SlideShare a Scribd company logo
1 of 14
Download to read offline
Altiris IT Management Suite 7.0
    Redefining IT lifecycle management and automation




    April 13, 2010


Altiris IT Management Suite                             1
Presentation Overview



          Management is Critical Component of Security

          IT Management Suite Delivers Integrated Value

                              Process Automation – Built-in




Altiris IT Management Suite
The Need For Management And Security

                  Protect the     > Symantec™ Protection Suite
               Infrastructure

                    Protect the   > Symantec™ Data Loss Prevention
                   Information

Develop and Enforce               > Symantec™ Control Compliance Suite
          IT Policies

        Manage Systems            > Symantec™ IT Management Suite


Altiris IT Management Suite                                              3
Integrations Available Today                                           pcAnywhere Solution 7.0

7.0 Management Platform                                           Supports light and full versions
                                                                  Management console right click
                                                                   context menu
         Deployment Solution 7.1                                  Management database
 Incorporates Ghost Imaging Foundation                            integration (audit trail, security)
 Hardware independent imaging
 In-place file preservation imaging
 Native VMDK support including physical
  to virtual                                                                              Symantec Endpoint Protection
                                                                                            Integration Component 7.0
                                                                                        Updated to 7.0 Platform
                                                                                        Antivirus Inventory
 Backup Exec System Recovery                                                            Expanded migration tasks
   8.5 & 2010
  Native Integration
  Client deployment
                                                                                                         IT Analytics 7.0 for SEP
  Backup and recovery tasks                Management                                           Updated to 7.0 Platform
  Web reports                              Platform 7.0
                                                                                                 Key Performance Indicators




  Backup Exec Infrastructure Manager 12.5                                                       Data Loss Prevention (Vontu)
                                                                                                  Integration Component 9.0
   Discover and inventory BE components
                                                                                             Agent rollout and management
   Report on enterprise protection          Control Compliance Suite 9.0 SP 1
                                                                                             Integrated reporting
   Deploy and Patch of BE components        Import assets from Management
   Monitor BE at enterprise level & rack     Platform into CCS
    Storage                                  Automated creation of service
                                              tickets from audit results


Altiris IT Management Suite                                                                                                         4
Standardize, Automate, And Consolidate Operations




                              Client IT Asset
                                  Service Desk
                                     Management
                                      Server
                                  Management



Altiris IT Management Suite                         5
Intelligently Integrate Capabilities


            Self              Avoid calls or requests entirely with best practice self service
          Service             delivered via the Service Catalog
       (Service Catalog)


         Process              Automate human and system interactions;                       Increased
       Automation             eliminate latency, errors and omissions
       (Workflow Engine)                                                                     Service,
                                                                                            Efficiency
         Policy               Detect and remediate automatically, with no human            and Savings
      Enforcement
        (Policy Engine)       involvement

           Task
                              Perform multiple remote management tasks
        Automation
         (Task Engine)        simultaneously

        Remote
      Management              Avoid desk side visits with one to one remote
       (Remote Services)      management capabilities


Altiris IT Management Suite                                                                              6
Altiris Product Family
                                                       • ServiceDesk




                                                                                           Altiris IT Management Suite 7.0 from Symantec
                               Altiris™ Service Desk   • ITIL best practices
                                  from Symantec        • Service Catalog


            Self                  Altiris™ Asset       •   Manage budgets
          Service             Management Suite from    •   Ensure license compliance
       (Service Catalog)            Symantec           •   Support growth or contraction
                                                       •   Align IT with the business
         Process
       Automation
       (Workflow Engine)
                                  Altiris™ Client      •   Configuration management
                              Management Suite from    •   Patch management
         Policy                     Symantec           •   Monitoring and alerting
      Enforcement                                      •   Remote control
        (Policy Engine)          Altiris™ Server       •   IT process automation
                                                       •   Best practices
                              Management Suite from    •   Manage virtual infrastructure
           Task                    Symantec
        Automation
         (Task Engine)


                               Altiris™ Deployment     • System provisioning
        Remote                                         • Task-based operations
      Management              Solution from Symantec   • Simple one to one management
       (Remote Services)




Altiris IT Management Suite                                                                                            7
IT Management Suite 7.0
Components
Integrated products in one comprehensive suite
    –   Client Management Suite 7
    –   Asset Management Suite 7
    –   Server Management Suite 7
    –   ServiceDesk 7
    –   Workflow 7


Key Features
    –   Built-in process automation
    –   Intelligent software management
    –   OS Migration, featuring Windows 7
    –   Comprehensive client, server, and asset management

Altiris IT Management Suite                                  8
IT Management Suite Benefits
     Reduce Total Costs        Reduce Complexity              Focus on Critical
                                                           Organization Initiatives

    • Automate time           • Gain complete visibility   • Align process, people
      consuming tasks           into IT environment          and technology
      • Software and hard-    • Increase security and      • Free IT to focus on
        ware management         reduce risks                 strategic business
      • OS Migrations                                        initiatives
                              • Get information to IT
    • Close technology          and decision makers        • Drive business
      gaps to maximize
      investments
    • Increase Service
      Levels




Altiris IT Management Suite                                                           9
Windows 7 No Touch Migration
  Customer Profile                                 Background
                               • Planned OS upgrade and migration of 300,000
Global Financial Institution     endpoints within 18 months
• 300,000+ endpoints           • Moving to corporate standard image

• 30+ hardware platforms       • Estimated $200-300 migration cost per endpoint
                               • Estimated 5 migrations per technician per night
• 600+ applications

• 7 data centers                                      Results
Previous Products              • 200% greater efficiency while using less staff
                               • Migrated ~1,800 endpoints in a 24-hour period
• Ghost / Microsoft ImageX
                               • Required only 6 technicians per 400 migrations
Previous Migration Rate
                               • Process deployed the corporate SOE, then Line of
• 1,000 migrations in 12         Business software, then specialized “one off”
  months                         applications

Altiris IT Management Suite                                                         10
7 Steps to Windows 7
                                       Inventory
   1                                 Asset Mgmt
                                           CMDB
                                     Deployment
   2                                    Solution

                                    Wise Package
   3                                      Studio

                                     Deployment
   4                                    Solution


   5                                   Workflow

                              Deployment Solution
   6                               Software Mgmt
                                      Patch Mgmt
                                       Inventory
   7                                 ServiceDesk

Altiris IT Management Suite                         11
Licensing Harvesting at Large Manufacturer
  Customer Profile                              Background
 World’s largest              •   Needed better understanding of software
 manufacturer and                 environment
 marketer of major home       •   Unstable software licensing costs
 appliances.                  •   Wanted increased negotiating power with
                                  software vendors to save money
 • 214 locations in 44
 countries
                                                   Results
 • 73,000 employees
                              •   Uninstalled 6,441 unregistered software
 globally
                                  products
                              •   Cost avoidance of over $2 million (US)
 • 31,000 Client Nodes
                              •   Negotiated new Enterprise Agreement with
                                  vendor
 • 1,500 Server Nodes




Altiris IT Management Suite                                                  12
Eliminating Unnecessary IT Labor
     VPN Certificate Request                          Manual Effort
                                             • Number of requests
 Before Automation                              – 334 requests in 2 months
 1. User entered request via web site        • Estimated Helpdesk Time Spent
     – No error checking, no user               – 25.05 man weeks per year
       verification
 2. Request forwarded to Helpdesk
 3. Worker opened ticket
                                                          Results
    – Found request number and logged
      into Certificate Server                • Number of requests
    – Approved or Denied request (blindly)       – 1,774 requests in 6 months
    – Marked ticket completed                • Estimated Helpdesk Time Spent
    – Certificate emailed to end-user with       – 0 Hours
      no security attached                   • Cost avoided
 Average time to completion – 1.5 days           – $85k annually


Altiris IT Management Suite                                                     13
Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Altiris IT Management Suite                                                                                                                                                                 14

More Related Content

What's hot

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
webhostingguy
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
Amit Gatenyo
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
Amit Gatenyo
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
ebuc
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
eG Innovations
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
Presentologics
 

What's hot (20)

NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
Symantec Endpoint Protection vs Sophos Endpoint Protection (Competitive Analy...
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
OpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoringOpsMgr 2012 end-to-end monitoring
OpsMgr 2012 end-to-end monitoring
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
 
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
How to Extend Microsoft SCOM to Monitor & Diagnose the Performance of Citrix,...
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
 
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 

Viewers also liked

Vmserver2
Vmserver2Vmserver2
Vmserver2
nkirve
 
165870 yle-starters-sample-papers-vol-
165870 yle-starters-sample-papers-vol-165870 yle-starters-sample-papers-vol-
165870 yle-starters-sample-papers-vol-
caycho123
 

Viewers also liked (19)

Control Compliance Suite 10
Control Compliance Suite 10Control Compliance Suite 10
Control Compliance Suite 10
 
Vmserver2
Vmserver2Vmserver2
Vmserver2
 
Symantec Solutions
Symantec SolutionsSymantec Solutions
Symantec Solutions
 
Code syntax highlighting in ghost
Code syntax highlighting in ghostCode syntax highlighting in ghost
Code syntax highlighting in ghost
 
Winning Business Proposals Module 3
Winning Business Proposals   Module 3Winning Business Proposals   Module 3
Winning Business Proposals Module 3
 
Tk2273 -teknologi_virtualisasi Cloud Computing
Tk2273  -teknologi_virtualisasi Cloud ComputingTk2273  -teknologi_virtualisasi Cloud Computing
Tk2273 -teknologi_virtualisasi Cloud Computing
 
Starters 6 sb
Starters 6 sbStarters 6 sb
Starters 6 sb
 
Starters 2 test 2
Starters 2   test 2Starters 2   test 2
Starters 2 test 2
 
Yle starters1 tb
Yle starters1 tbYle starters1 tb
Yle starters1 tb
 
165870 yle-starters-sample-papers-vol-
165870 yle-starters-sample-papers-vol-165870 yle-starters-sample-papers-vol-
165870 yle-starters-sample-papers-vol-
 
Movers Picture Description
Movers Picture DescriptionMovers Picture Description
Movers Picture Description
 
Jobe A. Diagne
Jobe A. DiagneJobe A. Diagne
Jobe A. Diagne
 
Full Buku sakti belajar hacker
Full Buku sakti belajar hackerFull Buku sakti belajar hacker
Full Buku sakti belajar hacker
 
English Adventure Starter A
English Adventure Starter AEnglish Adventure Starter A
English Adventure Starter A
 
ESL Activities and Mini-Books
ESL Activities and Mini-BooksESL Activities and Mini-Books
ESL Activities and Mini-Books
 
Movers 6
Movers 6Movers 6
Movers 6
 
Movers 7
Movers 7Movers 7
Movers 7
 
Starters 2 test 1
Starters 2   test 1Starters 2   test 1
Starters 2 test 1
 
Starters 2 speaking tests
Starters 2   speaking testsStarters 2   speaking tests
Starters 2 speaking tests
 

Similar to Altiris IT Management Suite 7

分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
ITband
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
Lumension
 
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
New Lease
 
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
Dubravko Marak
 
Newest Family Member - IT Automation With Opalis
Newest Family Member - IT Automation With OpalisNewest Family Member - IT Automation With Opalis
Newest Family Member - IT Automation With Opalis
Amit Gatenyo
 
Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012
Juanchi_43
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
OlivierMichot
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
Lilian Schaffer
 

Similar to Altiris IT Management Suite 7 (20)

分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
 
System Center And Sql Server
System Center And Sql Server System Center And Sql Server
System Center And Sql Server
 
Securing Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data ProtectionSecuring Your Infrastructure: Identity Management and Data Protection
Securing Your Infrastructure: Identity Management and Data Protection
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
Day 3 p3 - xs and ec
Day 3   p3 - xs and ecDay 3   p3 - xs and ec
Day 3 p3 - xs and ec
 
System Center 2012 Ürün Ailesi
System Center 2012 Ürün AilesiSystem Center 2012 Ürün Ailesi
System Center 2012 Ürün Ailesi
 
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
 
Private cloud day session 3 monitor and operate your private cloud
Private cloud day session 3 monitor and operate your private cloud Private cloud day session 3 monitor and operate your private cloud
Private cloud day session 3 monitor and operate your private cloud
 
Manage engine it360
Manage engine it360Manage engine it360
Manage engine it360
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Development Platform as a Service - erfarenheter efter ett års användning - ...
Development Platform as a Service - erfarenheter efter ett års användning -  ...Development Platform as a Service - erfarenheter efter ett års användning -  ...
Development Platform as a Service - erfarenheter efter ett års användning - ...
 
System Center 2012: Delivering a Private Cloud Environment
System Center 2012: Delivering a Private Cloud EnvironmentSystem Center 2012: Delivering a Private Cloud Environment
System Center 2012: Delivering a Private Cloud Environment
 
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
[Dubravko marak] Kako kreirati private cloud koristeći sistem centar 2012
 
Managing IT as A Service with System Center
Managing IT as A Service with System CenterManaging IT as A Service with System Center
Managing IT as A Service with System Center
 
Newest Family Member - IT Automation With Opalis
Newest Family Member - IT Automation With OpalisNewest Family Member - IT Automation With Opalis
Newest Family Member - IT Automation With Opalis
 
Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012Configurando Private Cloud con System Center 2012
Configurando Private Cloud con System Center 2012
 
Configuring and deploying a private cloud with system center 2012
Configuring and deploying a private cloud with system center 2012Configuring and deploying a private cloud with system center 2012
Configuring and deploying a private cloud with system center 2012
 
SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services SCOM 2007 & Audit Collection Services
SCOM 2007 & Audit Collection Services
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 

More from Symantec

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 

Altiris IT Management Suite 7

  • 1. Altiris IT Management Suite 7.0 Redefining IT lifecycle management and automation April 13, 2010 Altiris IT Management Suite 1
  • 2. Presentation Overview Management is Critical Component of Security IT Management Suite Delivers Integrated Value Process Automation – Built-in Altiris IT Management Suite
  • 3. The Need For Management And Security Protect the > Symantec™ Protection Suite Infrastructure Protect the > Symantec™ Data Loss Prevention Information Develop and Enforce > Symantec™ Control Compliance Suite IT Policies Manage Systems > Symantec™ IT Management Suite Altiris IT Management Suite 3
  • 4. Integrations Available Today pcAnywhere Solution 7.0 7.0 Management Platform  Supports light and full versions  Management console right click context menu Deployment Solution 7.1  Management database  Incorporates Ghost Imaging Foundation integration (audit trail, security)  Hardware independent imaging  In-place file preservation imaging  Native VMDK support including physical to virtual Symantec Endpoint Protection Integration Component 7.0  Updated to 7.0 Platform  Antivirus Inventory Backup Exec System Recovery  Expanded migration tasks 8.5 & 2010  Native Integration  Client deployment IT Analytics 7.0 for SEP  Backup and recovery tasks Management  Updated to 7.0 Platform  Web reports Platform 7.0  Key Performance Indicators Backup Exec Infrastructure Manager 12.5 Data Loss Prevention (Vontu) Integration Component 9.0  Discover and inventory BE components  Agent rollout and management  Report on enterprise protection Control Compliance Suite 9.0 SP 1  Integrated reporting  Deploy and Patch of BE components  Import assets from Management  Monitor BE at enterprise level & rack Platform into CCS Storage  Automated creation of service tickets from audit results Altiris IT Management Suite 4
  • 5. Standardize, Automate, And Consolidate Operations Client IT Asset Service Desk Management Server Management Altiris IT Management Suite 5
  • 6. Intelligently Integrate Capabilities Self Avoid calls or requests entirely with best practice self service Service delivered via the Service Catalog (Service Catalog) Process Automate human and system interactions; Increased Automation eliminate latency, errors and omissions (Workflow Engine) Service, Efficiency Policy Detect and remediate automatically, with no human and Savings Enforcement (Policy Engine) involvement Task Perform multiple remote management tasks Automation (Task Engine) simultaneously Remote Management Avoid desk side visits with one to one remote (Remote Services) management capabilities Altiris IT Management Suite 6
  • 7. Altiris Product Family • ServiceDesk Altiris IT Management Suite 7.0 from Symantec Altiris™ Service Desk • ITIL best practices from Symantec • Service Catalog Self Altiris™ Asset • Manage budgets Service Management Suite from • Ensure license compliance (Service Catalog) Symantec • Support growth or contraction • Align IT with the business Process Automation (Workflow Engine) Altiris™ Client • Configuration management Management Suite from • Patch management Policy Symantec • Monitoring and alerting Enforcement • Remote control (Policy Engine) Altiris™ Server • IT process automation • Best practices Management Suite from • Manage virtual infrastructure Task Symantec Automation (Task Engine) Altiris™ Deployment • System provisioning Remote • Task-based operations Management Solution from Symantec • Simple one to one management (Remote Services) Altiris IT Management Suite 7
  • 8. IT Management Suite 7.0 Components Integrated products in one comprehensive suite – Client Management Suite 7 – Asset Management Suite 7 – Server Management Suite 7 – ServiceDesk 7 – Workflow 7 Key Features – Built-in process automation – Intelligent software management – OS Migration, featuring Windows 7 – Comprehensive client, server, and asset management Altiris IT Management Suite 8
  • 9. IT Management Suite Benefits Reduce Total Costs Reduce Complexity Focus on Critical Organization Initiatives • Automate time • Gain complete visibility • Align process, people consuming tasks into IT environment and technology • Software and hard- • Increase security and • Free IT to focus on ware management reduce risks strategic business • OS Migrations initiatives • Get information to IT • Close technology and decision makers • Drive business gaps to maximize investments • Increase Service Levels Altiris IT Management Suite 9
  • 10. Windows 7 No Touch Migration Customer Profile Background • Planned OS upgrade and migration of 300,000 Global Financial Institution endpoints within 18 months • 300,000+ endpoints • Moving to corporate standard image • 30+ hardware platforms • Estimated $200-300 migration cost per endpoint • Estimated 5 migrations per technician per night • 600+ applications • 7 data centers Results Previous Products • 200% greater efficiency while using less staff • Migrated ~1,800 endpoints in a 24-hour period • Ghost / Microsoft ImageX • Required only 6 technicians per 400 migrations Previous Migration Rate • Process deployed the corporate SOE, then Line of • 1,000 migrations in 12 Business software, then specialized “one off” months applications Altiris IT Management Suite 10
  • 11. 7 Steps to Windows 7 Inventory 1 Asset Mgmt CMDB Deployment 2 Solution Wise Package 3 Studio Deployment 4 Solution 5 Workflow Deployment Solution 6 Software Mgmt Patch Mgmt Inventory 7 ServiceDesk Altiris IT Management Suite 11
  • 12. Licensing Harvesting at Large Manufacturer Customer Profile Background World’s largest • Needed better understanding of software manufacturer and environment marketer of major home • Unstable software licensing costs appliances. • Wanted increased negotiating power with software vendors to save money • 214 locations in 44 countries Results • 73,000 employees • Uninstalled 6,441 unregistered software globally products • Cost avoidance of over $2 million (US) • 31,000 Client Nodes • Negotiated new Enterprise Agreement with vendor • 1,500 Server Nodes Altiris IT Management Suite 12
  • 13. Eliminating Unnecessary IT Labor VPN Certificate Request Manual Effort • Number of requests Before Automation – 334 requests in 2 months 1. User entered request via web site • Estimated Helpdesk Time Spent – No error checking, no user – 25.05 man weeks per year verification 2. Request forwarded to Helpdesk 3. Worker opened ticket Results – Found request number and logged into Certificate Server • Number of requests – Approved or Denied request (blindly) – 1,774 requests in 6 months – Marked ticket completed • Estimated Helpdesk Time Spent – Certificate emailed to end-user with – 0 Hours no security attached • Cost avoided Average time to completion – 1.5 days – $85k annually Altiris IT Management Suite 13
  • 14. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Altiris IT Management Suite 14