SlideShare una empresa de Scribd logo
1 de 24
Meet our Speakers




  Jeff Keyes       Alex Brandt
ITSM Specialist    Vice President
    Kaseya            Kaseya
Polling Question
Please select your answer using the WebEx polling tool.



What problems do you experience
  from point solutions not being
 integrated (schedule, conflicting
 operations, user logins, separate
          servers, etc.)?


                                                          NR
Point
Solutions
are a thing
of the past.
Polling Question
Please select your answer using the WebEx polling tool.




What percentage of the machines
 you support are external to the
      corporate network?
Distributed
Networks:
Managing
Machines
Regardless
of Their
Location
The number
of devices
per person
is growing.
Bring
Your
Own
Device
(BYOD).
The cloud
is here
to stay.
Polling Question
Please select your answer using the WebEx polling tool.




 From a security point of view, what
 percentage of the threats you’ve had
to deal with focus on the endpoint vs.
              the server?
The
endpoint is
the new
target.
The
increasing
role of
Windows 8.
The
dangers
within
social
network
security.
Increasing
employee
knowledge.
Apple love.
The trick to successfully embracing these 10 concepts?




Automated IT Systems Management
Core Principles



           Discover




Validate              Manage



           Automate




                               www.kaseya.com
Consolidated Discovery



          N
          M
          A
          P



 Multiple Scan Methods




                         www.kaseya.com
Good Practice

100’s of Pre-Defined Views, Maintenance Routines and Policies

• Device Views by Type
   – By OS Type/Ver
   – Exchange, SQL, IIS, etc

• Maintenance Routines
   – PC and Server Maintenance

• Monitor Sets
   –   Application Events/Logs
   –   Hardware Thresholds
   –   Up/Down Faults
   –   Servers, Database, Exchange and Domains
   –   3rd Party Backup, Security and Network Infrastructure
                                                           www.kaseya.com
Unified Management
        Discover the                          Manage the                           Automate the
         State of IT                          State of IT                           State of IT
    •   Systems                           • Scheduling                       • Reporting
    •   Assets                            • Procedures                       • Dashboards
    •   Mobile Devices                    • API/Messaging                    • Interactive Data Views
    •   Network Devices


         IT Configuration Management                                  Business Continuity
•   Remote Management       •   Image Deployment      •   Image Backup               •   File & Folder Backup
•   Software Deployment     •   Desktop Migration     •   Image Virtualization
•   Power Management        •   Mobile Device
                                Management
                  Asset Management                                       Service Delivery
•   Network Discover & AD   •   Asset Management      •   Service Desk/Ticketing     •   Policy Compliance
• Hardware/Software         •   Virtual Machine       •   Policy Management          •   Time Tracking
                                Management            •   Service Billing


                      Security                                        Systems Monitoring
•   AntiVirus               •   Patch Management      •   Systems Checks & Alerts    •   Agent-less Monitoring
•   AntiMalware             •   Software Updates      •   Agent Monitoring           •   Log Monitoring
                                                      •   Enterprise Monitoring

                                                                                                 www.kaseya.com
www.kaseya.com
Our Vision




“Providing Enterprise-Class IT Systems
      Management for Everybody”
                                  www.kaseya.com
Q&A & Final Thoughts

Discover:
Attend a solution
Overview:
kaseya.com/ITdemo

Contact us:
1 (877) 926-0001
sales@kaseya.com

Learn more:
www.kaseya.com

Más contenido relacionado

Más de Kaseya

Más de Kaseya (20)

365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
 
Kaseya BYOD Suite
Kaseya BYOD SuiteKaseya BYOD Suite
Kaseya BYOD Suite
 
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...MSP Best Practice  Integrating your RMM with your PSA Solution for Maximum Pr...
MSP Best Practice Integrating your RMM with your PSA Solution for Maximum Pr...
 
Making Money in the Cloud Part II…Is Your MSP Team Ready?
Making Money in the Cloud   Part II…Is Your MSP Team Ready?Making Money in the Cloud   Part II…Is Your MSP Team Ready?
Making Money in the Cloud Part II…Is Your MSP Team Ready?
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

10 Concepts That Are Sure to Impact IT Professionals in 2013

Notas del editor

  1. ANSWER OPTIONS: Cost to support multiple systems greater than a single system OEM costs higher User management difficult Deployment more complex
  2. Think to yourself how many point solutions you have in place to manage systemsIf we review history a bit it becomes obvious why point solutions are quickly becoming a thing of the past. I may be showing my age here…but let’s review how point solutions were born.Information Systems was part of the finance organizationDirector of Management Information Systems reported to CFOThe majority of computing data was finance related. I.E. Payroll, Accounts Payable, Accounts Receivable, etc.There was no such role as a C-Level executive for ITSo…many of the computing challenges and issues were departmental in scope. Jeff…Do you remember Windows for Workgroups?My point is…many organizations solved problems at the departmental level.As technology evolved and directories like X500, NDS and Active Directory were born…we began sharing data company-wide and solving issues company-wide became a reality. The IT Director took a seat at the table with the executives and became the CIO, and today data is the “life blood” of an organization. How a company leverages and protects their data gives them a strategic market advantage and ensures the viability of the organization. With this evolution data access and security remains a company-wide challenge. Fast forward to today…CIOs are looking to change the perception of IT in their organization. Instead of being viewed as a necessary evil or a cost center, they are looking to prove the strategic value of IT. They are looking to demonstrate and document how they directly impact company goals and tie to revenue. Creating this type of visibility and awareness means moving away from silos of data created by point solutions to a single source of truth that offers transparency into SLAs.
  3. ANSWER OPTIONS: Close to 100% About75% About 50% 25% of less
  4. Remember the good ole’ days of the predicable, always connected network? We had LANs, CANs, MAN, WANs. Everything was connected through predicable pipes. We figured out how to segment data and give priority to certain users and applications to use highly expensive wide area network pipes. We always knew who was on the network. The network interface cards (NIC) had to be configured to work on the right IRQ. If you worked from home you would “upload” your data when you got back to the office.The reality of today…people need access to company data from anywhere. Collaboration is happening everywhere…in real-time. People are working from home, from coffee houses, from planes, trains, and automobiles…literally. The corporate network is becoming elastic and ever changing.IT expected to support their customers regardless of their location. Laptops are expected to be remote. Some organizations support home machines occasionally connected via VPN as well. Most tools don’t connect to tools
  5. On top of the elasticity of the network…employees want access to company data from all kinds of devices…and the corporate desktop is not the device of choice these days.They want to check their email on their smartphone, collaborate on a presentation or spreadsheet on their tablet and catch up on work using their laptops after putting the kids to bed for the night. Let’s face it…payroll is the highest cost of any organization. Creating an environment where people can work anytime leads to higher productivity per employee.-------------Each device is supported differently (mobile vs laptop vs desktopvs tablet) and depending upon where it is located.Each device has different sets of expectations (mobile wipe vs laptop encryption)
  6. BYOD happens. Varying devicesNew security policies- Support still will sometimes come to IT
  7. With the consumerization of IT employees want to and ARE USING the device of choice to do their jobs from anywhere. Companies embracing this evolution in IT are embracing the cloud to securely make their corporate data available everywhere.Cloud represents a hybrid integration into the corporate environment. Must integrate users, systems, staff, etc.It I clearly not a fad and the companies ahead of this shift have a competitive advantage. Live in the cloud.
  8. ANSWER OPTIONS: Most About half Less than half None
  9. Cybercriminals have learned that the endpoint is where to targetEnd users typically have enough credentials to gather significant data / financialServer environments too hard to get into directly….must enter via end user machinesEndpoints sometimes travel outside the network into less protected areasEnd users can be fooled easily (SPAM, Joke email, etc.)
  10. IT environments are hybrid with a mix of machines. Expectations of IT is to support it allWindows phone, surface tablets, and windows 8 has a place in your world. Heterogeneous networks are a reality. Instead of fighting it…embrace it. Learn how to support Android, iOS and Windows devices.It is going to happen anyway…so
  11. BYOD and Cloud bring IT options directly to the employeeNeed to make them smarter computing community
  12. They can be managed!!Hybrid environment
  13. Automating recurring IT tasksPatch UpdatesStandardization of ProcessesEveryone is always being tasked to do more with less. As complexity increases with systems, rules and regulations it becomes difficult to automate much of the daily tasks to ensure the overall health, wellness and security. Kaseya is all about automation, which can mean many things… one of which is applying one thing to many machines, Like Patch. Patch management example of automating deployment based on policy across all machines, handling file downloads centrally and dealing with reboots in a way that doesn’t impact users.By using a policy based approach to important tasks such as deployment and security we can ensure consistency of approach to minimize network and user impact. Auomated systems run the process directly on the machines so they can be done out of hours or even while users are working without disturbing them.Jonathan:How has a systems management solution like Kaseya allowed you to automate the management of deployment such as patches and everything that comes along with that like rebooting machines, or making sure the right machines get the right patches?
  14. Automating recurring IT tasksPatch UpdatesStandardization of ProcessesEveryone is always being tasked to do more with less. As complexity increases with systems, rules and regulations it becomes difficult to automate much of the daily tasks to ensure the overall health, wellness and security. Kaseya is all about automation, which can mean many things… one of which is applying one thing to many machines, Like Patch. Patch management example of automating deployment based on policy across all machines, handling file downloads centrally and dealing with reboots in a way that doesn’t impact users.By using a policy based approach to important tasks such as deployment and security we can ensure consistency of approach to minimize network and user impact. Auomated systems run the process directly on the machines so they can be done out of hours or even while users are working without disturbing them.Jonathan:How has a systems management solution like Kaseya allowed you to automate the management of deployment such as patches and everything that comes along with that like rebooting machines, or making sure the right machines get the right patches?
  15. Automating recurring IT tasksPatch UpdatesStandardization of ProcessesEveryone is always being tasked to do more with less. As complexity increases with systems, rules and regulations it becomes difficult to automate much of the daily tasks to ensure the overall health, wellness and security. Kaseya is all about automation, which can mean many things… one of which is applying one thing to many machines, Like Patch. Patch management example of automating deployment based on policy across all machines, handling file downloads centrally and dealing with reboots in a way that doesn’t impact users.By using a policy based approach to important tasks such as deployment and security we can ensure consistency of approach to minimize network and user impact. Auomated systems run the process directly on the machines so they can be done out of hours or even while users are working without disturbing them.Jonathan:How has a systems management solution like Kaseya allowed you to automate the management of deployment such as patches and everything that comes along with that like rebooting machines, or making sure the right machines get the right patches?
  16. Needs to be cleaned up.