IBM Endpoint Manager - Bigfix

Slides:



Advertisements
Similar presentations
Maintaining Tivoli Workload Scheduler Agents with IBM Endpoint Manager Mark Delaney
Advertisements

Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Moving Your Computer Lab(s) to the Cloud Rick O’Toole & Dave Hicking University of Connecticut Libraries.
The future of Desktops Transform Your Desktop with Virtualization.
Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
Content Overview Update Process Additional Tools.
How to be a less attractive software audit target Helpful intelligence from License Dashboard Presented by: Matt Fisher, Director.
USG ISOC Billy Nelson, LANDESK Sales Engineer.
Manageware For Documentum ESI SOFTWARE 2006
…your guide through terrain
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 10 Conducting Security Audits.
How PNNL Manages Windows Desktops 1 Will Jorgensen.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
WCL209. GA3/23GA3/23 Manage & Secure PCs Anywhere All you need is an internet connection The Best Windows Experience Standardize your OS on the latest.
Windows Anti-virus and Security WNUG Meeting
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
by Evolve IP Managed Services
Monitor Linux OS health & performance Monitor log files Monitor JEE app servers Monitor line-of-business applications Monitor databases and web.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Managed Host Security – Patch Management   BigFix Deployment April-September 2004 Jay Stamps, ITSS Turing Auditorium, May 21, 2004.
Assisting Enterprise iAMT Activation Infrastructure Specialist EDS, an HP Company.
Task Scheduler Pro Managing scheduled tasks across the enterprise Joe Vachon Sales Engineer.
© 2007 Altiris, Inc. How does Altiris Relate to Open Manage? “Dell and Altiris have extended their partnership to co-develop the next generation of OpenManage.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
StudioSysAdmins 2 nd Annual SIGGRAPH Birds-of-a-Feather John Hickson - 08/09/2011 StudioSysAdmins 2 nd Annual SIGGRAPH Birds-of-a-Feather John Hickson.
Software Licensing, Made Simple SELECT Server XM Edition
Kaseya Fundamentals Workshop Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 DAY FOUR.
Tim Vander Kooi Systems
Security Overview for Microsoft Infrastructures Fred Baumhardt and James Noyce Infrastructure Solutions and Security Solutions Teams Microsoft Security.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
System Center 2012 Certification and Training May 2012.
© British Telecommunications plc BT Managed Services Innovate
Patch Management Only part of the solution….. Bob Isaak Mar 04, 2004.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 6: Designing Security for Network Hosts
1 IBM TIVOLI Business Continuance Seminar Training Document.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
IT as a Service (ITaaS) by Evolve IP Managed Services Last Update: May 19, 2015.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Network and Computer Security in the Fermilab Accelerator Control System Timothy E. Zingelman Control System Cyber-Security Workshop (CS)2/HEP Knoxville,
Managing your IT Environment. Microsoft Operations Manager 2005 Overview.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
BladeLogic Demo. 03/10/09 BladeLogic Demo BladeLogic Who? Automation taking my job? What? No, it’s making it easier. Started by entrepreneurs who understood.
LDMS10 Preview. Ben Hall.
Jurgen Van Duvel Business Manager Windows Client Microsoft
C C Introduction to Tivoli Endpoint Manager 8.2 Joe Saylor Tivoli Endpoint Manager Solutions Architect.
System Center 2012 Configuration Manager Service Pack 1 Overview.
IBM Control Desk Enabling the Enterprise App Store –
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
© 2010 VMware Inc. All rights reserved Why Virtualize? Beng-Hong Lim, VMware, Inc.
ILMT/BigFix Inventory Demo
Overview – TI Services September-2016.
Happy Endings: Reengineering Wesleyan’s Software Deployment to Labs and Classrooms Kyle Tousignant 03/22/2016.
Guy D. Falsetti Sr. Systems Architect University of Iowa
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Complete Records Management in SharePoint.
Microsoft Data Insights Summit
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

IBM Endpoint Manager - Bigfix

Reasons to use Bigfix Reduced Operations overhead Reduce Management hours and costs 0 day patching Patch management Increased Security Audit Compliance Operations The day to day activities associated with maintaining IT configurations Security Protecting the enterprise against internal and external threats Audit Compliance Proving that you comply industry security standards

Reasons continued… Quickly Deploy patches and software Conduct inventory of machines from one console Quickly identify anything based on custom criteria Perform baseline of machines to meet department specifications.

Centrally Managed IEM Service Funded by CITES No cost for enrollment and use Hosts can be managed anywhere Quick responsiveness of actions taken in console One Console for all uses Up-to-date information regarding your endpoints Easy to learn and use

Benefits of Central Management Deployment strategy help Help available ticketing system Training opportunities – on-site or remote GPO development Shared repository of fixlets

Security and Compliance IBM Endpoint Manager - Bigfix Endpoints One infrastructure: management server, console, agent for Windows, Mac, Unix, Linux Hardware and Software Inventory Read Vendor Information: MAC Addresses – Serial Numbers, Dell Tags Operates in low-bandwidth / high-latency environments Deploy Software to all clients with a few steps Linux Windows Mac OSX Patch Management Lifecycle Management Software Use Analysis Inventory Management Power Management Server Automation Security and Compliance Software Deployment

Console Antivirus Health

IBM IEM Console – Patch Management

IBM IEM Console – Patch Management Breakdown by Content Breakdown by OS Breakdown by Severity Breakdown by Classification

IBM IEM Console – Inventory Management

Fixlet Debugger

Fixlet Debugger Use to test relevance in non-production environment Can be used to retrieve information such as: Existence of files, registry keys, registered applications Execution of actions – not recommended for use Available for download in box folder at http://epm.Illinois.edu

Engineering IT IEM Usage - Content

Engineering IT IEM Usage - Baselines

Engineering IT Usage - Baselines

Engineering IT IEM Usage - Baselines

Engineering IT IEM Usage - Baselines

Contacts https://epm.Illinois.edu endpointmanagement@Illinois.edu Listserv: EPM-TEM-L jonesm@Illinois.edu