SlideShare a Scribd company logo
Enterprise Licensing Agreement
Saves You More Than Money
Adam Smith & Sarah Olsen
This information is confidential, proprietary, and only for use by the intended recipient and may
not be disclosed, published, or redistributed without the prior written consent of Ivanti, Inc.
Legal fun 😉
Discussions topics
 Why now
 What issues
 Unified IT
 Variations on enterprise licensing
 Q & A
 Quick Review
Why Consolidate?
Are we
operationally
efficient?
How do I
deliver service?
What are my assets
costing me?
Can I leverage data
from my other systems?
Are my devices
protected?
Are my devices
managed?
As s e t
H e l p
D e s k
VDI
I n n o v a t i o n
M i g r a t i o n s
Cloud
S e r v e r
S e r v i c e
M a n a g e m e n t
G R C
M o b i l e
Security
Patch
AV D e s k t o p
Evolution of IT
Less Time to Be Strategic
Slow To Respond
Too Many Vendors / ToolsLower User Satisfaction
Increased Risk
Are any of these your priorities for this year?
More with less Skills Investments
• Cut costs and innovate
• Consolidate IT
infrastructure and
applications
• Create competency center
for business process skills
• Build processes and skills
for managing partnerships
• Plan for new competencies
• Migrate toward a real-time
infrastructure
• Invest in mid-term
opportunities and pull back
from short-term expedients
More with less Skills Investments
Are any of these your priorities for this year?
Or how about these?
More with less Skills Investments
Right Tools Security/Governance Visibility
• Software tools with more
functionality than you need,
but that aren’t solving your
problems
• Using outdated tools
• Accidental security threats
• Circumvention of corporate
policy
• Shadow IT
• CIOs may not have full
visibility into the challenges
happening at this level
• Data in too many different
places
IT teams operating in silos
Unified IT
Service
Device
Security
Asset
Identity
Ivanti’s Unified IT Capabilities
Discovery • Reporting • Analytics • Automation
Cloud or On-Premises
IT Asset
Management
Hardware Asset
Management
Software Asset
Management
License
Optimization
Audit Defence
Lifecycle
Management
IT Service
Management
Full ITSM /
ITIL/ ESM
Voice Automation
/ Telephony
Self-Service,
Request & Catalog
Change and
CMDB
Project Portfolio &
Financial Management
Operational
Security
AV /
Anti-Malware
Patch
Management
Device and
App Control
Privilege
Management
Secure
Configuration
Manage All
Devices
OS Migration
& Updates
File Access &
Synchronization
Software
Distribution
User Profile &
Personalization
Unified
Endpoint
Management
Identity Lifecycle
Management
Policy and Role
Management
Entitlements
Management
Access Request
Identity
Identity Workflow
& Fulfilment-
Operational Security Unified Endpoint IT Asset IT Service Identity
Ivanti Cloud & Unifying Solutions
Endpoint Security
--------
Software Firewall
Secure Config. Mgmt.
Remote Control
Network Isolation
Ransomware Remediation
SIEM Integration
DevOps Integration
AV Management
Fileless Malware Protect
Plus features from following:
Software Asset
Management
--------
Software License Mgmt.
Effective License Position
License Optimization
Forecasting, Modeling & What If
Analysis
Normalization & Reconciliation
SW Audit Defense
SW License Usage Tracking
SW License Reclamation
SW Compliance Monitoring
B2B Connectors
Hardware Asset
Management
--------
Asset Lifecycle Mgmt.
Barcoding/RFID
Warranty & Lease Mgmt.
Contract Mgmt.
Disposal
Asset Request Catalog
B2B Connectors
Help Desk
--------
Incident
Request
Knowledge
Multi-channel Self-Service
Service Catalog
Mobile Support
Workflow Automation
Marketplace
Password Director
--------
Self-Service Reset
Self & Mass-Enrollment
Multi-Authentication
Service Desk Integration
Service Management
--------
Workflow & Process Automation
Project Portfolio
Problem
Change
Service Asset & Config.
Release & Deployment
Service Level
Service Portfolio
Financial
CMDB
Voice Automation
Telephony Integration
Plus features from following:
Identity Director
--------
Identity Lifecycle Mgmt.
Manage Employee, Contractor,
Temp Workers
Identity Warehouse
Aggregates Multiple Sources
Multiple Personas
Policy & Role Mgmt.
Entitlement Catalog
Access Request & Cert.
Self-Service
Delegate Admin.
Real-time Feedback
Remediation & Reconciliation
Identity Workflow & Fulfillment
Dynamic & Static Approvals
Direct & Indirect Fulfillment
Automated Entitlement
Automated Provision &
Deprovision
User-initiated Entitlement
Connector Marketplace
Products & Functions
Application Control
--------
White listing
Privilege Mgmt.
App Reputation
Patch Management
--------
Win, Mac, Linux, Unix, Virtual, 3rd
Party Apps
Online & Offline Patching
Patch Intelligence
User Workspace
Management
--------
Virtual Workspace Mgmt.
Profile Migration & Roaming
Desktop/App Personalization
File Access & Synch
User Environment Control
User Experience Optimization
Group Policy Replacement
Config/Policy Enforcement
Unified Endpoint
Management
--------
Modern Management
PC & Mobile Mgmt.
OS Provision, Migrate, Update
Software Package, Distribution &
Rollout
Apple VPP & DEP
Power Management
Alerting & Monitoring
Mobile Provisioning & Mgmt.
Device Location Tracking
Remote Lock/Wipe/Access
Jailbreak Detect/Block
Device Control
--------
Device Whitelisting
Data Copy Restrictions
Temporary Access
Unified IT ELA
More predictable budgets
$
Overcome vendor fatigue
Easier to show ROI
Lower per user cost of IT Operations Management
Pick and choose
Don’t have to go back for more
Examples of Unified IT
Windows 10 Migration & Maintenance
Security Isolation & Remediation
On/Off-boarding
Software Request
Smart Advisors - Windows Lifecycle
Windows 10 Migration & Maintenance
Security Isolation & Remediation
On/Off-boarding
Software Request
Smart Advisors - Windows Lifecycle
Security Isolation and Remediation
3. Remote control
to investigate
2. Alert to
Service
Management
4. Re-image to
remediate
1. Automatically
isolate and
blacklist
Malware
Detected
START
UEM
UWM
ITAM
ITSM
Security
IDD
✔UEM
UWM
ITAM
ITSM
Security
IDD
✔
✔UEM
UWM
ITAM
ITSM
Security
IDD
✔
UEM
UWM
ITAM
ITSM
Security
IDD
✔
✔
✔
Security Isolation and Remediation
3. Remote control
to investigate
2. Alert
Service
Management
4. Re-image to
remediate
1. Automatically
isolate and
blacklist
Malware
Detected
START
Windows 10 Migration & Maintenance
Security Isolation & Remediation
On/Off-boarding
Hub Software Request
Smart Advisors - Windows Lifecycle
On/Off Boarding
3. Accounts
changed
2. Hardware
requested
4. Software
changed
1. New accounts
createdEmployee
starts
START
UEM
UWM
ITAM
ITSM
Security
IDD
✔UEM
UWM
ITAM
ITSM
Security
IDD
✔
✔
UEM
UWM
ITAM
ITSM
Security
IDD✔
UEM
UWM
ITAM
ITSM
Security
IDD✔
✔
On/Off Boarding
3. Accounts
changed
2. Hardware
requested
4. Software
changed
1. New accounts
createdEmployee
starts
START
Variations on the ELA Theme
IT Asset
Management
Hardware Asset
Management
Software Asset
Management
License
Optimization
Audit Defence
Lifecycle
Management
Operational
Security
AV /
Anti-Malware
Patch
Management
Device and
App Control
Privilege
Management
Secure
Configuration
Pick 1
Policy and Role
Management
Entitlements
Management
Access Request
Identity
Identity Workflow
& Fulfilment-
Identity Lifecycle
Management
Manage All
Devices
OS Migration
& Updates
File Access &
Synchronization
Software
Distribution
User Profile &
Personalization
Unified
Endpoint
Management
IT Service
Management
Full ITSM /
ITIL/ ESM
Voice Automation
/ Telephony
Self-Service,
Request & Catalog
Change and
CMDB
Project Portfolio &
Financial Management
Pick 2
Operational
Security
AV /
Anti-Malware
Patch
Management
Device and
App Control
Privilege
Management
Secure
Configuration
Manage All
Devices
OS Migration
& Updates
File Access &
Synchronization
Software
Distribution
User Profile &
Personalization
Unified
Endpoint
Management
Policy and Role
Management
Entitlements
Management
Access Request
Identity
Identity Workflow
& Fulfilment-
Identity Lifecycle
Management
IT Service
Management
Full ITSM /
ITIL/ ESM
Voice Automation
/ Telephony
Self-Service,
Request & Catalog
Change and
CMDB
Project Portfolio &
Financial Management
IT Asset
Management
Hardware Asset
Management
Software Asset
Management
License
Optimization
Audit Defence
Lifecycle
Management
Pick 2
Policy and Role
Management
IT Asset
Management
Hardware Asset
Management
Software Asset
Management
License
Optimization
Audit Defence
Lifecycle
Management
Operational
Security
AV /
Anti-Malware
Patch
Management
Device and
App Control
Privilege
Management
Secure
Configuration
Manage All
Devices
OS Migration
& Updates
File Access &
Synchronization
Software
Distribution
User Profile &
Personalization
Unified
Endpoint
Management
Entitlements
Management
Access Request
Identity
Identity Workflow
& Fulfilment-
Identity Lifecycle
Management
IT Service
Management
Full ITSM /
ITIL/ ESM
Voice Automation
/ Telephony
Self-Service,
Request & Catalog
Change and
CMDB
Project Portfolio &
Financial Management
Pick 2
IT Asset
Management
Hardware Asset
Management
Software Asset
Management
License
Optimization
Audit Defence
Lifecycle
Management
IT Service
Management
Full ITSM /
ITIL/ ESM
Voice Automation
/ Telephony
Self-Service,
Request & Catalog
Change and
CMDB
Project Portfolio &
Financial Management
Operational
Security
AV /
Anti-Malware
Patch
Management
Device and
App Control
Privilege
Management
Secure
Configuration
Manage All
Devices
OS Migration
& Updates
File Access &
Synchronization
Software
Distribution
User Profile &
Personalization
Unified
Endpoint
Management
Policy and Role
Management
Entitlements
Management
Access Request
Identity
Identity Workflow
& Fulfilment-
Identity Lifecycle
Management
ELA for Education
Unified IT
Pick 2
Pick 1
–12.5%
Not just education – includes libraries & museums…
ELA for SMB
• Meant for 100 to 1,000 users
• Target products from each product family
• Two levels of discounts
ELA Extras
Ivanti Cloud
Xtraction
Connectors
Automation
Enterprise
Data
Services
Automation
Real-Time
Capabilities
Smart
Advisors
Ivanti
Connectors
Top 10
3rd Party
Connectors
Dozens of
3rd Party
Connectors
Ivanti
Connectors
Unlimited
Viewers
Q & A
Q & A
1. Subscription, but for how long? ……
2. User vs. node? ……
3. Premise or cloud-based subscription? ……
4. What about true ups? ……
5. Will my price go up? ……
6. Need additional analysts or servers? ……
7. Available through partners? ……
8. How do I sign up for an ELA? ……
2-3 years
1 to 3 for node based
Premise + uplift for cloud-based
True-forward
Price protected
As an add-on
Yes–absolutely!
Sales Rep or Channel Partner
Quick Review
ELA key takeaways
Reasons for Enterprise License Unified IT ELA
ELA Variations
• Unified IT
• Pick 2
• Pick 1
• Education
• SMB
ELA Extras
Asset ServiceSecurity UEM Identity
$
Ivanti Cloud
Xtraction
Connectors
Automation
Enterprise
Final Thoughts
Live Q & A

More Related Content

What's hot

Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing Model
Ivanti
 
Getting Started with IBM i Security: User Privileges
Getting Started with IBM i Security: User PrivilegesGetting Started with IBM i Security: User Privileges
Getting Started with IBM i Security: User Privileges
HelpSystems
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
Hitachi ID Systems, Inc.
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
IBM Sverige
 
Common 2009 Getting Started On The Road To Compliance
Common 2009   Getting Started On The Road To ComplianceCommon 2009   Getting Started On The Road To Compliance
Common 2009 Getting Started On The Road To Compliance
imigrnt
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with Symantec
Arrow ECS UK
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
IBM Security
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
Symantec
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
HelpSystems
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guide
support_cyberoam
 
The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful Users
HelpSystems
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
Nis
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Lance Peterman
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
Symantec
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
Arrow ECS UK
 
CyberArk
CyberArkCyberArk
CyberArk
Jimmy Sze
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
Symantec
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
IBM Security
 

What's hot (20)

Ivanti New Pricing Model
Ivanti New Pricing ModelIvanti New Pricing Model
Ivanti New Pricing Model
 
Getting Started with IBM i Security: User Privileges
Getting Started with IBM i Security: User PrivilegesGetting Started with IBM i Security: User Privileges
Getting Started with IBM i Security: User Privileges
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Hitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security AnalysisHitachi ID Password Manager Security Analysis
Hitachi ID Password Manager Security Analysis
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Common 2009 Getting Started On The Road To Compliance
Common 2009   Getting Started On The Road To ComplianceCommon 2009   Getting Started On The Road To Compliance
Common 2009 Getting Started On The Road To Compliance
 
IT GRC with Symantec
IT GRC with SymantecIT GRC with Symantec
IT GRC with Symantec
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
The Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without AutomationThe Cost of Managing IBM i Without Automation
The Cost of Managing IBM i Without Automation
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
Cyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guideCyberoam ssl vpn_management_guide
Cyberoam ssl vpn_management_guide
 
The Dark Side of Powerful Users
The Dark Side of Powerful UsersThe Dark Side of Powerful Users
The Dark Side of Powerful Users
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015Privileged Access Management - Unsticking Your PAM Program - CIS 2015
Privileged Access Management - Unsticking Your PAM Program - CIS 2015
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
 
CyberArk
CyberArkCyberArk
CyberArk
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 

Similar to What's New with Ivanti’s Enterprise Licensing Agreement?

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
Ivanti
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
danhsmith
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
Imperva
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Andris Soroka
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
jasonlan
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
Agora Group
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
NetIQ
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
dawnrk
 
360 Retail IT Management
360 Retail IT  Management360 Retail IT  Management
360 Retail IT Management
MindShare Services P Ltd.
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
Ivanti
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
Jad Bejjani
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
Joseph Mark Heinzen
 
Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti
 
How to Best Prepare for a Software Audit
How to Best Prepare for a Software AuditHow to Best Prepare for a Software Audit
How to Best Prepare for a Software Audit
Ivanti
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
Ivanti
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
CrispnCrunch
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Eric Vétillard
 

Similar to What's New with Ivanti’s Enterprise Licensing Agreement? (20)

Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
Path Maker Security Presentation
Path Maker Security PresentationPath Maker Security Presentation
Path Maker Security Presentation
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Information Security
Information SecurityInformation Security
Information Security
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Microsoft+securitate agora-rtm
Microsoft+securitate agora-rtmMicrosoft+securitate agora-rtm
Microsoft+securitate agora-rtm
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
360 Retail IT Management
360 Retail IT  Management360 Retail IT  Management
360 Retail IT Management
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020
 
How to Best Prepare for a Software Audit
How to Best Prepare for a Software AuditHow to Best Prepare for a Software Audit
How to Best Prepare for a Software Audit
 
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
OSB140: Want a Safer Network? You Can Remove Local Admin Rights with Ivanti A...
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 

More from Ivanti

Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________
Ivanti
 
Patch Tuesday de Junio
Patch Tuesday de JunioPatch Tuesday de Junio
Patch Tuesday de Junio
Ivanti
 
Patch Tuesday Italia Giugno
Patch Tuesday Italia GiugnoPatch Tuesday Italia Giugno
Patch Tuesday Italia Giugno
Ivanti
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
Ivanti
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
Ivanti
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
Ivanti
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
Ivanti
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
Ivanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
Ivanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
Ivanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
Ivanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
Ivanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
Ivanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
Ivanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
Ivanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
Ivanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
Ivanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
Ivanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
Ivanti
 

More from Ivanti (20)

Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________Français Patch Tuesday - Juin___________
Français Patch Tuesday - Juin___________
 
Patch Tuesday de Junio
Patch Tuesday de JunioPatch Tuesday de Junio
Patch Tuesday de Junio
 
Patch Tuesday Italia Giugno
Patch Tuesday Italia GiugnoPatch Tuesday Italia Giugno
Patch Tuesday Italia Giugno
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 

Recently uploaded

存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 

Recently uploaded (20)

存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 

What's New with Ivanti’s Enterprise Licensing Agreement?

  • 1. Enterprise Licensing Agreement Saves You More Than Money Adam Smith & Sarah Olsen
  • 2. This information is confidential, proprietary, and only for use by the intended recipient and may not be disclosed, published, or redistributed without the prior written consent of Ivanti, Inc. Legal fun 😉
  • 3. Discussions topics  Why now  What issues  Unified IT  Variations on enterprise licensing  Q & A  Quick Review
  • 5. Are we operationally efficient? How do I deliver service? What are my assets costing me? Can I leverage data from my other systems? Are my devices protected? Are my devices managed?
  • 6. As s e t H e l p D e s k VDI I n n o v a t i o n M i g r a t i o n s Cloud S e r v e r S e r v i c e M a n a g e m e n t G R C M o b i l e Security Patch AV D e s k t o p Evolution of IT Less Time to Be Strategic Slow To Respond Too Many Vendors / ToolsLower User Satisfaction Increased Risk
  • 7. Are any of these your priorities for this year? More with less Skills Investments • Cut costs and innovate • Consolidate IT infrastructure and applications • Create competency center for business process skills • Build processes and skills for managing partnerships • Plan for new competencies • Migrate toward a real-time infrastructure • Invest in mid-term opportunities and pull back from short-term expedients
  • 8. More with less Skills Investments Are any of these your priorities for this year?
  • 9. Or how about these? More with less Skills Investments Right Tools Security/Governance Visibility • Software tools with more functionality than you need, but that aren’t solving your problems • Using outdated tools • Accidental security threats • Circumvention of corporate policy • Shadow IT • CIOs may not have full visibility into the challenges happening at this level • Data in too many different places IT teams operating in silos
  • 12.
  • 13. Ivanti’s Unified IT Capabilities Discovery • Reporting • Analytics • Automation Cloud or On-Premises IT Asset Management Hardware Asset Management Software Asset Management License Optimization Audit Defence Lifecycle Management IT Service Management Full ITSM / ITIL/ ESM Voice Automation / Telephony Self-Service, Request & Catalog Change and CMDB Project Portfolio & Financial Management Operational Security AV / Anti-Malware Patch Management Device and App Control Privilege Management Secure Configuration Manage All Devices OS Migration & Updates File Access & Synchronization Software Distribution User Profile & Personalization Unified Endpoint Management Identity Lifecycle Management Policy and Role Management Entitlements Management Access Request Identity Identity Workflow & Fulfilment-
  • 14. Operational Security Unified Endpoint IT Asset IT Service Identity Ivanti Cloud & Unifying Solutions Endpoint Security -------- Software Firewall Secure Config. Mgmt. Remote Control Network Isolation Ransomware Remediation SIEM Integration DevOps Integration AV Management Fileless Malware Protect Plus features from following: Software Asset Management -------- Software License Mgmt. Effective License Position License Optimization Forecasting, Modeling & What If Analysis Normalization & Reconciliation SW Audit Defense SW License Usage Tracking SW License Reclamation SW Compliance Monitoring B2B Connectors Hardware Asset Management -------- Asset Lifecycle Mgmt. Barcoding/RFID Warranty & Lease Mgmt. Contract Mgmt. Disposal Asset Request Catalog B2B Connectors Help Desk -------- Incident Request Knowledge Multi-channel Self-Service Service Catalog Mobile Support Workflow Automation Marketplace Password Director -------- Self-Service Reset Self & Mass-Enrollment Multi-Authentication Service Desk Integration Service Management -------- Workflow & Process Automation Project Portfolio Problem Change Service Asset & Config. Release & Deployment Service Level Service Portfolio Financial CMDB Voice Automation Telephony Integration Plus features from following: Identity Director -------- Identity Lifecycle Mgmt. Manage Employee, Contractor, Temp Workers Identity Warehouse Aggregates Multiple Sources Multiple Personas Policy & Role Mgmt. Entitlement Catalog Access Request & Cert. Self-Service Delegate Admin. Real-time Feedback Remediation & Reconciliation Identity Workflow & Fulfillment Dynamic & Static Approvals Direct & Indirect Fulfillment Automated Entitlement Automated Provision & Deprovision User-initiated Entitlement Connector Marketplace Products & Functions Application Control -------- White listing Privilege Mgmt. App Reputation Patch Management -------- Win, Mac, Linux, Unix, Virtual, 3rd Party Apps Online & Offline Patching Patch Intelligence User Workspace Management -------- Virtual Workspace Mgmt. Profile Migration & Roaming Desktop/App Personalization File Access & Synch User Environment Control User Experience Optimization Group Policy Replacement Config/Policy Enforcement Unified Endpoint Management -------- Modern Management PC & Mobile Mgmt. OS Provision, Migrate, Update Software Package, Distribution & Rollout Apple VPP & DEP Power Management Alerting & Monitoring Mobile Provisioning & Mgmt. Device Location Tracking Remote Lock/Wipe/Access Jailbreak Detect/Block Device Control -------- Device Whitelisting Data Copy Restrictions Temporary Access
  • 15. Unified IT ELA More predictable budgets $ Overcome vendor fatigue Easier to show ROI Lower per user cost of IT Operations Management Pick and choose Don’t have to go back for more
  • 17. Windows 10 Migration & Maintenance Security Isolation & Remediation On/Off-boarding Software Request Smart Advisors - Windows Lifecycle
  • 18. Windows 10 Migration & Maintenance Security Isolation & Remediation On/Off-boarding Software Request Smart Advisors - Windows Lifecycle
  • 19. Security Isolation and Remediation 3. Remote control to investigate 2. Alert to Service Management 4. Re-image to remediate 1. Automatically isolate and blacklist Malware Detected START
  • 20.
  • 21. UEM UWM ITAM ITSM Security IDD ✔UEM UWM ITAM ITSM Security IDD ✔ ✔UEM UWM ITAM ITSM Security IDD ✔ UEM UWM ITAM ITSM Security IDD ✔ ✔ ✔ Security Isolation and Remediation 3. Remote control to investigate 2. Alert Service Management 4. Re-image to remediate 1. Automatically isolate and blacklist Malware Detected START
  • 22. Windows 10 Migration & Maintenance Security Isolation & Remediation On/Off-boarding Hub Software Request Smart Advisors - Windows Lifecycle
  • 23. On/Off Boarding 3. Accounts changed 2. Hardware requested 4. Software changed 1. New accounts createdEmployee starts START
  • 24.
  • 26. Variations on the ELA Theme
  • 27. IT Asset Management Hardware Asset Management Software Asset Management License Optimization Audit Defence Lifecycle Management Operational Security AV / Anti-Malware Patch Management Device and App Control Privilege Management Secure Configuration Pick 1 Policy and Role Management Entitlements Management Access Request Identity Identity Workflow & Fulfilment- Identity Lifecycle Management Manage All Devices OS Migration & Updates File Access & Synchronization Software Distribution User Profile & Personalization Unified Endpoint Management IT Service Management Full ITSM / ITIL/ ESM Voice Automation / Telephony Self-Service, Request & Catalog Change and CMDB Project Portfolio & Financial Management
  • 28. Pick 2 Operational Security AV / Anti-Malware Patch Management Device and App Control Privilege Management Secure Configuration Manage All Devices OS Migration & Updates File Access & Synchronization Software Distribution User Profile & Personalization Unified Endpoint Management Policy and Role Management Entitlements Management Access Request Identity Identity Workflow & Fulfilment- Identity Lifecycle Management IT Service Management Full ITSM / ITIL/ ESM Voice Automation / Telephony Self-Service, Request & Catalog Change and CMDB Project Portfolio & Financial Management IT Asset Management Hardware Asset Management Software Asset Management License Optimization Audit Defence Lifecycle Management
  • 29. Pick 2 Policy and Role Management IT Asset Management Hardware Asset Management Software Asset Management License Optimization Audit Defence Lifecycle Management Operational Security AV / Anti-Malware Patch Management Device and App Control Privilege Management Secure Configuration Manage All Devices OS Migration & Updates File Access & Synchronization Software Distribution User Profile & Personalization Unified Endpoint Management Entitlements Management Access Request Identity Identity Workflow & Fulfilment- Identity Lifecycle Management IT Service Management Full ITSM / ITIL/ ESM Voice Automation / Telephony Self-Service, Request & Catalog Change and CMDB Project Portfolio & Financial Management
  • 30. Pick 2 IT Asset Management Hardware Asset Management Software Asset Management License Optimization Audit Defence Lifecycle Management IT Service Management Full ITSM / ITIL/ ESM Voice Automation / Telephony Self-Service, Request & Catalog Change and CMDB Project Portfolio & Financial Management Operational Security AV / Anti-Malware Patch Management Device and App Control Privilege Management Secure Configuration Manage All Devices OS Migration & Updates File Access & Synchronization Software Distribution User Profile & Personalization Unified Endpoint Management Policy and Role Management Entitlements Management Access Request Identity Identity Workflow & Fulfilment- Identity Lifecycle Management
  • 31. ELA for Education Unified IT Pick 2 Pick 1 –12.5% Not just education – includes libraries & museums…
  • 32. ELA for SMB • Meant for 100 to 1,000 users • Target products from each product family • Two levels of discounts
  • 34. Q & A
  • 35. Q & A 1. Subscription, but for how long? …… 2. User vs. node? …… 3. Premise or cloud-based subscription? …… 4. What about true ups? …… 5. Will my price go up? …… 6. Need additional analysts or servers? …… 7. Available through partners? …… 8. How do I sign up for an ELA? …… 2-3 years 1 to 3 for node based Premise + uplift for cloud-based True-forward Price protected As an add-on Yes–absolutely! Sales Rep or Channel Partner
  • 37. ELA key takeaways Reasons for Enterprise License Unified IT ELA ELA Variations • Unified IT • Pick 2 • Pick 1 • Education • SMB ELA Extras Asset ServiceSecurity UEM Identity $ Ivanti Cloud Xtraction Connectors Automation Enterprise
  • 39. Live Q & A