This session reviews Novell ZENworks and its Full Disk Encryption as a solution to address some of the challenges of data that is now increasingly mobile.
Access the session on-demand at: http://www.ali-inc.com/info-resource-center.html
2. Here’s what we’ll cover today:
Welcome & Introduction
The reality of security breaches AND increasing
mobility
Solution overview: Using ZENworks to keep you
out of the headlines
Extending Network Security
Reporting features Demo
Ease of Management
Questions, Discussion & Next Steps
3. Novell Platinum Partner
Virginia ▲West Virginia ▲ Maryland ▲ Washington DC ▲ North Carolina
Collaboration, Conferencing & Messaging
Converged IP networking & telephony
Network Resource Management solutions
Wireless & Mobile Workforce solutions
Data Storage, Archiving & Disaster Recovery
Network Support & Optimization
Virtualization
Data Security
Managed Services
Training
4. The Reality of Today’s Security Breaches
Cherry Hill, NJ – October 8, 2012
2 data backup tapes were lost during shipping in late March 2012. The tapes
included customer names, Social Security numbers, addresses, account
numbers, debit card numbers, and credit card numbers.
Marysville, TN – October 18,
2012
A password-protected laptop was
stolen from an employee's home on
August 25. It contained two groups of
patient data. Patient names, dates of
birth, responsible party names, patient
Scottsdale, AZ – October 19, 2012 addresses, physician names, and
A vendor working with patient data for digital billing information for 22,000 patients
conversion from lost a flash drive on or around were on the laptop. An additional 5,000
July 16. It contained patient names, Social patients had similar information
Security numbers, dates of birth, addresses, exposed as well as their Social
telephone numbers, account numbers, diagnoses, Security numbers and other non-
and other protected health information. medical information.
6. The ZENworks Family: Windows, Mac & Mobile Endpoints
Windows, Mac & Mobile Configuration
Management
Patch Management
Asset
Management
Application End Point Security
Virtualization Management
Service Desk Full Disk Encryption
7. Are you just as locked out of your own
devices as any hacker?
9. Centralized Management
One Console. One Agent. One Tool for all your endpoint management
tasks
ZENworks also does configuration, patch, asset & endpoint security
management
10. Fully Featured
From a single
console, ZENworks
lets you manage Manage access, with support for pre-boot auth
your enterprise
remotely:
down the hall, down
the street, across the
country, or around the Turn encryption on/off
world
Troubleshoot passwords
Manage hardware & software encryption
Deploy encryption
software across the Generate reports
enterprise at the push demonstrating encryption
of a button
17. ALI Consulting & Deployment Services
Highly experienced advisors with diverse & practical technical experience
• Proactive strategy
• Clear roadmap for deployment
• Value driven project analysis
• Limits burden on existing staff
• Saves IT budget
• Speeds time to deployment
Project &
Consultative • Priority access to Novell as
Resource Deployment
Assessment
Planning needed
• Option for lab testing
18. Special Incentives for Webinar Attendees
Act within next 60 days to receive:
Special product discounts available
Special rates for project-based ALI services
Call Cindy for more details!
19. Upcoming Webinar Topics
November 8: Disaster Recovery & Business
Continuity for SMB
Organizations
In this second webinar in our virtualization series, we'll be
showing some disaster recovery options from VMware that
make business continuity so simple and affordable that no
organization has to continue to take the risk of being
unprepared.
Registration link coming in the follow up email or register
from our event listing at www.ali-inc.com