Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks...
Transcript of Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks...
#MicroFocusCyberSummit
#MicroFocusCyberSummit
ZENworks Keynote Session
Gil Cattelain
Jason Blackett
Business Challenges
How We Solve Challenges
Solution and Vision
Our Products
Roadmap
Any Questions
Secure Unified Endpoint Management – ZENworks
User challenges
Any device
Using corporate-owned devices and personal devices (BYOD)
Using different operating systems, variety of apps – and they will get what they want! (Shadow IT)
Mixing their data and tools from their professional and personal lives
From any location at any time
Often from unsecure and non-performant public WIFI that can be vulnerable to malicious attacks – viruses, malware, spyware etc.
Exposed to physical threats – lost and stolen devices, removable devices etc.
Negligence and accidental risks on the road or at home
5
Users today want to get their job done using any device – from any location at any time
“Employee mobility leads to 30% better processes and 23% more productivity – and 100% more satisfied employees” – Is Mobility The Answer to Better Productivity, D. Newman, www.forbes.com
IT challenges and benefits
Data, devices and access must be secured and you need to be able to prove it
Protect the business Intellectual Property of your organization
Prevent damage to company image and reputation
Prevent costly regulatory and data breach fines
7
What does it mean to IT: Protect your organization
• 70 million smartphones are lost each year, with only 7% recovered
• One laptop is stolen every 53 seconds
• 52% of devices are stolen from the office/workplace and 24% from conferences
- ChannelProNetwork
Empower end-users to make the business more successful
Ensure users have the business tools they need to get their job done
Make it easy for users to request access to services to get work done
Automate security as much as possible to prevent users from accidently leaking data
8
What does it mean to IT: Increase user productivity
2017 Top 5 Threats to IT Security1.End Users2.Lack of Security Patching3.Lack of Security Software and Hardware4.Inadequate Backup and Planning5.Stagnate – Inactive IT Staff
Shawn Pate, Senior Technical AdvisorWorkSmart (www.worksmart)
Secure and empower the user while driving down costs
Simplify the processes and tools you use, to keep make IT more effective and productive
Align the backend business process to make IT strategic to the business
Improve compliance and lower IT costs
9
What does it mean to IT: End results
To Empower users through self-service
To effectively Manage a variety of platforms
Having Powerful and efficient application and resource deployment capability
To Secure both data and devices
With Consistent management paradigm
Having a Single Pane of glass
While leveraging existing investments
Unified Endpoint Management (UEM)
10
What does IT need?
A solution ...
Enabling the digital workspace with ZENworks
Our solution…
Encompasses all of the technologies users need to do their jobs
Mobile devices
Laptops/desktops
Apps
Company store
Self- services
Instant messaging
File sharing etc.
Create a successful and collaborative workforce
Employee productivity
IT productivity
User satisfaction
Retention of employees
Collaboration and access
Etc.
Create a competitive edge
Revenue growth
Increased interaction
Enhanced employee engagement
Better service
Increased compliance
Control and risk
12
What is it? Why you need it? Benefits?
ZENworks – Digital Workspace
Today’s digital workspace is an always connected environment providing instant access to everything users need
Delivering the digital
workspace with ZENworksUnified Endpoint Management
Micro Focus ZENworks
AUTOMATIONCONFIG
SINGLE PANEOF GLASS
SECURITY
COMPLIANCE
USER SELF-SERVICES
ZENworks Overview – Roadmap
ZENworks provides a unified endpoint management solution for managing and securing all of your endpoint devices, in a contextual, user-centric fashion, leveraging the best capabilities of each platform, while maintaining an easy to learn and use management paradigm
What is ZENworks?
What is Unified Endpoint Management?
Client ManagementEndpoint MobileManagement
Enterprise IoT Management
Manages traditional devices:• Windows• Linux• Mac
Usually Agent Based
Key Capabilities• OS Deployment• Software Delivery• Configuration
Management• Inventory• Remote Mgmt
Manages mobile devices:• Windows• iOS• Android
Leverages native MDM platform capabilities
Key Capabilities• Software delivery• Device lock down• Resource
provisioningManages things that are based on enterprise platforms
Key Capabilities• Inventory• Lockdown• Software delivery
Unified Endpoint Management
Manages• Traditional Clients• Mobile Devices• IoT Things
Key Capabilities• Single pane of glass• Single management paradigm, learn once• Superset of all 3 traditional tools• Facilitates user self-service• Secures devices• Resource and configuration deployment
Available capabilities dictated by platform, agent may be optional
Unified Endpoint Management Capabilities
ConfigurationManagement
DesktopContainers*
AssetManagement
PatchManagement*
Disk Encryption
EndpointSecurity
MobileWorkspace*
Any Device
IT Service Management*
ReportingService
ZENworks Suite
Identity
* Additional capabilities available as an add-on to the ZENworks Suite
ZENworks Evolution
We are here
eDirectory Centric Windows Management
(ZENworks 1 – 7.0)
SOA Based Windows Management
(ZENworks 10)
Cross platform Client Management
(ZENworks 11)
Unified Endpoint Management
(ZENworks 2017)
Secure Unified Endpoint Management
Secure Unified Endpoint Management from Anywhere
• Managed Windows 95/NT – Windows XP
• Built on NetWare / eDirectory foundation
• Started with simple application management and grew to full lifecycle management
• Modern Internet friendly, service oriented architecture with web based mgmt
• Cross platform server, directory and database infrastructure
• Tightly integrated management platform for Configuration, Patch and Asset Management
• Support for managing Windows Vista+, Linux and Macintosh
• Integrated Endpoint Security Management and Full Disk Encryption
• Single paradigm management of Windows, Linux, Macintosh, iOS, Android and ActiveSync devices
• Enable users via self-service and modernized end user interfaces
• Robust dashboarding and reporting
• Security View of the Endpoint
• Device risk analysis
• Deeper endpoint protection
• Integrated with Access and Identity
• Transition to cloud friendly architecture
• Offered as a service and on-prem
The value of ZENworks Unified Endpoint Management
Empower users through self service and support the devices and applications they want to use to do their job
Protect users, their devices and your data from misuse, accidental exposure, patch vulnerabilities and more
Minimize administrator learning time and IT costs by having a single administration console and consistent workflows for securing and managing all of your Windows, Linux, Mac, iOS and Android
Reduce the complexity of endpoint management software by utilizing one or fewer agent (client) per device
Enjoy price breaks associated with owning multiple ZENworks products that grow with you as needed
20
ZENworks Configuration Management Purchasing Information
ZENworks Configuration Management (ZCM) is available as either perpetual license + maintenance or as an annual subscription
When purchased per-user, you can manage up to 5 mobile or traditional devices used by a given user with the single license
When purchased per-device you must have a license for each device that you will manage, tiered pricing available for mobile vs traditional devices
ZCM is also available as part of the ZENworks Suite and Micro Focus Open Workgroup Suite
ZCM includes a 2-technician license entitlement for ZENworks Service Desk that could be used to implement all of the Self Service capabilities described
21
Summary Let ZENworks help you…
Empower your end users to work the way they want
Secure your data, devices and access to protect your IP and reputation while preventing costly fines
Improve IT efficiency by simplifying how you manage and service end users and their devices
Check out our blogs => https://www.novell.com/communities/coolsolutions/
Visit our Support Forums => https://forums.novell.com/forum.php
Attend our Community Webinars => https://www.microfocus.com/about/webinars/
Make feature recommendations via our Ideas Portal => https://ideas.microfocus.com/MFI
Review our success stories => https://www.microfocus.com/resources/?type=success-story
Call to Action –
Check out our Data Sheet!Check out Chalk Talks!
Thank You.
#MicroFocusCyberSummit
#MicroFocusCyberSummit
Additional information
#MicroFocusCyberSummit
High-level capabilities of ZENworks that allow you seize the opportunity
27
ZENworks is a secure unified endpoint management solution that allows you to manage and secure all of your endpoint devices using a consistent, identity-based management paradigm, from a common web based management console.
ZENworks provides both robust IT controls and intuitive store-like self-service to meet IT’s needs while improving customer satisfaction
Introducing ZENworks
Capabilities for Securing Data, Devices and Access
Protect your data
• Encrypt the fixed disks on all of your Windows devices
• Protect data copied to removable storage devices with centrally managed Bitlocker removable storage encryption
• Ensure mobile devices are encrypted when enrolled for corporate data access
• Wipe data from the devices if they are lost
• Monitor data copied to removable media
Capabilities for Securing Data, Devices and Access
Secure BYO mobile access through containment
• Securely provision and configure access to corporate applications, PIM data, documents and web applications on BYO devices
• Ensure data is secure both at-rest and in-motion
• Wipe corporate data without impacting user data
• Limit access to corporate data based on time, location, or jailbreak status
Capabilities for Securing Data, Devices and Access
Automated OS and Application Patch Vulnerability Scanning and Remediation
• Identify all of the Windows, Linux and MacOS devices that have known OS patch vulnerabilities
• Identify patch vulnerabilities for the most popular 3rd party application software
• Define policies to keep your devices patched based on vendor, severity, patch age, and more
• Track patching with rich dashboarding and reporting capabilities
Capabilities for Securing Data, Devices and Access
Enforce secure configuration with device management
• Limit the applications that a user can use to interact with corporate data
• Require secure passwords, display lock and other critical security settings on your mobile devices
• Provision and configure critical applications such as anti-virus / anti-malware
• For enterprise “things” restrict what users can do with them
Capabilities for Securing Data, Devices and Access
Package and secure legacy applications to facilitate productivity in a secure way
• Package legacy applications to save costs and ensure business continuity
• Restrict the network access of these legacy applications to specific IPs / DNS in the organization
• Force all containerized application traffic through an HTTP proxy
Capabilities for Securing Data, Devices and Access
Protect your users from insecure network threats
• Enforce use of VPN when on an unsecure network
• Limit access to corporate resources when on unsecure networks
• Enforce device firewall settings to protect the device
• Prevent the use of undesirable WiFi
• Provide seamless access to corporate resources on BYO mobile devices
Capabilities for Empowering the User
Automatically provision users what the business knows they need to get their job done on the device being used
• Assign resources to user or device identity
• Deliver what the user needs and protect the device based on their location, time of day, device and business role
• Make resources available based on the user’s or device’s role in the organization
• Apply just enough management based on what the user is doing
Capabilities for Empowering the User
Provide users with self-service access to IT services
• Prevent “shadow-IT” by giving users an easy way to get what they need
• Define custom workflows for items that need approvals or outside activities so that business owners can approve and IT isn’t involved in every request
• Provide users a self-service launch pad for their applications
• Allow users to search for known IT issues, FAQs and if needed open Incidents or Requests
Capabilities that reduce IT Costs
Manage the lifecycle of all of your devices in a common way
• A single unified management paradigm means you can learn how to manage devices one time and then apply that learning to all devices
• Manage the complete cradle to grave lifecycle of the device including
• OS deployment and device provisioning
• Application distribution and management
• Hardware and software inventory
• Application of standardized configuration and security policies
• Remote management to assist the user when needed
Capabilities that reduce IT Costs
Manage the lifecycle of your applications
• Don’t just stop at the distribution of the application, control the process from distribution to launch to uninstall
• Simple to use UI for building even complex application deployment and configuration scenarios with little or no scripting required
• Includes a full license for AdminStudio Standard Edition for application packaging and customization
• Target applications to devices OR users
Capabilities that reduce IT Costs
Leverage your existing investments
• Pick the backend infrastructure that makes sense
• Appliance, Windows or Linux
• Sybase, SQL, Oracle or PostgreSQL
• Leverage existing file servers OR use the content repository
• Leverage your existing identity store for user identity, hierarchy and group data
IT wants to manage all devices and resources from one central location
Convergence of EM and MDM/EMM
To assure users can..
Work from any device, from anywhere at any time
And have access to self-services & immediate resources
40
UEM Market Trends
Market Opportunity: 3.73 Billion USD by 2020
Estimated CAGR @ 42.9%
ZENworks – Enabling the Workspace through Unified Endpoint Management
AUTOMATION | CONFIGURATION
SINGLE PANE OF GLASS
SECURITY
COMPLIANCE
USER SELF-SERVICES
USER WORKSPACE
Workspace automation process for all devices and self-services by selecting any services from any device.
Seamless integration of all IT systems by providing a complete view of the workspace.
Secure the workspace through endpoint security, encryption, location-awareness, wireless security, containerization and many more.
Assure workspace compliance for your assets, licenses, apps, devices, contracts, etc.
Request, track, activate, print, file share, collaborate and much more from the workspace.
Self-services
Data
BYOD Apps
Devices
Self-services
Data
BYOD Apps
Devices
User Based
Configuration Management, Endpoint Security, Mobile Workspace, Service Desk,Patch Management, Desktop Containers, Asset Management
The ZENworks Control Center / Common End User Portal
Asset Management, Patch Management, FDE, Endpoint Security
Full Disk Encryption, Endpoint Security, Mobile Workspace, Desktop Containers
Service Desk, Mobile Workspace, Desktop Containers
End users
Productivity: Work from any location, using any device
Effectiveness: Want to share and collaborate with colleagues
Satisfaction: Want my BYOD devices supported
IT
Boost IT productivity: Want to focus on other projects
Show value: Want to align IT with business objectives
Deliver on time: Want to keep all apps, patches etc. current
Business
Reduce risk: Want to protect data and avoid security breaches
Increase compliance: Want to remain compliance on devices and apps etc.
Cost savings: Want to be able to do more with less
42
Endpoint Management Challenges and Benefits
ZENworks Configuration ManagementUnified Endpoint ManagementLast Updated: May 7, 2018
The shifting way we work…
Unified Endpoint Management
Solving IT challenges with ZENworks Configuration Management
Empowering end users with ZENworks Configuration Management
The power of ZENworks
Purchasing information
Agenda
53
The shifting way we work
Unified Endpoint Management and What it Means to You
What experts are saying about mobility and UEM
Secure
70 million smartphones are lost each year, with only 7% recovered
One laptop is stolen every 53 seconds
52% of devices are stolen from the office/workplace and 24% from conferences
Change
“Over the next seven years everything about PC and mobile device management will begin to shift as we enter the new landscape of UEM.
What you need to know about Unified Endpoint Management, J. Walker, www.monitis.com
Empower
“Employee mobility leads to 30% better processes and 23% more productivity –and 100% more satisfied employees”
The Answer to Better Productivity, D. Newman, www.forbes.com
- ChannelProNetwork
Meeting IT’s Unified Endpoint Management Needs with the ZENworks Configuration Management
58
Harold, the Device Manager needs to manage all his users devices while reducing costs and keeping his sanity
To do this he needs to:
Quickly deploy new operating systems, applications and configuration changes across a wide range of devices and platforms
Leverage each platform’s unique capabilities in easy-to-learn-once manner
Quickly see the status of the organization and take needed actions
Ensure the security of the device and the data that resides thereon is maintained
Facilitate access to what he (you) know users need, and make it easy to request everything else
Now more than ever, change is the new norm and he (you) needs to be able to keep up
Applications are the lifeblood of productivity, but can be complex and deploying them shouldn’t require you to be a rocket scientist
To make sure users are productive he (you) must be able to give the user what they need when they need it
Why is this important to Harold?
The NeedQuickly deploy new operating systems, applications and configuration changes…
ZENworks ConfigurationManagement
What can Harold (and you) do?
The SolutionAutomated OS deployment and flexible application management
Quickly deploy Windows 10 to new and existing devices
Deploy and manage the complete lifecycle of applications across platforms
Quickly deploy device configuration changes
ZENworks ConfigurationManagement
The DemoWindows 10 deployment and application management
Management capabilities of the device, dictate what he (you) can do –but having to learn how to manage each device differently is confusing and expensive
To truly manage the device he (you) need to take advantage of what’s available
Why is this important to Harold?
The NeedLeverage each platform’s unique capabilities in easy-to-learn-once manner
ZENworks ConfigurationManagement
What can Harold (and you) do?
The SolutionFull service management, leveraging the unique capabilities of each platform
Use native mobile management capabilities
Leverage the full power of the Windows platform
Apple Volume Purchase Program Apple Device Enrollment Program iOS Configuration Profiles Android Enterprise Work Profile and Work Managed
Not limited to just what Windows MDM allows, manage Windows 7 – 10 with a consolidated set of capabilities
Integration with Microsoft Deployment Toolkit (MDT) for Windows deployments
ZENworks ConfigurationManagement
The DemoLeveraging native MDM management
He has diverse platforms and multiple operating systems to manage with more coming all the time
He doesn’t have the people, time, or money to manage each device type with a different tool
Why is this important to Harold?
The NeedManage a wide range of devices and platforms ZENworks Configuration
Management
What can Harold (and you) do?
The SolutionUnified management of all devices in a consistent manner
Manage laptops, desktops, servers, smartphones, tablets and even “things”
Support the variety of devices your users need, including:
Manage it all from one console, using a single, enterprise scale management paradigm
Windows Linux Mac iOS Android
ZENworks ConfigurationManagement
The DemoCohesive management paradigm
Understanding what’s happening in the endpoint management environment means he (and you) can be more proactive
Your boss wants to know what he is (and you are) doing for the organization
Why is this important to Harold?
The NeedQuickly see the status of the organization and take needed actions
ZENworks ConfigurationManagement
What can Harold (and you) do?
The SolutionBuilt-in Dashboarding and reporting
View and customize the dashboards to make it easy to monitor your environment
Quickly take action when you identify something that needs to change
Provide reports and big screen dashboards with ZENworks Reporting
ZENworks ConfigurationManagement
The DemoDashboarding and Reporting
Devices are increasingly used outside workplace and can be easily compromised
Compromised device needs to be found/locked/wiped to prevent data leakage
Why is this important to Harold?
The NeedSecure data and devices
ZENworks ConfigurationManagement
What can Harold (and you) do?
The SolutionBuilt in security policies and controls
Apply native security controls across platforms
Take actions when devices are lost or stolen
Protect Office 365 mobile application data with support for InTune Application Protection policies
Further secure devices with Endpoint Security, Full Disk Encryption and Patch Management
ZENworks ConfigurationManagement
The DemoSecuring devices with policies and quicktasks
Meeting End User Needs with ZENworks Configuration Management
70
Alison, the end user just wants to get her work done
To do so, she needs to be able to:
Have access to the data and applications she needs to do her job
Be able to work on the device she has with her now
Request new resources without getting bogged down
She just wants to get her job done and expects that IT will give her what she need to do that
When she needs something, she usually needs it now and if IT doesn’t give it to her, she’ll probably find a way to get it
Why is this important to Alison?
The NeedRequest and access resources without getting bogged down ZENworks Configuration
Management
What can Alison (and you) do?
The SolutionThe ZENworks Store and ZENworks Application Window
Launch any application that has been provisioned by IT based on identity, role or device
Request access to any resources that IT has listed in the ZENworks Store and get access as soon as any business requirements are met
Allows end users to request services from IT and for the capabilities to be provisioned without him having to be directly involved in each request
Prevents “Shadow IT” by empowering users to get what they want the right way
Why is this important to Harold?
The NeedEmpower the end user to do their job and self-serve so IT can focus on other things
ZENworks ConfigurationManagement
What can Harold (and you) do?
The SolutionLeverage the power of identity to target resources and make optional resources available via a workflow driven, self service store
Target applications at device or user
Provide an enterprise store where end users can see what the company can offer
Automate the request fulfillment process for many requests
ZENworks ConfigurationManagement
The DemoZENworks Store and the ZENworks Application Window
ZENworks ConfigurationManagement
The Key TakeawaysEnd users want to work differently than they have in the past driving an explosion in the devices that IT has to manage. IT professionals need a way to keep their sanity while empowering end-users and securing all of these devices to unlock the potential of the new digital workspace.
The ZENworks Configuration Management Way
Automated OS deployment with or without MDT
Coverage of Windows, iOS, Android, Linux, and Macintosh operating system versions
Support for native MDM capabilities such as DEP, VPP, and Android for Work
Full lifecycle management, not just distribution
Robust dashboarding and report capabilities for operators and their managers
Control of native platform security controls
All done in a consistent management paradigm using a consolidated on-prem architecture
End user driven self-fulfillment allowing the user to unlock their potential
The Power of ZENworks
76
Micro Focus ZENworks
ConfigurationManagement
DesktopContainers*
AssetManagement
PatchManagement*
Disk Encryption
EndpointSecurity
MobileManagement
Any Device
IT Service Management*
ReportingService
Micro FocusZENworks Suite
AnyDevice
* Additional capabilities available as an add-on to the ZENworks Suite
Purchasing Information
Thank you.