SlideShare una empresa de Scribd logo
1 de 19
Managing the New Heterogeneous Network
Through Integrated Orchestration of
Functionality Customized to Distribute
Discreet Module Profile Management
Part 1 of 4
Mark – Chief Distributed Redundancy Officer
Bob – Chief Metaphor Compliance Enforcement Officer
The NEW Heterogeneous Network
Service Models as defined by NIST:
Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the
provider’s applications running on a cloud infrastructure. The applications are accessible from
various client devices through a thin client interface such as a web browser (e.g., web-based email).
The consumer does not manage or control the underlying cloud infrastructure including network,
servers, operating systems, storage, or even individual application capabilities, with the possible
exception of limited user-specific application configuration settings.
Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the
cloud infrastructure consumer-created or acquired applications created using programming
languages and tools supported by the provider. The consumer does not manage or control the
underlying cloud infrastructure including network, servers, operating systems, or storage, but has
control over the deployed applications and possibly application hosting environment
configurations.
Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision
processing, storage, networks, and other fundamental computing resources where the consumer is
able to deploy and run arbitrary software, which can include operating systems and applications.
The consumer does not manage or control the underlying cloud infrastructure but has control over
operating systems, storage, deployed applications, and possibly limited control of select networking
components (e.g., host firewalls).
National Institute of Standards and Technology - www.nist.gov
© 2013, Forrester Research, Inc. Reproduction Prohibited
Classic Firefighting Processes Are Mature, While Strategic Processes Lag
March 2013 “The State Of IT Service Management In 2012”
© 2013, Forrester Research, Inc. Reproduction Prohibited
Classic Firefighting Processes Are Mature, While Strategic Processes Lag (Cont.)
March 2013 “The State Of IT Service Management In 2012”
© 2013, Forrester Research, Inc. Reproduction Prohibited
Classic Firefighting Processes Are Mature, While Strategic Processes Lag (Cont.)
March 2013 “The State Of IT Service Management In 2012”
• 26% Annual
growth in cloud
related positions
through 2015
•1.7M jobs are
open – Only 2.7M
IT professionals
exist in the US as
of April 2013
Jobs in those Clouds
Kaseya Cloud ITSM Solution
Event Management
• Alerts / Notifications
• System Events
• Logs
Automation
• Scheduling
• Procedures
• API/Messaging
Business Intelligence
• Reporting
• Dashboards
• Interactive Data Views
IT Configuration Management
Asset Management
Security
Business Continuity
Service Delivery
Systems Monitoring
• Remote Management
• Software Deployment
• Power Management
• Image Deployment
• Desktop Migration
• Mobile Device Management
• Network Discover & AD
• Hardware Audit
• Software Audit
• Virtual Machine Monitoring
• AntiVirus
• AntiMalware
• Patch Management
• 3rd Party Software Updates
• Image Backup
• Image Virtualization
• File & Folder Backup
• Service Desk/Ticketing
• Policy Management
• Service Billing
• Policy Compliance
• Time Tracking
• Systems Checks & Alerts
• Event Monitoring
• Device Monitoring
• SNMP Monitoring
• Log Monitoring
• Automation
• Customized IT
Managing the New Heterogeneous Network
Through Integrated Orchestration of
Functionality Customized to Distribute
Discreet Module Profile Management
Part 2 of 4
Mark – Chief Distributed Redundancy Officer
Bob – Chief Metaphor Compliance Enforcement Officer

Más contenido relacionado

La actualidad más candente

Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkTanveer Malik
 
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksUsing Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksBeyondTrust
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Maganathin Veeraragaloo
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingAlexis Blandin
 
Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Maximiliano Accotto
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsOneLogin
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...mfrancis
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesHTS Hosting
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...Papitha Velumani
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...Papitha Velumani
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storageShakas Technologies
 

La actualidad más candente (20)

Lecture 4 sharing of resources on network
Lecture 4 sharing of resources on networkLecture 4 sharing of resources on network
Lecture 4 sharing of resources on network
 
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation AttacksUsing Advanced Threat Analytics to Prevent Privilege Escalation Attacks
Using Advanced Threat Analytics to Prevent Privilege Escalation Attacks
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud Computing
 
Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017
 
Unit5 Cloud Federation,
Unit5 Cloud Federation,Unit5 Cloud Federation,
Unit5 Cloud Federation,
 
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
LLoyd - Web proxy vs. Federated SSO: A Practical GuideLLoyd - Web proxy vs. Federated SSO: A Practical Guide
LLoyd - Web proxy vs. Federated SSO: A Practical Guide
 
Flanagan - RA21 Improving Access to Scholarly Resources
Flanagan - RA21 Improving Access to Scholarly ResourcesFlanagan - RA21 Improving Access to Scholarly Resources
Flanagan - RA21 Improving Access to Scholarly Resources
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
 
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in OhioPawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
Pawlowski and Beadles: Authentication and Access of Licensed Content in Ohio
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based Services
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Database Security - IK
Database Security - IKDatabase Security - IK
Database Security - IK
 
Leahy - What can SAML/Shibboleth do for your institution?
Leahy - What can SAML/Shibboleth do for your institution?Leahy - What can SAML/Shibboleth do for your institution?
Leahy - What can SAML/Shibboleth do for your institution?
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
11 vol3
11 vol311 vol3
11 vol3
 
Hanson In Defense of the Proxy Server
Hanson In Defense of the Proxy ServerHanson In Defense of the Proxy Server
Hanson In Defense of the Proxy Server
 

Destacado

Authority and VValidation in Digital Communications
Authority and VValidation in Digital CommunicationsAuthority and VValidation in Digital Communications
Authority and VValidation in Digital CommunicationsORCID, Inc
 
Increasing Gender Diversity in Tech - International Women's Day 2016
Increasing Gender Diversity in Tech - International Women's Day 2016Increasing Gender Diversity in Tech - International Women's Day 2016
Increasing Gender Diversity in Tech - International Women's Day 2016Angie Chang
 
Portfolio scratch pad 4
Portfolio scratch pad 4Portfolio scratch pad 4
Portfolio scratch pad 4David Medranda
 
Academic Transcript (job 1759126)
Academic Transcript (job 1759126)Academic Transcript (job 1759126)
Academic Transcript (job 1759126)Michael Graham
 
Redken Press release
Redken Press releaseRedken Press release
Redken Press releaseRicky Lopez
 
Portfolio scratch pad 1
Portfolio scratch pad 1Portfolio scratch pad 1
Portfolio scratch pad 1David Medranda
 
2012 Aussie Supplement
2012 Aussie Supplement2012 Aussie Supplement
2012 Aussie SupplementErik Kolb
 
Egipto- tierra de faraones
Egipto- tierra de faraonesEgipto- tierra de faraones
Egipto- tierra de faraonesANALUCORTEZ
 
The world of jesus of nazareth 2
The world of jesus of nazareth 2The world of jesus of nazareth 2
The world of jesus of nazareth 2Phillip Bentley
 
The world of jesus of nazareth slide show 1
The world of jesus of nazareth slide show 1The world of jesus of nazareth slide show 1
The world of jesus of nazareth slide show 1Phillip Bentley
 
Congresos_Cursos_Ponencias
Congresos_Cursos_PonenciasCongresos_Cursos_Ponencias
Congresos_Cursos_PonenciasOscar Ortega
 
Aspectos curriculares de la educación básica
Aspectos curriculares de la educación  básicaAspectos curriculares de la educación  básica
Aspectos curriculares de la educación básicaMar Mendoza Otero
 

Destacado (17)

Luz en fotografía ii (4)
Luz en fotografía ii (4)Luz en fotografía ii (4)
Luz en fotografía ii (4)
 
Crucigrama
CrucigramaCrucigrama
Crucigrama
 
Authority and VValidation in Digital Communications
Authority and VValidation in Digital CommunicationsAuthority and VValidation in Digital Communications
Authority and VValidation in Digital Communications
 
Increasing Gender Diversity in Tech - International Women's Day 2016
Increasing Gender Diversity in Tech - International Women's Day 2016Increasing Gender Diversity in Tech - International Women's Day 2016
Increasing Gender Diversity in Tech - International Women's Day 2016
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Portfolio scratch pad 4
Portfolio scratch pad 4Portfolio scratch pad 4
Portfolio scratch pad 4
 
Academic Transcript (job 1759126)
Academic Transcript (job 1759126)Academic Transcript (job 1759126)
Academic Transcript (job 1759126)
 
Redken Press release
Redken Press releaseRedken Press release
Redken Press release
 
red y tipos de redes
red y tipos de redesred y tipos de redes
red y tipos de redes
 
Portfolio scratch pad 1
Portfolio scratch pad 1Portfolio scratch pad 1
Portfolio scratch pad 1
 
ID Media
ID MediaID Media
ID Media
 
2012 Aussie Supplement
2012 Aussie Supplement2012 Aussie Supplement
2012 Aussie Supplement
 
Egipto- tierra de faraones
Egipto- tierra de faraonesEgipto- tierra de faraones
Egipto- tierra de faraones
 
The world of jesus of nazareth 2
The world of jesus of nazareth 2The world of jesus of nazareth 2
The world of jesus of nazareth 2
 
The world of jesus of nazareth slide show 1
The world of jesus of nazareth slide show 1The world of jesus of nazareth slide show 1
The world of jesus of nazareth slide show 1
 
Congresos_Cursos_Ponencias
Congresos_Cursos_PonenciasCongresos_Cursos_Ponencias
Congresos_Cursos_Ponencias
 
Aspectos curriculares de la educación básica
Aspectos curriculares de la educación  básicaAspectos curriculares de la educación  básica
Aspectos curriculares de la educación básica
 

Similar a Kaseya Connect 2013: Kaseya Keynote

NIST Definition for Cloud Computing
NIST Definition for Cloud ComputingNIST Definition for Cloud Computing
NIST Definition for Cloud ComputingAjay Ohri
 
NIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsNIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsi-SCOOP
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSIRJET Journal
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxTrongMinhHoang1
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud ComputingScientia Groups
 
Zálohování a DR do cloudu - přehled technologií
Zálohování a DR do cloudu - přehled technologiíZálohování a DR do cloudu - přehled technologií
Zálohování a DR do cloudu - přehled technologiíMarketingArrowECS_CZ
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challengesEditor Jacotech
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET Journal
 
The United States National Institute of Standards and Technology (NIST) has p...
The United States National Institute of Standards and Technology (NIST) has p...The United States National Institute of Standards and Technology (NIST) has p...
The United States National Institute of Standards and Technology (NIST) has p...Michael Hudak
 
«Определение понятия «облачные вычисления» (от National Institute of Standard...
«Определение понятия «облачные вычисления» (от National Institute of Standard...«Определение понятия «облачные вычисления» (от National Institute of Standard...
«Определение понятия «облачные вычисления» (от National Institute of Standard...Victor Gridnev
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloudssuser84183f
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 

Similar a Kaseya Connect 2013: Kaseya Keynote (20)

NIST Definition for Cloud Computing
NIST Definition for Cloud ComputingNIST Definition for Cloud Computing
NIST Definition for Cloud Computing
 
NIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitionsNIST 2011 Cloud Computing definitions
NIST 2011 Cloud Computing definitions
 
Nist cloud comp
Nist cloud compNist cloud comp
Nist cloud comp
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
Zálohování a DR do cloudu - přehled technologií
Zálohování a DR do cloudu - přehled technologiíZálohování a DR do cloudu - přehled technologií
Zálohování a DR do cloudu - přehled technologií
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Cloud computing a services business application challenges
Cloud computing a services business application challengesCloud computing a services business application challenges
Cloud computing a services business application challenges
 
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
IRJET- A Detailed Study and Analysis of Cloud Computing Usage with Real-Time ...
 
The United States National Institute of Standards and Technology (NIST) has p...
The United States National Institute of Standards and Technology (NIST) has p...The United States National Institute of Standards and Technology (NIST) has p...
The United States National Institute of Standards and Technology (NIST) has p...
 
«Определение понятия «облачные вычисления» (от National Institute of Standard...
«Определение понятия «облачные вычисления» (от National Institute of Standard...«Определение понятия «облачные вычисления» (от National Institute of Standard...
«Определение понятия «облачные вычисления» (от National Institute of Standard...
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 

Más de Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 

Más de Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Último

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Kaseya Connect 2013: Kaseya Keynote

  • 1.
  • 2. Managing the New Heterogeneous Network Through Integrated Orchestration of Functionality Customized to Distribute Discreet Module Profile Management Part 1 of 4 Mark – Chief Distributed Redundancy Officer Bob – Chief Metaphor Compliance Enforcement Officer
  • 3.
  • 4.
  • 6.
  • 7.
  • 8. Service Models as defined by NIST: Cloud Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Cloud Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Cloud Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). National Institute of Standards and Technology - www.nist.gov
  • 9.
  • 10.
  • 11. © 2013, Forrester Research, Inc. Reproduction Prohibited Classic Firefighting Processes Are Mature, While Strategic Processes Lag March 2013 “The State Of IT Service Management In 2012”
  • 12. © 2013, Forrester Research, Inc. Reproduction Prohibited Classic Firefighting Processes Are Mature, While Strategic Processes Lag (Cont.) March 2013 “The State Of IT Service Management In 2012”
  • 13. © 2013, Forrester Research, Inc. Reproduction Prohibited Classic Firefighting Processes Are Mature, While Strategic Processes Lag (Cont.) March 2013 “The State Of IT Service Management In 2012”
  • 14. • 26% Annual growth in cloud related positions through 2015 •1.7M jobs are open – Only 2.7M IT professionals exist in the US as of April 2013 Jobs in those Clouds
  • 15.
  • 16. Kaseya Cloud ITSM Solution Event Management • Alerts / Notifications • System Events • Logs Automation • Scheduling • Procedures • API/Messaging Business Intelligence • Reporting • Dashboards • Interactive Data Views IT Configuration Management Asset Management Security Business Continuity Service Delivery Systems Monitoring • Remote Management • Software Deployment • Power Management • Image Deployment • Desktop Migration • Mobile Device Management • Network Discover & AD • Hardware Audit • Software Audit • Virtual Machine Monitoring • AntiVirus • AntiMalware • Patch Management • 3rd Party Software Updates • Image Backup • Image Virtualization • File & Folder Backup • Service Desk/Ticketing • Policy Management • Service Billing • Policy Compliance • Time Tracking • Systems Checks & Alerts • Event Monitoring • Device Monitoring • SNMP Monitoring • Log Monitoring
  • 17.
  • 19. Managing the New Heterogeneous Network Through Integrated Orchestration of Functionality Customized to Distribute Discreet Module Profile Management Part 2 of 4 Mark – Chief Distributed Redundancy Officer Bob – Chief Metaphor Compliance Enforcement Officer

Notas del editor

  1. B: Great talk. Now what would a couple guys from the Midwest do to top that?M: We thought about going a couple rounds but I was too embarrassed to show that much cheekB: At first we thought about making it simple and high level – Smart Phones are here to stay. Rejected for too much marketing fluffM: Then we took a look into – How to secure your IT infrastructure though quantum mechanics and differential equations. Rejected because… well Bob went to PurdueB: So we picked something in the middle with just enough meat but none of the hyperbolly normally associated with presentations like this.
  2. B: read titleM: There is not enough time to fully explore a fascinating subject like this in the hour we have. So we have cancelled all remaining breaks to present parts 2 and 3. We’ll give part 4 before the band goes on tonight at the house of blues. So come early to insure you get a good seat up front.
  3. B:Previously we talked about a lot of concepts: Big Data, mass customization, BYOD, Green ITThis year, I understand there’s a new game in town. The cloud… M: ooooooooo Ever since Al Gore invented it… B: This time we want to tie it all together and talk about ITSM and the role of the Cloud
  4. B: Yes Mark, great to talk about how we can deliver IT service management from the cloud… just like the really cool apps… M: It isn’t about what we do, and it isn’t about what other vendors do,Back and forth on thisB: Ultimately, it’s about the NEW HETEROGENEOUS network… the challenge of managing hardware and software from different manufacturers… We can help thereM: no Bob, get your head out of the 90’s and into the clouds. Its about managing different systems delivering integrated services, on demand any time, any where.B: It’s about managing the Three fundamental computing styles that are now showing up within a single organizationPhysical Servers, Virtual Instances, Cloud ApplicationsM: It’s really about both – managing these environment, and using the cloud to deliver the exact system you need to match your agaile business objectives
  5. The challenge is all about getting services on demand from any vendor and seamlessly integrating delivery of those services to your users.And, it’s Highly distributed as well… THAT’s the challenge. It isn’t about the vendors, its about the users
  6. B: We’re talking about cloud, and ITSM, like everyone knows the ins and outs of both… Let’s take a quick look hereM: So when was the cloud really invented? Was it when Amazon rolled out EC2 in 2006? Was it when everyone got a DSL connection at home in the late 90’s? or was it back when mainframe computers tied together the world’s financial system in the 50’s?B: I don’t know Mark. I’ll use a lifeline and “ask the audience”B: how many people think of mainframes when you’re using the cloud… ok, so how many of you do on line/ATM banking… That cloud is a mainframeUtility computing… John McCarthy (Coined AI, developed Lisp) or wait, wasn’t he a communist? Oh, ya, different McCarthy… “computing will one day be delivered like a public utility”
  7. OK, so back to the user… Applications, platforms and infrastructure all coming from the cloud, serving up virtually everything to the user and their environment… Agility, productivity, security (it’s actually risk averse behavior to move to the cloud)How about cost?? - you can’t save your way to success! Budgets are important, but not the driverAll very confusing as to how this all comes together. Maybe we can turn to NIST for some clarity.
  8. Nistdefiniitons of SaaS, PaaS and IaaS….See anything that sticks out Mark? Mark: they’re all acronyms… Anything else? How about: The consumer does not manage or control the underlying cloud infrastructure That strikes me as BAD… Oh, but that’s not the whole of it…
  9. Consumerization isn’t just about BYOD… it’s about making choices to bring in their own services, devices, etc…This drives complexity of your environment over the edgeBusiness units are choosing Cloud Apps that suit their needsAnd the vendor landscape, littered with overzealous marketing people who like to invent words and definitions and tout how they do things… but it isn’t about them is it… present company excepted…
  10. Nope… it’s about Using ITSM capabilities and services to manage this new heterogeneous enviornment… Very complicatedYour opportunity is to provide integration of differing services in a highly reliable simple to consume way – Make it easy for your users That’s why we need management, that’s why we need ITSM… and not necessarily FROM the cloud (as cool as that is)But where are we with ITSM… isn’t it a simple matter to move this very mature, well understood management capability available from pretty much anywhere, and plug it into the network? And then use the cloud savvy IT organizations around the globe to manage it?Uh, no… let’s take a look at that one
  11. With the lack of automation leads to more labor intensive solutions to these issues.Yet, the labor requirement is growing faster than the people available to fill those jobs. I think we’re short of talent.Talk about doing more with less!Impressive statistics…
  12. So the big deal here is:Automation – where is that? We have Demand Management but we don’t have automation? WeirdHow about remediation – am I trying to organize a manual system here? Or am I looking to revolutionize the model by tying in the ability to reach down to the endpointsAnd how about doing that automatically, at the same time that I manage the SLA on the cloud apps?Oh, you mean like control!!!!
  13. M: Kaseya’s approach, both now and in the future…We can bring in the silos (security for example) that conspire against us… and how we can satisfy both. And we = Kaseya plus our customersSecurity > AvailabilityDisaster Recovery > PrivacyHow many of you liked that new live connect, quick view and remote control yesterday. All those are solutions enhance the maturity things like incident management. We spend a lot of time working on solutions to this but our real goal is to make those tools obsolete. Our mission is to eliminate these problems before they occur
  14. Further, our mission is to provide a customizable implementation that gives everyone the ability to build the exact framework they need to manageIncluding full integration with best of class services available from multiple vendorsOpportunity not a threat – which would you rather have? Fully customized, integrated Framework like Kaseya? Or a set of cloud solutions that look and work like a set of point solutions like the old daysCustomizable IT
  15. Combination of Physical Servers, Virtual Instances and Cloud Applications – resulting in service islandsComplexity created by the consumerization of ITA lot of talk about providing ITSM in the cloud – need to think of the opportunity created by successful management of the new heterogeneous networkAutomation of ITSM is the key to successCustomized IT gives you a purpose-builtmanagement solution
  16. B: read titleM: There is not enough time to fully explore a fascinating subject like this in the hour we have. So we have cancelled all remaining breaks to present parts 2 and 3. We’ll give part 4 before the band goes on tonight at the house of blues. So come early to insure you get a good seat up front.