Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst
|
|
- Silas Franklin
- 6 years ago
- Views:
Transcription
1 ESG Lab Review Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst Abstract: This ESG Lab Review documents hands-on testing of Shavlik Protect with a focus on simplicity and manageability. The Challenges Security operations in today s data centers are becoming increasingly complex to manage. IT professionals must keep their systems up to date with the ever-increasing release frequency of the latest operating system, application, and database security patches required to ensure a protected and well-performing environment. The process of identifying, downloading, coordinating, implementing, verifying, and troubleshooting patches is time consuming and does not scale well. The process is inefficient, error prone, and often negatively affects the end-user experience of the systems under management. In a recent ESG poll, IT professionals were asked about the challenges they face in securing IT assets in their data centers. Nearly half (46%) of respondents said that keeping up with the latest security threat intelligence is one of the biggest challenges for their organizations (see Figure 1). Other significant challenges included monitoring networks and servers, detecting suspicious security events, and keeping up with patches and configuration changes. 1 Figure 1. Challenges Protecting IT Assets Residing in Data Centers In your opinion, what are the biggest challenges your organization faces with regard to protecting the IT assets residing in its data centers? (Percent of respondents, N=395, multiple responses accepted) Keeping up with the latest security threat intelligence Monitoring network activities 44% 46% Monitoring server activities Patching systems in a timely manner Event detection Keeping up with technology changes Scanning for vulnerabilities on a regular basis 39% 38% 37% 37% 36% 0% 10% 20% 30% 40% 50% Source: Enterprise Strategy Group, Source: ESG Research Brief, Top Security Challenges for IT Assets Residing in Data Centers, May The goal of ESG Lab reports is to educate IT professionals about data center technology products for companies of all types and sizes. ESG Lab reports are not meant to replace the evaluation process that should be conducted before making purchasing decisions, but rather to provide insight into these emerging technologies. Our objective is to go over some of the more valuable feature/functions of products, show how they can be used to solve real customer problems and identify any areas needing improvement. ESG Lab s expert third-party perspective is based on our own hands-on testing as well as on interviews with customers who use these products in production environments. This ESG Lab report was sponsored by LANDesk.
2 ESG Lab Review: Shavlik Protect: Simplifying Patch, Threat, and Power Management 2 The Solution: Shavlik Protect Shavlik Protect is a multi-function tool that enables organizations to easily perform patch management, threat management, and power management tasks on the physical and virtual machines within a network. By simplifying and automating system management tasks, Shavlik delivers enterprise IT capabilities without the cost and complexity that are commonly associated with today s IT environments. This helps to improve the time-to-value for organizations and IT professionals from months to minutes. Shavlik bundles best-in-class patch management with asset inventory, power management, and antivirus protection in an easy-to-use, centralized console. With agentless asset discovery, update support for a broad range of trusted applications, and a single console, organizations can increase operational efficiency without increasing management overhead and cost. Figure 2. Shavlik Protect Any Patch, Anywhere Technology Scan applications (Microsoft and third party) running on machines within an organization s network, assess the current patch status on those machines, and then, when missing patches are found, deploy them. A custom patch editor is also available that allows IT administrators to create and maintain custom patches on certain machines, enabling any program on the network to be patched. Offline Virtual Machine Patching Ensure offline virtual images are in a constant state of readiness to be deployed. IT administrators can verify that all physical, virtual, and offline machines have received specific critical patches and that all are protected. Agentless and Agent-based Solutions Meet the needs of diverse enterprise applications through a blend of agentless and agent-based operations that provide a highly configurable architecture. A flexible agent can easily be deployed when necessary while an agentless implementation can provide complete coverage and reduce management overhead sometimes related to deploying agents. Antivirus and Antispyware Deliver superior patching plus antivirus in a single agent for the same cost as a normal antivirus-only solution through the Sunbelt VIPRE Enterprise Antivirus and Antispyware engine. Physical and Virtual Asset Management Bring comprehensive asset discovery to any organization with a unique agent-based and agentless architecture. Discover physical and virtual machines previously unknown to be on the network and software previously unknown to be installed on those machines. This allows organizations to address every machine on the network, including servers, laptops, machines in the DMZ, and machines with bandwidth constraints. Cloud Agent Install patches from the cloud through a cloud agent that functions without ever connecting directly to the Shavlik Protect console. Agent policies are uploaded from the console to the cloud where they are available to be downloaded by the agents. Agent results are uploaded to the cloud and then downloaded to the Shavlik Protect console.
3 Simplicity ESG Lab Review: Shavlik Protect: Simplifying Patch, Threat, and Power Management 3 In this section of the review, ESG Lab validates the simplicity of using the patch management feature of Shavlik Protect. This includes scanning a machine group for assets and missing patches, reviewing the results, and deploying the missing patches. ESG Lab started at the home screen of Shavlik Protect. The home screen, shown in Figure 3, consisted of four sections that are required to complete a scan. In the top left, ESG Lab created a name for the operation. In the bottom left, ESG Lab selected the desired machine group where the operation would run. In the top right, ESG Lab defined the schedule. And in the bottom right, ESG Lab selected which operation to run, which was a Full Asset Scan. Figure 3. Shavlik Protect Home Page After hitting the Scan Now button, an operations monitor window appeared that automatically stepped through a process including logging on to each machine in the machine group using predefined credentials and scanning the machine registry to pull out all asset information. After completing the asset scan, ESG Lab ran an out-of-the-box Security Patch Scan on the same set of machines. This scan looked at security patches of all levels of criticality for all products found from the asset scan. A view of the operations monitor is shown in Figure 4. Figure 4. Shavlik Protect Operations Monitor
4 ESG Lab Review: Shavlik Protect: Simplifying Patch, Threat, and Power Management 4 Once the patch scan was completed, ESG Lab viewed a summary of the completed results, which broke down the results in a much more granular level. This interface is used to provide all the details to IT administrators so they can figure out which machines they should or shouldn t patch based on the needs of the system. From here, ESG Lab viewed how many patches were missing both collectively and individually for the group of machines. When all four machines were selected, ESG Lab saw that 84 patches were missing. Then by clicking on an individual machine, ESG Lab saw the patches that were missing for that particular machine with information like whether a patch can be uninstalled once it s already been installed or whether the patch has already been downloaded in a previous process. Finally, using the same interface, ESG Lab selected a missing patch and deployed it using an easy-to-follow deployment configuration window, which required information about a deployment time frame and reboot options. The patch deployment selection and deployment configuration windows are shown in Figure 5. Figure 5. Deploying a Patch As shown in Figure 6, ESG Lab followed along in Operations Monitor and was able to watch in real time as the patch was downloaded, verified, built to deploy, and deployed. By clicking the View in Tracker link, ESG Lab watched as the state of the deployment was executing on the selected machine. Figure 6. Shavlik Protect Deployment Tracker
5 ESG Lab Review: Shavlik Protect: Simplifying Patch, Threat, and Power Management 5 Why This Matters Organizations continue to struggle with patch management for physical and virtual machines within their networks. Though Microsoft has helped solve the problem for Windows users, keeping third-party applications up to date is still a complex task. Many organizations still rely heavily on manual processes that take time and fail to meet the needs of ever-growing data center requirements, which eventually can lead to operational inefficiency and security falling further behind. ESG Lab validated that Shavlik Protect simplified the patching of systems by providing a centralized patch management, asset inventory, and legacy physical system integrated solution. ESG Lab quickly scanned a group of agentless computers to identify their application assets, learned what patches were missing from those machines based on their assets, and successfully deployed a specific patch to an individual machine. The entire process was completed from a single interface and although a low-level of granularity was available, ESG Lab was impressed with the intuitiveness of every step. It was quite apparent to ESG Lab that with the level of simplicity offered from Shavlik Protect, IT professionals could radically reduce an organization s timeto-value from months to minutes. Manageability In this section of the review, ESG Lab validates the ease of management offered by Shavlik Protect. This includes the ability to easily manage a large number of unique physical and virtual machines, and meet the flexibility requirements of machines running a Shavlik agent. ESG Lab began this phase of testing by identifying a group of servers and creating a machine group. This process can be done in multiple ways, including specifying a machine name, scanning a domain, scanning Active Directory, or selecting a hosted virtual machine with correctly supplied credentials. ESG Lab quickly and easily grouped a large number of machines together with the same patch and security requirements into a single machine group. As shown in Figure 7, ESG Lab was able to select entire virtual environments with just a few mouse clicks. Figure 7. Creating a Machine Group
6 ESG Lab Review: Shavlik Protect: Simplifying Patch, Threat, and Power Management 6 After creating the large-encompassing machine group, ESG Lab created a custom template that could be used on that machine group. The template was assigned the name Show All Effectively Installed Patches. ESG Lab selected Scan All, which will scan all of the available products on each machine in the machine group for every security patch, security tool, and non-security patch at all levels of criticality. Alternately, the Shavlik software offers the flexibility to scan a machine for specific products and/or updates. This fine level of granularity was particularly impressive to ESG Lab. A view from the custom Patch Scan Template is shown in Figure 8. Figure 8. Custom Patch Scan Templates Next, ESG Lab learned about Shavlik s ability to control power management by scheduling shutdowns and wake ups of machines. Using standard magic packet technology, ESG Lab used the wake-up LAN tool, which automatically turns on a system when the command is issued. This feature is commonly used prior to patching or doing any other maintenance to a machine group in the middle of the night when workers aren t around. Similarly, ESG Lab also saw how to schedule shutdowns for a group of machines. The power management options are shown in Figure 9. Figure 9. Power Management
7 ESG Lab Review: Shavlik Protect: Simplifying Patch, Threat, and Power Management 7 Up to this point, ESG Lab had focused primarily on Shavlik s agentless technology. ESG Lab also tested Shavlik Protect with the use of an agent, which can provide some flexibility and meet the demands of a mobile workforce constantly on the go. Creating a template for systems running an agent, for example a laptop, gave the same level of granularity as the agentless interface. The only difference was a checkbox that allowed a scan to be run on boot if the scan schedule was missed. In other words, if a laptop is powered off in a bag somewhere, then the next time it boots, a scan will run. After learning how to create a machine group, configure custom scan templates, run scans, and patch agentless and agent-based machines. ESG Lab moved to the reporting aspect. After a particular scan was run on the large machine group, ESG Lab was able to customize and generate a report that can be used to help IT administrators understand what has been completed from the perspective of scanning and patching. A view of the report generation interface is showing in Figure 10. Figure 10. Custom Reporting Up to this point, ESG Lab had tested scenarios where Shavlik Protect users always had access to a corporate network, whether on premise behind a corporate firewall or off premise with access to the corporate network through a VPN. The final piece of testing looked at protecting machines that were off premise and unable to connect to the Shavlik Protect console within a corporate network. This scenario required the use of the new Shavlik Protect Cloud. With the Protect Cloud, as long as an agent machine has access to the internet, the machine will be able to get updates and send results using the cloud. First, ESG Lab registered a Shavlik Protect Console with the Protect Cloud service. From the main Shavlik Interface, ESG Lab navigated to the Operations interface and selected the Protect Cloud Sync tab, as shown in Figure 11. ESG Lab selected the proper credentials for the account and then clicked the Register this console button to register the console with the cloud. After the console was registered, existing agent policies could be edited to sync with the Protect Cloud. For already deployed agents that used the old agent policy, the next time they check in with the Shavlik Protect console they will receive the updated policy that allows them to use the Protect Cloud as a backup source for receiving policy updates and reporting information. For newly installed agents, the policy will immediately provide access to the Protect Cloud.
8 Figure 11. Protect Cloud ESG Lab Review: Shavlik Protect: Simplifying Patch, Threat, and Power Management 8 Why This Matters When it comes to the administration of patch management, many organizations rely heavily on manual processes for a multitude of critical tasks. This methodology is no longer adequate to meet data center scaling requirements, especially with the increased number of virtual environments, the globalization of data centers, and the growing mobile workforce. There is a clear necessity for increased automation and simplified monitoring and management to properly administer the complex IT system patch management process. ESG Lab confirmed that Shavlik Protect can easily meet the management and scalability requirements of an enterprise organization. Using Active Directory, ESG Lab quickly identified a group of machines with the same protection requirements, grouped them together, and created a custom scan template for the large machine group. Then ESG Lab witnessed the power management capabilities of Shavlik Protect by scheduling wake-up LAN requests to power on machines during non-work hours for patching and shutting down the machines when unused. After looking entirely at the agentless technology, ESG Lab learned about the solution s flexibility for the employees constantly on the go by configuring agent-based protection for a laptop the exact same way agentless technology was configured. ESG Lab also saw how the new Protect Cloud could easily be configured to maintain the protection and control needed for the off premise employees without access to the corporate network. Finally, everything was completed from a single interface, including configuration, monitoring, execution, and reporting, truly highlighting the manageability and flexibility of the solution.
9 The Bigger Truth ESG Lab Review: Shavlik Protect: Simplifying Patch, Threat, and Power Management 9 What is your organization doing in regards to patch management today? The most common response is Windows Update. Though Windows Update is freely available and comes standard in Windows environments, it manages Microsoft applications only. When it comes to patching third-party applications, IT end-users usually rely on either manual patching, automatic updates for individual applications, or in the worst case, nothing at all. This is unacceptable for applications that are being used on private corporate networks that require high levels of security. Every organization needs to have a plan for managing IT and at a high level, there are five main areas to concentrate on: a way to inventory all software and hardware assets, a way to enforce configurations and compliance across all of those assets, a way to protect those assets, a way to patch those assets, and a way to control the powering on and off of those assets based on their usage needs. Shavlik Protect addresses all of these concerns and more by helping to centrally manage and control diverse IT environments through an easy-to-use interface that provides value in minutes after install. ESG Lab validated that Shavlik Protect helped reduce the complexity of managing IT by easily meeting the needs of anysized organization. Through centralized management and agentless technology, ESG Lab quickly scanned an organizations physical and virtual assets within a machine group, identified all pieces of software, found missing patches, and deployed new patches. Using the operations monitor, ESG Lab followed along in real time as each stage of the process completed. To meet the scalability needs of a growing, mobile organization, ESG Lab learned how to create custom templates and larger machine groups using Active Directory. Then, using the power management capabilities of the software, ESG Lab was able to send wake-up LAN functions to machines that were turned off or shut down machines that were unnecessarily powered on. The flexibility of the solution was witnessed when seeing how an organization s mobile workforce could remain up to date and protected by using agent-based technology on a laptop that provided the same capabilities as the agentless technology. Whether accessing the Shavlik Protect console through VPN or leveraging the new Protect Cloud capabilities, off premise protection can be easily managed and monitored. Finally, ESG Lab saw how the automatic report generation was used to constantly manage what had been completed and on which machine group. Shavlik Protect can easily improve an organization s time-to-value from months to minutes. This is done by simplifying the most important systems management challenges in today s IT environments by enabling organizations to manage both physical and virtual machines, deploy software updates, discover assets, and ensure endpoint security. If your organization is looking for an IT system management solution, look no further than Shavlik Protect. All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at
i365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer
ESG Lab Review i365 EVault for Microsoft System Center Data Protection Manager Date: October 2010 Authors: Ginny Roth, Lab Engineer, and Tony Palmer, Senior Engineer Abstract: This ESG Lab review documents
More informationTechnical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform
Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Date: October, 2018 Author: Jack Poller, Sr. Analyst The Challenges Enterprise Strategy Group
More informationForeScout Extended Module for Splunk
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look
More information(TBD GB/hour) was validated by ESG Lab
(TBD GB/hour) was validated by ESG Lab Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Protecting Virtual Environments with Spectrum Protect Plus from IBM Date: November 2017 Author:
More informationIBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments
The Challenges ESG Lab Review IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments Date: August 2015 Author: Vinny Choinski, Senior
More informationTop 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)
ESG Lab Review Sophos Security Heartbeat Date: January 2016 Author: Tony Palmer, Sr. ESG Lab Analyst; and Jack Poller, ESG Lab Analyst Abstract: This report examines the key attributes of Sophos synchronized
More informationESG Lab Review RingCentral Mobile Voice Quality Assurance
ESG Lab Review RingCentral Mobile Voice Quality Assurance Abstract This ESG Lab Review documents hands-on testing of RingCentral Office to verify its ability to assure high quality of service (QoS) for
More informationNetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst
ESG Lab Spotlight NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab Spotlight explores how NetApp Data ONTAP 8.2 Storage QoS can
More informationAbstract. The Challenges. The Solution: Veritas Velocity. ESG Lab Review Copy Data Management with Veritas Velocity
ESG Lab Review Copy Data Management with Veritas Velocity Enterprise Strategy Group Getting to the bigger truth. Date: June 2017 Author: Vinny Choinski, Senior Lab Analyst; and Jason Buffington, Principal
More informationAbstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness
ESG Lab Review Lumeta Spectre: Cyber Situational Awareness Date: September 2017 Author: Tony Palmer, Senior IT Validation Analyst Enterprise Strategy Group Getting to the bigger truth. Abstract ESG Lab
More informationLab Validation Report
Lab Validation Report NetApp SnapManager for Oracle Simple, Automated, Oracle Protection By Ginny Roth and Tony Palmer September 2010 Lab Validation: NetApp SnapManager for Oracle 2 Contents Introduction...
More informationESG Lab Review Accelerating Time to Value: Automated SAN and Federated Zoning with HPE 3PAR and Smart SAN for 3PAR
ESG Lab Review Accelerating Time to Value: Automated SAN and Federated Zoning with HPE 3PAR and Smart SAN for 3PAR Date: May 2018 Author: Jack Poller, Senior Analyst Abstract This ESG Lab Review documents
More informationRunning Splunk on VxRack FLEX
ESG Technical White Paper Running Splunk on VxRack FLEX Background As organizations continue to look for ways to modernize their infrastructures by delivering a cloud-like experience onpremises, hyperconverged
More informationLab Validation Report
Lab Validation Report Citrix XenServer 6.0 Server Virtualization for Enterprise Applications By Mike Leone and Vinny Choinski January 2012 Lab Validation: Citrix XenServer 6.0 2 Contents Introduction...
More informationIBM Data Protection for Virtual Environments:
ESG Lab Review IBM Data Protection for Virtual Environments: Tivoli Storage Manager for VMware Version 7.1 and FlashCopy Manager for VMware Version 4.1 Date: August 2014 Author: Vinny Choinski, Senior
More informationRSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
More informationESG FIELD AUDIT. Asigra Hybrid Cloud Backup and Recovery Solutions. By Brian Garrett With Tony Palmer. May, 2009
ESG FIELD AUDIT Asigra Hybrid Cloud Backup and Recovery Solutions By Brian Garrett With Tony Palmer May, 2009 Table of Contents ESG FIELD AUDIT Table of Contents... i Introduction... 1 Background... 1
More informationHyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale
Enterprise Strategy Group Getting to the bigger truth. White Paper Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale By Mike Leone, ESG Senior Analyst;
More informationClosing the Hybrid Cloud Security Gap with Cavirin
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations
More informationAbstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight
ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group
More informationEnabling Hybrid Cloud Transformation
Enterprise Strategy Group Getting to the bigger truth. White Paper Enabling Hybrid Cloud Transformation By Scott Sinclair, ESG Senior Analyst November 2018 This ESG White Paper was commissioned by Primary
More informationAlways Available Dell Storage SC Series Date: October 2015 Author: Brian Garrett, VP ESG Lab
ESG Lab Review Always Available Dell Storage SC Series Date: October 2015 Author: Brian Garrett, VP ESG Lab Abstract: This report documents ESG Lab testing of Dell Storage SC Series with a focus on the
More informationDell EMC Isilon All-Flash
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Validation Dell EMC Isilon All-Flash Scale-out All-flash Storage for Demanding Unstructured Data Workloads By Tony Palmer, Senior Lab Analyst
More informationVideo Surveillance Solutions from EMC and Brocade: Scalable and Future-proof
White Paper Video Surveillance Solutions from EMC and Brocade: Scalable and Future-proof By Dan Conde, Analyst December 2015 This ESG White Paper was commissioned by EMC and Brocade and is distributed
More informationHPE SimpliVity Hyperconverged Infrastructure for VDI Environments
Enterprise Strategy Group Getting to the bigger truth. ESG Technical Review HPE SimpliVity Hyperconverged Infrastructure for VDI Environments Date: June 2017 Author: Mike Leone, Senior Validation Analyst
More informationMarket Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010.
Market Report Scale-out 2.0: Simple, Scalable, Services- Oriented Storage Scale-out Storage Meets the Enterprise By Terri McClure June 2010 Market Report: Scale-out 2.0: Simple, Scalable, Services-Oriented
More informationA: Administering System Center Configuration Manager
20703-1A: Administering System Center Configuration Manager Duration: 5 days; Instructor-led WHAT YOU WILL LEARN This five-day course describes how to use Configuration Manager and its associated site
More informationDisk-based Backup with Data De-duplication
Disk-based Backup with Data De-duplication By Claude Bouffard With Brian Garrett March, 2008 Copyright 2008, The Enterprise Strategy Group, Inc. All Rights Reserved Table of Contents...i Introduction...1
More informationReference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst
Research Brief Reference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst Abstract: ESG Reference Research includes data-centric reports and
More informationVeritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid
Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Date: September 2015 Authors: Jason Buffington, Senior
More informationEfficient Data Center Virtualization Requires All-flash Storage
White Paper Efficient Data Center Virtualization Requires All-flash Storage By Scott Sinclair, Storage Analyst November 2015 This ESG White Paper was commissioned by Pure Storage and is distributed under
More informationAdministering System Center Configuration Manager
Course 20703-1A: Administering System Center Configuration Manager Course Outline Module 1: Managing computers and mobile devices in the enterprise This module describes the features of Configuration Manager
More information(TBD GB/hour) was validated by ESG Lab
(TBD GB/hour) was validated by ESG Lab Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review Efficiently Protect Virtual Environments with Integrated Data Protection Appliances from Dell
More informationForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.
Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do
More informationIvanti Patch for Windows Servers. Quick Start Guide
Ivanti Patch for Windows Servers Quick Start Guide Copyright and Trademarks Copyright and Trademarks This document contains the confidential information and/or proprietary property of Ivanti, Inc. and
More informationThe Role of Converged and Hyper-converged Infrastructure in IT Transformation
Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationAbstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016
ESG Lab Review Proofpoint Advanced Threat Protection Enterprise Strategy Group Getting to the bigger truth. Date: January 2017 Author: Tony Palmer, Senior Lab Analyst; and Jack Poller, Senior Lab Analyst
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationZero Branch IT with Riverbed SteelFusion
Enterprise Strategy Group Getting to the bigger truth. Lab Review Zero Branch IT with Riverbed SteelFusion Date: March 2016 Author: Aviv Kaufmann and Jack Poller, Senior ESG Lab Analysts Abstract: This
More informationAdministering System Center Configuration Manager
Administering System Center Configuration Manager Course 20703-1A 5 Days Instructor-led, Hands on Course Information This five-day course describes how to use Configuration Manager and its associated site
More informationADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER
ADMINISTERING SYSTEM CENTER CONFIGURATION MANAGER Course Code: 20703-1a Duration 5 days Introduction This five-day course describes how to use Configuration and its associated site systems to efficiently
More informationLab Validation Report
Lab Validation Report HP ConvergedSystem 200- HC StoreVirtual Rapidly Deploying an Easy- to- Manage, Reliable Virtualized Infrastructure By Mike Leone, ESG Lab Analyst August 2015 Lab Validation: HP ConvergedSystem
More informationA Practical Guide to Efficient Security Response
A Practical Guide to Efficient Security Response The Essential Checklist Start The Critical Challenges to Information Security Data breaches constantly threaten the modern enterprise. And the risk continues
More informationESG Lab Review. The Challenges
ESG Lab Review Dell FluidFS v5: Flexible and Secure Scale-out File System Date: February 2016 Author: Aviv Kaufmann, Senior ESG Lab Analyst and Mike Leone, Senior ESG Lab Analyst Abstract: This ESG Lab
More informationAdministering System Center Configuration Manager
Administering System Center Configuration Manager 20703-1; 5 Days; Instructor-led Course Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationModernizing Virtual Infrastructures Using VxRack FLEX with ScaleIO
Background As organizations continue to look for ways to modernize their infrastructures by delivering a cloud-like experience onpremises, hyperconverged offerings are exceeding expectations. In fact,
More informationESG Lab Report. Integrated Platforms for Breakthrough Insights. The HP and Microsoft Data Management Portfolio
ESG Lab Report Integrated Platforms for Breakthrough Insights The HP and Microsoft Data Management Portfolio By Brian Garrett, Vice President, ESG Lab May 2013 Lab Validation: HP and Microsoft Data Management
More informationHow can you manage what you can t see?
How can you manage what you can t see? Know what you have with Panda Cloud Systems Management Business challenge: You can t manage it if you don t know it exists. Do you have 100% permanent visibility
More informationeguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments
eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments Today s PCI compliance landscape is one of continuing change and scrutiny. Given the number
More informationCloud Migration Strategies
Enterprise Strategy Group Getting to the bigger truth. Research Insights Paper Cloud Migration Strategies Mapping the Journey to Successful Cloud Adoption By Dan Conde, ESG Analyst; and Leah Matuson, Research
More informationESG Lab Review The Performance Benefits of Fibre Channel Compared to iscsi for All-flash Storage Arrays Supporting Enterprise Workloads
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review The Performance Benefits of Fibre Channel Compared to iscsi for All-flash Storage Arrays Supporting Enterprise Workloads Date: July
More informationThe State of Cloud Monitoring
REPORT The State of Cloud Monitoring Survey Reveals Visibility is Key to Cloud Security and Performance INTRODUCTION Ixia, a Keysight business, commissioned Dimensional Research to conduct a survey measuring
More informationWho Better than Dell EMC to Offer Best-for-VMware Data Protection?
Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Who Better than Dell EMC to Offer Best-for-VMware Data Protection? Date: August 2017 Author: Jason Buffington, Principal Analyst
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSoftware-defined Storage by Veritas
ESG Technology Showcase Software-defined Storage by Veritas Date: August 2015 Author: Scott Sinclair, Analyst Abstract: The days of enterprise storage technology being predominantly constrained to specific
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationLAB VALIDATION REPORT
LAB VALIDATION REPORT Dell PowerVault DL2000 Powered by Symantec Backup Exec By Claude Bouffard With Tony Palmer December, 2008 Table of Contents ESG LAB VALIDATION Table of Contents... i Introduction...
More informationWHITE PAPER. Desktop Virtualization Efficiencies with Citrix and NetApp. By Mark Bowker. October, 2008
WHITE PAPER Desktop Virtualization Efficiencies with Citrix and NetApp By Mark Bowker October, 2008 Table of Contents Table of Contents... i Executive Summary... 1 Virtualization is Sweeping Through the
More informationESG Research. Executive Summary. By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst
ESG Research Executive Summary The Expanding Role and Importance of Application Delivery Controllers (ADCs) By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst February 2015 This ESG
More informationAdministering System Center 2012 Configuration Manager (10747D)
Administering System Center 2012 Configuration Manager (10747D) Overview This course describes how to configure and manage a System Center 2012 R2 Configuration Manager site and its associated site systems.
More information"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary
MOC 20703-1A: Administering System Center Configuration Manager Course Summary Description This five-day course describes how to use Configuration Manager and its associated site systems to efficiently
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationTable Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9
Table Of Contents INTRODUCTION... 6 USER GUIDE... 8 Software Installation... 8 Installing MSI-based Applications for Users...9 Installing EXE-based Applications for Users...10 Installing MSI-based Applications
More informationLab Validation Report
Lab Validation Report EMC Avamar 6.0 Next Generation Backup & Recovery By Vinny Choinski with David Chapa June 2011 Lab Validation: EMC Avamar 6.0 2 Contents Introduction... 3 Background... 3 EMC Avamar
More informationCourse A: Administering System Center Configuration Manager
Course 20703-1A: Administering System Center Configuration Manager Overview: This five-day course describes how to use Configuration Manager and its associated site systems to efficiently manage network
More informationTechnical Review Diamanti D10 Bare-metal Container Platform
Technical Review Diamanti D10 Bare-metal Container Platform Date: January 2019 Author: Kerry Dolan, Senior IT Validation Analyst Enterprise Strategy Group Getting to the bigger truth. Abstract This ESG
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationAdministering System Center 2012 Configuration Manager
Course 10747: Administering System Center 2012 Configuration Manager Page 1 of 8 Administering System Center 2012 Configuration Manager Course 10747: 4 days; Instructor-Led Introduction This four-day instructor-led
More informationTRAPS ADVANCED ENDPOINT PROTECTION
TRAPS ADVANCED ENDPOINT PROTECTION Technology Overview Palo Alto Networks White Paper Most organizations deploy a number of security products to protect their endpoints, including one or more traditional
More informationRisk Intelligence. Quick Start Guide - Data Breach Risk
Risk Intelligence Quick Start Guide - Data Breach Risk Last Updated: 19 September 2018 --------------------------- 2018 CONTENTS Introduction 1 Data Breach Prevention Lifecycle 2 Choosing a Scan Deployment
More informationA Roadmap for BYOD Adoption. By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst
White Paper A Roadmap for BYOD Adoption By Jon Oltsik, Sr. Principal Analyst, and Bob Laliberte, Sr. Analyst April 2012 This ESG White Paper was commissioned by Enterasys and is distributed under license
More informationVMAX3: Adaptable Enterprise Resiliency
ESG Solution Showcase VMAX3: Adaptable Enterprise Resiliency Date: August 2015 Author: Scott Sinclair, Analyst Abstract: As enterprises respond to the ever- present reality of rapid data growth, IT organizations
More informationAbstract: Data Protection Cloud Strategies
Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data
More informationMicrosoft Administering System Center Configuration Manager
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20703-1 Administering System Center Configuration Manager Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course describes how to
More informationESG Lab Review Application-aware Management, Visibility, and Analytics in Virtualized Environments with Uila
ESG Lab Review Application-aware Management, Visibility, and Analytics in Virtualized Environments with Uila Date: April 2017 Author: Mike Leone, Senior Lab Analyst Enterprise Strategy Group Getting to
More informationBMC s Cloud Lifecycle Management
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Validation BMC s Cloud Lifecycle Management Full Stack Service Provisioning, Security, and Compliance Across Cloud and Traditional Environments
More informationEnabling IT Transformation with Modern Data Protection Strategies
Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief Enabling IT Transformation with Modern Data Protection Strategies The Quantified Benefits of a Comprehensive Data Protection
More informationWhite. Paper. The Application Deluge and Visibility Imperative. How to Ensure Network Performance for Your Business-critical Applications.
White Paper The Application Deluge and Visibility Imperative How to Ensure Network Performance for Your Business-critical Applications By Dan Conde, Analyst May 2015 This ESG White Paper was commissioned
More informationMastering The Endpoint
Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More
More informationSecuring Your Environment with Dell Client Manager and Symantec Endpoint Protection
Securing Your Environment with Dell Client Manager and Symantec Endpoint Protection Altiris, Now Part of Symantec Copyright 2007 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
More informationDuration Level Technology Delivery Method Training Credits. System Center Configuration Manager
NE-20703-1A Administering System Center Summary Duration Level Technology Delivery Method Training Credits 5 Days Advanced System Center Classroom ILT Virtual ILT On Demand SATV Introduction This 5-day
More informationDATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.
RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE. KEY CUSTOMER BENEFITS: Gain complete visibility into all endpoints, regardless of whether they are on or off the
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationTo Renew or Change? Cloud-based Antivirus for Busy IT People
To Renew or Change? Cloud-based Antivirus for Busy IT People CONTENTS 03 EXECUTIVE 04 06 08 09 10 11 12 13 For More Information To find out more, please visit the Panda Security web site at www.forgetsecurity.com,
More informationESG Lab Review Extending Protection Capabilities with Acronis Backup 12.5
ESG Lab Review Extending Protection Capabilities with Acronis Backup 12.5 Date: October 2017 Author: Vinny Choinski, Senior Lab Analyst Enterprise Strategy Group Getting to the bigger truth. Abstract This
More informationUnderstanding Office 365: Is A Cloud Based Solution Right For Your Business?
Understanding Office 365: Is A Cloud Based Solution Right For Your Business? (855) 479-4343 www.it-va.com 4530 Plank Rd., Ste. 111, Fredericksburg, VA 22407 Table of Contents Introduction 3 What is Cloud
More informationCritical Infrastructure Protection for the Energy Industries. Building Identity Into the Network
Critical Infrastructure Protection for the Energy Industries Building Identity Into the Network Executive Summary Organizations in the oil, gas, and power industries are under increasing pressure to implement
More informationCHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION
CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION CONTENTS: Enterprise Mobility Strategy and BYOD Policies Endpoint Vulnerabilities and Challenges Conclusion For several decades,
More informationMCAFEE INTEGRATED THREAT DEFENSE SOLUTION
IDC Lab Validation Report, Executive Summary MCAFEE INTEGRATED THREAT DEFENSE SOLUTION Essential Capabilities for Analyzing and Protecting Against Advanced Threats By Rob Ayoub, CISSP, IDC Security Products
More informationAnalyzing the Economic Benefits of the HPE SimpliVity 380 All-flash Hyperconverged Portfolio
Enterprise Strategy Group Getting to the bigger truth. ESG Economic Value Audit Analyzing the Economic Benefits of the HPE SimpliVity 380 All-flash Hyperconverged Portfolio By Mike Leone, Senior IT Validation
More informationBMC Remedyforce Discovery and Client Management. Frequently asked questions
BMC Remedyforce Discovery and Client Management Frequently asked questions 1 Table of Contents BMC Remedyforce Discovery and Client Management 4 Overview 4 Remedyforce Agentless Discovery 4 Remedyforce
More informationNutanix Complete Cluster Date: May 2012 Authors: Ginny Roth, Tony Palmer, and Emil Flock
ESG Lab Review Nutanix Complete Cluster Date: May 2012 Authors: Ginny Roth, Tony Palmer, and Emil Flock Abstract: This ESG Lab review documents hands-on testing of the Nutanix Complete Cluster, highlighting
More informationVulnerability Management Trends In APAC
GET STARTED Introduction In the age of the customer, the threat landscape is constantly evolving. Attackers are out to steal your company s data, and the ever-expanding number of devices and technologies
More informationAdministering System Center Configuration Manager ( A)
Administering System Center Configuration Manager (20703-1A) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Describing the features Configuration Manager and
More informationNetBackup 5330 Backup Appliance Date: May 2015 Author: Vinny Choinski, Senior Lab Analyst and Kerry Dolan, Lab Analyst
ESG Lab Review NetBackup 5330 Backup Appliance Date: May 2015 Author: Vinny Choinski, Senior Lab Analyst and Kerry Dolan, Lab Analyst Abstract: This ESG Lab review documents testing and performance auditing
More informationFive Essential Capabilities for Airtight Cloud Security
Five Essential Capabilities for Airtight Cloud Security SECURITY IN THE CLOUD REQUIRES NEW CAPABILITIES It is no secret; security and compliance are at the top of the list of concerns tied to cloud adoption.
More informationAdministering System Center Configuration Manager ( )
Administering System Center Configuration Manager (20703-1) Formato do curso: Presencial Localidade: Lisboa Data: 30 Set. 2019 a 04 Out. 2019 Preço: 1670 Horário: Laboral - das 09h30 às 17h30 Nível: Avançado
More informationWhite. Paper. EMC Isilon Scale-out Without Compromise. July, 2012
White Paper EMC Isilon Scale-out Without Compromise By Terri McClure, Senior Analyst July, 2012 This ESG White Paper was commissioned by EMC and is distributed under license from ESG. 2012, The Enterprise
More information