive Too Many Lack of Higher Costs Pressure Windows Apps Specialization • How can I resist • How can I deliver • Do I have to hire • How can I executive the same services new talent? How manage these pressures to and applications I can retrain my systems without support Macs? without new Windows-centric breaking the development? administrators? bank? Macs in the Enterprise set to double by 2013 In 2012 the typical Experienced vendors organization will amass may have checklists more OS-neutral than Symantec IT announces and other job aids. Windows applications Mac support June 2011 Well Managed Systems 17
  • 18. Supporting a Diverse Client Environment with a Single Pane of Glass • Delivers enterprise configuration management for Mac from provisioning to ongoing support • Reduces multiple consoles for supporting and patching heterogeneous client environment • Assists Windows centric IT shops with the transition to Mac management, while providing a familiar look and feel for end-users Well Managed Systems 18
  • 19. Summary Start a conversation with key hot topics that resonate with C-Level IT and Desktop Operations Mobility Virtualization Mac • Hot topic on every CIO • Virtualization is a critical • Hot debate for desktop agenda factor in future client operations infrastructures • Key starting point for Bring • Mac in the enterprise now Your Own Device programs • Essential element for at 11% and growing rapidly supporting unmanaged • Entry point for broader • Competitive differentiator systems client management over Microsoft discussions • Key technology for Windows 7 migrations Well Managed Systems 19
  • 20. Thank you! For more information, download: Whitepaper: Mobile Device Security Forrester Report: The Total Economic Impact Of Altiris™ IT Management Suite 7 From Symantec Multicompany Analysis Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Well Managed Systems 20