SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
Ensuring Rock Solid
Unified Endpoint
Management
Nathan O’Bryan
MVP: Office Servers and Services
MCSM: Messaging
@MCSMLab
https://www.mcsmlab.com
The Importance of
Unified Endpoint
Management in
the Cloud Era
BYOD is the standard
There is no standard device
Administrators can’t be experts with all platforms
Threats to an Enterprise organization can come from BYOD
devices
Having some level of control over BYOD devices is necessary
Multiple panes of glass to manage devices is a cumbersome
experience
Endpoint
Management
with Native
Office 365 tools
Exchange MDM is very limited
Azure AD Premium adds some conditional access features
Works with Windows 10, new limited function with older OSs
Intune adds device management features
Endpoint
Management
with Exchange
Allows administrators to require password
Complex passwords
Require encryption
Enforce password age
Azure AD
Premium
Conditional
Access
Requires Azure AD premium (additional subscription to Office
365)
Allows administrators to set some conditions for sign-in to
Office 365
Conditions include
• Group membership
• Location
• Device platform
• Lost or stolen devices
Endpoint
Management
with Intune
Microsoft’s top level cloud based MDM solution
Available as part of several different cloud packages
Has been quickly a quickly evolving product for the last
several years
Maturing
features
Many MDM features in the Microsoft cloud are still maturing
Multiple places where MDM features are controlled
Several “levels” of MDM features available depending on
subscription
Microsoft cloud portals are frequently updated
KACE Endpoint Systems
Management – Technical Overview
Confidential10
Endpoint systems management is difficult
Systems Management
Mixed environments, including BYOD
Inventory
New security threats
Remote-site management
Patching 3rd party software
License compliance
Deployment
Mobile device management
Windows 7/10 Migration
Strategic
projects
Road Warriors
Confidential11
Endpoint systems management: IT challenges
• I don’t know what I have or where it’s located.
• I don’t know how my devices are configured.
• My End-Users have Local Admin Rights.
• I don’t know what software is installed or how
it’s being used.
• I’m only patching with WSUS; What about 3rd
party applications?
• I have a diverse IT environment (Mac, Linux,
Chromebook, etc.).
• I cannot effectively manage road warriors.
Confidential12
Endpoint systems management lifecycle
• Image capture
• Zero touch OS
deployment
• Multicasting
• User state migration
• Remote site support
• Service desk
• User portal & self service
• Monitoring & alerting
• Remote control
• Mobile access
• Patch management
• Configuration
management
• Policy enforcement
• Vulnerability scanning
• Discovery & inventory
• Asset management
• Software distribution
• Reporting & compliance
Why KACE Endpoint Systems
Management?
There is a difference.
Confidential14
The KACE Difference
Fast Implementation Comprehensive
• From initial deployment to
ongoing maintenance,
management and support,
to retirement
• Supports Windows, Mac,
Chromebook, Linux, UNIX
• Supports “Road Warriors”
• For computers, servers,
mobile devices and
non-computing connected
devices
Simplified
• Comprehensive,
integrated all-in-one
solution
• Familiar tabbed user
interface, one click
upgrades
• Does not required
product specialists, DBA
or programming
• Physical or virtual
appliance, or SaaS
• Requires no additional
hardware or software
• No need for extensive
professional services
• Fully operational in
weeks, not months or
years
Confidential15
It’s in the packaging
KACE Endpoint Systems
Management
Reduced total cost of ownership
• Web based training
• No extensive professional services
• No dedicated equipment
• No dedicated personnel
• No scripting or DBA required
Traditional Software
Suites
High total cost of ownership
• Lengthy offsite training sessions
• Specialized dedicated personnel
• Complex upgrades
• Scripting required
• A la carte pricing
vs.
Confidential16
Optimize
application
experience
Modernize
infrastructure
for the cloud
Automate
complex
processes
Enable a
data-driven
business
TechValidate survey results
• 68% of surveyed IT organizations
have more accurate hardware
and software inventory to better
inform purchasing and maximize
use of existing assets as a result
of purchasing KACE K1000.
• 50% of surveyed IT
organizations have simplified
application distribution and
maintenance to ensure
applications are up to date and
secure as a result of purchasing
KACE.
• 53% of IT organizations chose
the KACE Systems
Deployment Appliance
because they were
overwhelmed by the amount
of manual chores to simply
keep operating systems up to
date and running.
• 70% of customers
implemented KACE in less
than 2 weeks.
• 76% of KACE customers
saw ROI in six months
or less
Solutions Architecture
Confidential18
Endpoint Systems Management (Device and User)
KACE Systems Management Appliance (K1000)
• Comprehensive Endpoint Management for laptops,
desktops, and servers, both physical
and virtual
KACE Systems Deployment Appliance (K2000)
• Integrated systems for OS and application
provisioning, migration and recovery
Desktop Authority Management Suite
• Centralized, secure management system for
Windows user environments that controls
users’ access to resources and applications
Confidential19
Zero touch Provisioning - It’s not just imaging
KACE Systems Deployment Appliance (K2000)
Automated driver
feed injection
• Images no longer dependent on drivers
• Images captured from a VM, or any make and model computer
can be deployed to any other make and model computers
Pre and post
install functions
• Run any application or tool before and after image deployment
• Automatically assign computer names, install selective applications
without creating more images, and join the domain
Automated
end-user profile
management
• Automatically capture End-User Profiles off-line and apply them to
new computers with no loss of data or personal configuration
• Automatically capture and deploy End User Profiles on the fly when
re-imaging computers
KACE Systems Deployment Appliance (K2000)
• Physical and Virtual Only
• VMware or Hyper-V
• Browser bases UI
• FreeBSD, Apache, MariaDB
• Images Windows and Mac
• Supports Multicast
Desktop
Laptop
Tablet
Server
K2000
(1) PXE Request
(2) K2000 info
(3) KBE Request
(6) Upload Image
(5) Image Request
Virtual RSA – Site 1
Site DHCP
or Scope Site 1
Site DHCP
or Scope
Virtual RSA – Site 2
Site 2
Pre-stage Payloads
* Based on Version 4.0
(4) Upload KBE
DHCP
KACE Systems Management Appliance (K1000)
Software Compliance
and Metering
• Dynamically track what’s installed, what you own,
and how much it’s being used
• Avoid Audits and penalties - reduce software spending
Software Deployment,
Upgrades and Removal
• Manage your computers without touching each one
Patch Management
beyond Windows
Multi-tenant Service Desk
• Track requests against users, Computers and any Asset
• No Cost – Any department can have its own system
Remote Control • VNC included – be there without going there
Centralized Reporting
• UI and menu driven
• DBA and Programming NOT required
Hardware and Software
Inventory & Asset Mgmt
• Always know what you have and how it’s configured
• Agent and Agentless
• Completely replaces WSUS and more
• Patches 3rd party products for over 30 Vendors
KACE Systems Management
Appliance (K1000)
• Physical, Virtual or Hosted
• VMware or Hyper-V
• Browser based UI
• Uses an OS dependent agent
• Windows, Mac, Linux
• Light weight
• Local Admin Rights
• Initiates all Actions
• No dedicated equipment
required at remote sites
• Not for Dell only
Computers
(Desktop, Laptop
Tablet, Server)
K1000
Site 1 Site 2
Payload Comm.
* Based on Version 7.0
Any Available
Disk Space
Centralized
Communications
KACE
Agent
KACE
Agent
KACE
Agent
Road
Warriors
Port 443
KACE
Agent
Confidential23
KACE vs. ‘The Others’WhereTHEY
Challenge
KACE
WhereKACE
WINS! Point Solutions
• Competes in Service Desk and
Asset Management.
• They are best at what they do,
but with narrow focus.
• How they win: Best of breed
solutions offering some level
of external integration
• Single pane of glass addresses
“console fatigue”
• Our integrated solution means
you can both simplify and save
by not purchasing and learning
multiple solutions
Free / Home Grown
Solutions
• Use what you have; do what
you’ve been doing while
spending no budget with no
need to learn anything new
• How they win: Budget
demands.
• Single pane of glass addresses
“console fatigue”
• Ability to confidently address
software licensing audits
• Automation of repetitive tasks
saves time
• KACE ROI is calculated in less
than 6 months.
The #1 Competitor is “No Budget”
Enterprise Solutions
• Focused on large accounts with
diverse systems management
staff
• How they win: Comprehensive.
Able to address most any
situation.
• We don’t require expertise
• No implementation services
required
• Our product is implemented
quickly and product updates are
simple
Visit us online
www.quest.com/KACE
• Videos, case studies, product specs, etc.
Try it out
• Free trials available for both KACE Systems Management
Appliance and KACE Systems Deployment Appliance.
Join the community
https://www.quest.com/community
• Product betas, how-to videos, discussions, blogs, tips and
tricks, etc.
Next Steps
Resources
• KACE Sandbox for those who just want to look
• https://sandbox.kace.com/admin
• ITNinja.com – KACE Community website
• On demand recording of this webcast: http://ow.ly/2Opg30eLNXF
Questions?

Contenu connexe

Tendances

Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
Lumension
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
Brian Dickhaus
 

Tendances (19)

SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
VMware: my jsme “software defined”
VMware: my jsme “software defined”VMware: my jsme “software defined”
VMware: my jsme “software defined”
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)IBM Endpoint Manger for Power Management (Overview)
IBM Endpoint Manger for Power Management (Overview)
 
V mware view
V mware viewV mware view
V mware view
 
Big Fix Architectural Overview
Big Fix Architectural OverviewBig Fix Architectural Overview
Big Fix Architectural Overview
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
System Center Essentials
System Center EssentialsSystem Center Essentials
System Center Essentials
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
VDI and Application Virtualization
VDI and Application VirtualizationVDI and Application Virtualization
VDI and Application Virtualization
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 
IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)IBM Endpoint Manager for Lifecycle Management (Overview)
IBM Endpoint Manager for Lifecycle Management (Overview)
 
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
VMworld 2013: How to Identify if Your vSphere Environment is Configured to Me...
 
Troubleshooting and debugging Citrix Receiver for iOS and Android
Troubleshooting and debugging Citrix Receiver for iOS and AndroidTroubleshooting and debugging Citrix Receiver for iOS and Android
Troubleshooting and debugging Citrix Receiver for iOS and Android
 
AutomateandsimAutomate and Simplify Your IT Management Operations
AutomateandsimAutomate and Simplify Your IT Management OperationsAutomateandsimAutomate and Simplify Your IT Management Operations
AutomateandsimAutomate and Simplify Your IT Management Operations
 
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
 
ManageEngine Applications Manager Overview
ManageEngine Applications Manager OverviewManageEngine Applications Manager Overview
ManageEngine Applications Manager Overview
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 

Similaire à Ensuring Rock-Solid Unified Endpoint Management

System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
C/D/H Technology Consultants
 
Citrix XenServer Success
Citrix XenServer SuccessCitrix XenServer Success
Citrix XenServer Success
eG Innovations
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
David J Rosenthal
 
VDI-PackagedServices
VDI-PackagedServicesVDI-PackagedServices
VDI-PackagedServices
Prahlad Reddy
 

Similaire à Ensuring Rock-Solid Unified Endpoint Management (20)

IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
 
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
IT Trends 2016: Taking Windows Applications Beyond Hardware Limits
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
Citrix and Desktop Migration Success
Citrix and Desktop Migration SuccessCitrix and Desktop Migration Success
Citrix and Desktop Migration Success
 
Presentation design - key concepts and approaches for designing your deskto...
Presentation   design - key concepts and approaches for designing your deskto...Presentation   design - key concepts and approaches for designing your deskto...
Presentation design - key concepts and approaches for designing your deskto...
 
Keeping IT in Control of Mac in the Enterprise
Keeping IT in Control of Mac in the EnterpriseKeeping IT in Control of Mac in the Enterprise
Keeping IT in Control of Mac in the Enterprise
 
Citrix XenServer Success
Citrix XenServer SuccessCitrix XenServer Success
Citrix XenServer Success
 
How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
 
管理向云的迁移过程
管理向云的迁移过程管理向云的迁移过程
管理向云的迁移过程
 
Presentation v mware horizon vision
Presentation   v mware horizon visionPresentation   v mware horizon vision
Presentation v mware horizon vision
 
Applications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the CloudApplications and Desktop from the Data Center to the Cloud
Applications and Desktop from the Data Center to the Cloud
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
 
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
 
Got Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterGot Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System Center
 
Securing the Cloud Native stack
Securing the Cloud Native stackSecuring the Cloud Native stack
Securing the Cloud Native stack
 
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
 
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
 
VDI-PackagedServices
VDI-PackagedServicesVDI-PackagedServices
VDI-PackagedServices
 

Plus de Quest

Plus de Quest (20)

DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking ScenarioDBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
DBA vs Deadlock: How to Out-Index a Deadly Blocking Scenario
 
Got Open Source?
Got Open Source?Got Open Source?
Got Open Source?
 
SQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To KnowSQL Server 2017 Enhancements You Need To Know
SQL Server 2017 Enhancements You Need To Know
 
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 AdoptionQuest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
Quest to the Cloud - Identifying the Barriers to Accelerate Office 365 Adoption
 
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You NeededTop 10 Enterprise Reporter Reports You Didn't Know You Needed
Top 10 Enterprise Reporter Reports You Didn't Know You Needed
 
Migrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing StrongMigrating to Windows 10: Starting Fast. Finishing Strong
Migrating to Windows 10: Starting Fast. Finishing Strong
 
The Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup StoryThe Cost of Doing Nothing: A Ransomware Backup Story
The Cost of Doing Nothing: A Ransomware Backup Story
 
Investigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security BreachInvestigating and Recovering from a Potential Hybrid AD Security Breach
Investigating and Recovering from a Potential Hybrid AD Security Breach
 
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
Who’s Watching the Watchers? Fixing and Preventing Inappropriate Privileged A...
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
 
Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment Identifying Hybrid AD Security Risks with Continuous Assessment
Identifying Hybrid AD Security Risks with Continuous Assessment
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Office 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking AboutOffice 365 Best Practices That You Are Not Thinking About
Office 365 Best Practices That You Are Not Thinking About
 
How to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACTHow to Restructure Active Directory with ZeroIMPACT
How to Restructure Active Directory with ZeroIMPACT
 
How to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 EnvironmentsHow to Secure Access Control in Office 365 Environments
How to Secure Access Control in Office 365 Environments
 
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
Understanding "Red Forest" - The 3-Tier ESAE and Alternative Ways to Protect ...
 
Your Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome ThemYour Biggest Systems Management Challenges – and How to Overcome Them
Your Biggest Systems Management Challenges – and How to Overcome Them
 
Top Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid ThemTop Five Office 365 Migration Headaches and How to Avoid Them
Top Five Office 365 Migration Headaches and How to Avoid Them
 
KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017KACE Endpoint Systems Management Appliances - What’s New for 2017
KACE Endpoint Systems Management Appliances - What’s New for 2017
 
How to Restructure and Modernize Active Directory
How to Restructure and Modernize Active DirectoryHow to Restructure and Modernize Active Directory
How to Restructure and Modernize Active Directory
 

Dernier

%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 

Dernier (20)

%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 

Ensuring Rock-Solid Unified Endpoint Management

  • 1. Ensuring Rock Solid Unified Endpoint Management
  • 2. Nathan O’Bryan MVP: Office Servers and Services MCSM: Messaging @MCSMLab https://www.mcsmlab.com
  • 3. The Importance of Unified Endpoint Management in the Cloud Era BYOD is the standard There is no standard device Administrators can’t be experts with all platforms Threats to an Enterprise organization can come from BYOD devices Having some level of control over BYOD devices is necessary Multiple panes of glass to manage devices is a cumbersome experience
  • 4. Endpoint Management with Native Office 365 tools Exchange MDM is very limited Azure AD Premium adds some conditional access features Works with Windows 10, new limited function with older OSs Intune adds device management features
  • 5. Endpoint Management with Exchange Allows administrators to require password Complex passwords Require encryption Enforce password age
  • 6. Azure AD Premium Conditional Access Requires Azure AD premium (additional subscription to Office 365) Allows administrators to set some conditions for sign-in to Office 365 Conditions include • Group membership • Location • Device platform • Lost or stolen devices
  • 7. Endpoint Management with Intune Microsoft’s top level cloud based MDM solution Available as part of several different cloud packages Has been quickly a quickly evolving product for the last several years
  • 8. Maturing features Many MDM features in the Microsoft cloud are still maturing Multiple places where MDM features are controlled Several “levels” of MDM features available depending on subscription Microsoft cloud portals are frequently updated
  • 9. KACE Endpoint Systems Management – Technical Overview
  • 10. Confidential10 Endpoint systems management is difficult Systems Management Mixed environments, including BYOD Inventory New security threats Remote-site management Patching 3rd party software License compliance Deployment Mobile device management Windows 7/10 Migration Strategic projects Road Warriors
  • 11. Confidential11 Endpoint systems management: IT challenges • I don’t know what I have or where it’s located. • I don’t know how my devices are configured. • My End-Users have Local Admin Rights. • I don’t know what software is installed or how it’s being used. • I’m only patching with WSUS; What about 3rd party applications? • I have a diverse IT environment (Mac, Linux, Chromebook, etc.). • I cannot effectively manage road warriors.
  • 12. Confidential12 Endpoint systems management lifecycle • Image capture • Zero touch OS deployment • Multicasting • User state migration • Remote site support • Service desk • User portal & self service • Monitoring & alerting • Remote control • Mobile access • Patch management • Configuration management • Policy enforcement • Vulnerability scanning • Discovery & inventory • Asset management • Software distribution • Reporting & compliance
  • 13. Why KACE Endpoint Systems Management? There is a difference.
  • 14. Confidential14 The KACE Difference Fast Implementation Comprehensive • From initial deployment to ongoing maintenance, management and support, to retirement • Supports Windows, Mac, Chromebook, Linux, UNIX • Supports “Road Warriors” • For computers, servers, mobile devices and non-computing connected devices Simplified • Comprehensive, integrated all-in-one solution • Familiar tabbed user interface, one click upgrades • Does not required product specialists, DBA or programming • Physical or virtual appliance, or SaaS • Requires no additional hardware or software • No need for extensive professional services • Fully operational in weeks, not months or years
  • 15. Confidential15 It’s in the packaging KACE Endpoint Systems Management Reduced total cost of ownership • Web based training • No extensive professional services • No dedicated equipment • No dedicated personnel • No scripting or DBA required Traditional Software Suites High total cost of ownership • Lengthy offsite training sessions • Specialized dedicated personnel • Complex upgrades • Scripting required • A la carte pricing vs.
  • 16. Confidential16 Optimize application experience Modernize infrastructure for the cloud Automate complex processes Enable a data-driven business TechValidate survey results • 68% of surveyed IT organizations have more accurate hardware and software inventory to better inform purchasing and maximize use of existing assets as a result of purchasing KACE K1000. • 50% of surveyed IT organizations have simplified application distribution and maintenance to ensure applications are up to date and secure as a result of purchasing KACE. • 53% of IT organizations chose the KACE Systems Deployment Appliance because they were overwhelmed by the amount of manual chores to simply keep operating systems up to date and running. • 70% of customers implemented KACE in less than 2 weeks. • 76% of KACE customers saw ROI in six months or less
  • 18. Confidential18 Endpoint Systems Management (Device and User) KACE Systems Management Appliance (K1000) • Comprehensive Endpoint Management for laptops, desktops, and servers, both physical and virtual KACE Systems Deployment Appliance (K2000) • Integrated systems for OS and application provisioning, migration and recovery Desktop Authority Management Suite • Centralized, secure management system for Windows user environments that controls users’ access to resources and applications
  • 19. Confidential19 Zero touch Provisioning - It’s not just imaging KACE Systems Deployment Appliance (K2000) Automated driver feed injection • Images no longer dependent on drivers • Images captured from a VM, or any make and model computer can be deployed to any other make and model computers Pre and post install functions • Run any application or tool before and after image deployment • Automatically assign computer names, install selective applications without creating more images, and join the domain Automated end-user profile management • Automatically capture End-User Profiles off-line and apply them to new computers with no loss of data or personal configuration • Automatically capture and deploy End User Profiles on the fly when re-imaging computers
  • 20. KACE Systems Deployment Appliance (K2000) • Physical and Virtual Only • VMware or Hyper-V • Browser bases UI • FreeBSD, Apache, MariaDB • Images Windows and Mac • Supports Multicast Desktop Laptop Tablet Server K2000 (1) PXE Request (2) K2000 info (3) KBE Request (6) Upload Image (5) Image Request Virtual RSA – Site 1 Site DHCP or Scope Site 1 Site DHCP or Scope Virtual RSA – Site 2 Site 2 Pre-stage Payloads * Based on Version 4.0 (4) Upload KBE DHCP
  • 21. KACE Systems Management Appliance (K1000) Software Compliance and Metering • Dynamically track what’s installed, what you own, and how much it’s being used • Avoid Audits and penalties - reduce software spending Software Deployment, Upgrades and Removal • Manage your computers without touching each one Patch Management beyond Windows Multi-tenant Service Desk • Track requests against users, Computers and any Asset • No Cost – Any department can have its own system Remote Control • VNC included – be there without going there Centralized Reporting • UI and menu driven • DBA and Programming NOT required Hardware and Software Inventory & Asset Mgmt • Always know what you have and how it’s configured • Agent and Agentless • Completely replaces WSUS and more • Patches 3rd party products for over 30 Vendors
  • 22. KACE Systems Management Appliance (K1000) • Physical, Virtual or Hosted • VMware or Hyper-V • Browser based UI • Uses an OS dependent agent • Windows, Mac, Linux • Light weight • Local Admin Rights • Initiates all Actions • No dedicated equipment required at remote sites • Not for Dell only Computers (Desktop, Laptop Tablet, Server) K1000 Site 1 Site 2 Payload Comm. * Based on Version 7.0 Any Available Disk Space Centralized Communications KACE Agent KACE Agent KACE Agent Road Warriors Port 443 KACE Agent
  • 23. Confidential23 KACE vs. ‘The Others’WhereTHEY Challenge KACE WhereKACE WINS! Point Solutions • Competes in Service Desk and Asset Management. • They are best at what they do, but with narrow focus. • How they win: Best of breed solutions offering some level of external integration • Single pane of glass addresses “console fatigue” • Our integrated solution means you can both simplify and save by not purchasing and learning multiple solutions Free / Home Grown Solutions • Use what you have; do what you’ve been doing while spending no budget with no need to learn anything new • How they win: Budget demands. • Single pane of glass addresses “console fatigue” • Ability to confidently address software licensing audits • Automation of repetitive tasks saves time • KACE ROI is calculated in less than 6 months. The #1 Competitor is “No Budget” Enterprise Solutions • Focused on large accounts with diverse systems management staff • How they win: Comprehensive. Able to address most any situation. • We don’t require expertise • No implementation services required • Our product is implemented quickly and product updates are simple
  • 24. Visit us online www.quest.com/KACE • Videos, case studies, product specs, etc. Try it out • Free trials available for both KACE Systems Management Appliance and KACE Systems Deployment Appliance. Join the community https://www.quest.com/community • Product betas, how-to videos, discussions, blogs, tips and tricks, etc. Next Steps
  • 25. Resources • KACE Sandbox for those who just want to look • https://sandbox.kace.com/admin • ITNinja.com – KACE Community website • On demand recording of this webcast: http://ow.ly/2Opg30eLNXF