BMC Remedyforce Discovery and Client Management. Frequently asked questions

Size: px
Start display at page:

Download "BMC Remedyforce Discovery and Client Management. Frequently asked questions"

Transcription

1 BMC Remedyforce Discovery and Client Management Frequently asked questions

2 1 Table of Contents BMC Remedyforce Discovery and Client Management 4 Overview 4 Remedyforce Agentless Discovery 4 Remedyforce Client Management 4 Frequently asked questions 4 Functionality and Technology Remedyforce Agentless Discovery 4 1. What is Remedyforce Agentless Discovery? 4 2. What are the benefits? 4 3. How does it work? 5 4. Do I need to install anything on my network? 5 5. What is a scanner? 5 6. What is the discovery server? 6 7. How does the scanner work? 6 8. How many scanners do I need to install? 6 9. What credentials are required to scan and inventory a device? What is the performance? Is there a limit to the number of devices I can scan? What is the impact to the network? How is it set up in the datacenter? Where is the data stored? What type of connection is required to trigger an agentless scan? What is the security connection between the datacenter and Remedyforce org? Where can I find out more detail about the BMC datacenter? 7 Functionality and Technology Remedyforce Client Management What is Remedyforce Client Management? What are primary the benefits? How does it work? Is a corporate network connection (ex. VPN) required for remote devices? Is it available on premise? What is the difference between Premium and Premium Plus? What is in Remedyforce Client Management Premium and Premium Plus? Is Remedyforce Client Management built on the force.com platform? 8 Functionality and Technology General What is the difference between agent and agentless discovery? What datacenter is Remedyforce Agentless Discovery and Client Management located? _ Do I need Pentaho on premise? What is the difference between Remedyforce Client Management and BCM OnDemand? How do I avoid duplicate records? How does this compare to BMC Discovery (ADDM)? Is the data encrypted? Does it support proxy gateways? Does it support two-factor authentication? What are the differences between agentless and agent discovery? What ports are used and can I change them? How does this work with firewalls? Is it scalable? 13

3 2

4 3 Document Information Version: 3.7 Last Modified on: August 23, 2017 Modified by: John Fulton

5 4 BMC Remedyforce Discovery and Client Management Overview The identification and management of devices is essential to establish and maintain a successful Service Management program. If an organization is not aware of their environment and devices, they cannot proactively manage those devices. As a result, the organization will struggle and the risks will increase including the IT Department s relevance. For example, the risk of shadow IT will grow resulting in lower customer satisfaction, service levels and first call resolutions. Discovery and client management capabilities provide organizations with critical information and powerful actions (ex. remote control, software delivery, ticket automation, etc ) at their fingertips. Empowering the team to more effectively and efficiently support their organization ultimately increasing first call resolution, improving service levels, reducing support calls and freeing up resources to focus on higher value support activities. Remedyforce Agentless Discovery BMC Remedyforce includes agentless discovery. This new capability is included in the BMC Remedyforce base license at no additional cost. Remedyforce customers now have the ability to natively and intuitively configure and populate the Remedyforce CMDB in just a few easy steps. Remedyforce Client Management Supporting the maturity model approach, Remedyforce customers can expand and mature their discovery and client management capabilities by upgrading to BMC Remedyforce Client Management Premium or Premium Plus. This FAQ answers the most common questions around the Remedyforce discovery and client management capabilities introduced in the Remedyforce Summer 16 release. Frequently asked questions Functionality and Technology Remedyforce Agentless Discovery 1. What is Remedyforce Agentless Discovery? Remedyforce Agentless Discovery is a new capability introduced in the Summer 16 release. This new Remedyforce capability is included in the BMC Remedyforce base license at no additional cost to customers. Remedyforce customers now have the ability to natively and intuitively configure and populate the Remedyforce CMDB in just a few easy steps. Please refer to the additional FAQs below for more detail on this Remedyforce capability. 2. What are the benefits? Visibility with convenience and power. You cannot manage what you do not know. BMC Remedyforce Agentless Discovery empowers organizations to scan, identify and manage devices on the network. With a simple and intuitive interface, setup is quick and easy. Once enabled and configured, your Remedyforce CMDB will be populated with a wealth of device information including hardware configurations and software

6 5 installations. The benefits of direct access to this information include (1) proactive management by automating discovery to know what is in your environment, (2) empowering the support team, (3) increasing first call resolution rates and (4) reducing support call times. 3. How does it work? There are two primary components and a few steps required to get agentless discovery up and running as documented in the diagram below. The first component, the scanner, is the only on premise component. The scanner performs the agentless scan of your network. The second component is the Remedyforce Discovery Server. The Remedyforce Discovery Server is a hosted component, which collects data from the scanner(s). Through the intuitive enablement and configuration process, the administrator enables their Remedyforce Discovery Server with at least one configured scanner (step 1). Depending on the defined scanner frequency and scope, it will collect the devices, passing the details to the Remedyforce Discovery Server (steps 2 and 3). The final step (step 4) is the passing of discovery data from the Remedyforce Discovery Server to the Remedyforce CMDB. The frequency is based the configuration. 4. Do I need to install anything on my network? Yes, to perform the agentless scanning, at least one scanner must be installed. For more details on scanners, please refer to the next several FAQs. 5. What is a scanner? A scanner is a Windows or Linux device (32 or 64-bit operating system) in your network on which an agent is running. A scanner executes scans on individual devices or groups of devices, via a network target list. The scanner accesses the devices via different network protocols to retrieve various device information. A scanner is the only on premise component required for agentless discovery.

7 6 6. What is the discovery server? The Remedyforce Discovery Server enables communication among scanners, BMC Remedyforce and discovered devices. The Remedyforce Discovery server stores configurations to discover devices. After discovery, the hardware configuration and software inventory details of discovered devices are stored on this server and passed to the Remedyforce CMDB based upon the frequency defined. 7. How does the scanner work? The scanner uses a variety of protocols (SMB, WMI, SSH, SNMP) to first identify the devices. Once identified, the operating system and hardware configuration details are captured and passed to the Remedyforce Discovery Server. 8. How many scanners do I need to install? Typically, it is one Scanner per physical location, with each scanner located behind your corporate firewall. The scanner will scan 10 devices concurrently, with each initial scan of 10 devices taking approximately 20 seconds. 9. What credentials are required to scan and inventory a device? There are two primary scanning phases. The first phase is an initial scan to identify a device (ex. device name, IP address, device type). No credentials are required to perform this initial scan. The second phase is what we call the inventory scan. This is a deeper scan, pulling more details from the device including hardware configuration and software installed. Customers typically use their domain admin credentials to perform this deeper scan. At a minimum, read-only credentials are required to perform the inventory scan. 10. What is the performance? The amount of concurrent threads is configurable for each scanner. The default is 10 at a time. If you are doing a lightweight discovery, it is very fast (approx. 5 sec/device). If you are performing a full discovery including both Hardware and Software Inventory information, it could take anywhere from 30s to 2m per device. 11. Is there a limit to the number of devices I can scan? Agentless discovery within the base Remedyforce license is limited to 50,000 devices. For customers who require agentless discovery for more than 50,000 devices, please refer to Remedyforce Client Management Premium or Premium Plus below. 12. What is the impact to the network? There is very little impact because the inventory packets are small (approx. 300k). 13. How is it set up in the datacenter? Our BMC cloud-based datacenters will have a uniquely provisioned Remedyforce Discovery server and database instance, both of which are unique to your Remedyforce ORG. The discovery and inventory data from each of your on premise scanners is transmitted via an SSL encrypted network connection directly to your hosted application server where the data is integrated into the discovery and inventory database. This data, once aggregated, will pass into your existing Remedyforce CMDB. 14. Where is the data stored? The discovery and inventory data is stored in either BMC s Chicago or Amsterdam data centers depending on where your Remedyforce org is located. All Remedyforce orgs in

8 7 the Americas will connect to the Chicago data center, while all other regions (Europe and Asia) will connect to the Amsterdam data center. Once the data is aggregated, a subset (depending on your configuration), will be passed into your existing Remedyforce CMDB. Note: Prior to May 16, 2017, all inventory data was stored in the Amsterdam data center. The Chicago data center was added on this date for the Americas. 15. What type of connection is required to trigger an agentless scan? Just an internet connection is required. No VPN is required. 16. What is the security connection between the datacenter and Remedyforce org? Industry standard PKI encryption technology is implemented to transmit data both from your on premise scanner to your BMC Remedyforce Discovery Server, and again from your hosted discovery server into your Remedyforce CMDB. This encryption technology is based on SSL/TLS encryption standards as detailed in the following IETF documents: RFC 5280 implementation handles the certificate and trust process RFC 5246 implementation handles the encryption and cypher negotiation 17. Where can I find out more detail about the BMC datacenter? To find out more details about the BMC datacenters, select the following link posted on BMC Support Central. Functionality and Technology Remedyforce Client Management 18. What is Remedyforce Client Management? Remedyforce Client Management is an extension of the agentless discovery capabilities provided in the base Remedyforce solution starting with the Summer 16 release. Remedyforce Client Management provides a range of advanced capabilities empowering customers to more efficiently and proactively manage and support their devices. The capabilities include agent discovery, remote management, hardware and software compliance, software normalization, patch management and deployment management. In addition to these capabilities, the solution delivers advanced actions while empowering customers to define rules and actions to ultimately become more proactive and reduce the number of support calls. For example, you can define an advanced action to monitor drive space and either automatically create a ticket when a device hits a certain threshold and/or perform an action (ex. disk cleanup) to free up additional drive space, deferring or eliminating a support call. 19. What are primary the benefits? The benefits include (1) proactive management by automating discovery to know what is in your environment, (2) empowering your support team with a range of tools to be more efficient, (3) increasing first call resolution rates and (4) reducing support call time with quick access to a wealth of information and actions. Please refer to the value statements in the Sales section below for more details. 20. How does it work? The BMC Remedyforce Client Management application server, also known as the Master server, is hosted as a unique instance in a server pool and has a single

9 8 associated database instance used to store the various data constructs. The Java based BCM administration console and devices under BCM management connect to the application server via its public DNS name. This configuration allows for the administration of any child device that has an active internet connection. In addition, an on premise site relay can be optionally implemented as a local parent for up to 2,000 site clients to reduce the amount of internet traffic generated between the site and the hosted application server. 21. Is a corporate network connection (ex. VPN) required for remote devices? No, just an internet connection is required for remote devices with agents to perform and collect the scan. 22. Is it available on premise? Remedyforce Client Management is a hosted solution and not available on premise. For those who require an on premise discovery and client management solution, BMC Client Management (BCM) OnPremise is the solution to consider. This solution is supported with Remedyforce; however, it does not use the new and improved integration, which leverages web services and requires the installation and configuration of Pentaho. 23. What is the difference between Premium and Premium Plus? Premium contains a subset of Premium Plus features including agent discovery, remote management and compliance management. Please refer to the table below for a more detailed comparison. 24. What is in Remedyforce Client Management Premium and Premium Plus? A summary of the functionality is provided in the table below: Capabilities Remedyforce Base License Remedyforce Client Management Premium Remedyforce Client Management Premium Plus Inventory Management (Agentless Discovery) Inventory Management (Agent Discovery) Remote Management Compliance Management Patch Management Deployment Management 25. Is Remedyforce Client Management built on the force.com platform? No, Remedyforce Agentless Discovery and Client Management is built on the existing and proven technology of BMC Client Management (BCM).

10 9 Functionality and Technology General 26. What is the difference between agent and agentless discovery? More software inventory is collected with and agent: Hardware discovery is the same with or without an agent installed. Software discovery is limited to WMI installed applications without an agent installed. With an agent you also have security inventory (antivirus, firewall), custom inventory, connectivity inventory (link between routers, switches, and devices), power management inventory (green IT, when your screen is locked), patch inventory (installed/missing patches, service packs) 27. What datacenter is Remedyforce Agentless Discovery and Client Management located? We support both the Amsterdam and Chicago datacenters. All Remedyforce orgs in the Americas will connect to the Chicago datacenter, while all other regions will connect to the Amsterdam datacenter. To find out more details about the datacenters, select the following link. 28. Do I need Pentaho on premise? No, the Remedyforce Agentless Discovery and Client Management capabilities leverage web services displacing the need for customers to install and configure Pentaho on premise. Note: If a customer needs to modify the mappings, then the older integration should be considered; however, few, if any, customers have required modification of the mappings. We are considering a future enhancement with the new integration to provide an option for configurable mappings. 29. What is the difference between Remedyforce Client Management and BCM OnDemand? The underlying technology is BMC Client Management and the end user interaction and capabilities are the same, but the integration is different (ex. Remedyforce Client Management uses APIs vs. the older integration to BCM uses Pentaho). In addition, Remedyforce Client Management automates the provisioning of a hosted servers vs. BCM OnDemand, which requires a more manual provisioning process. Below is a summary of the primary differences: Capabilities Simplified Setup with Automated Server Provisioning Requires Pentaho Configurable Mapping Capabilities Embedded Administration Remedyforce Client Management Premium and Premium Plus BMC Client Management

11 10 Offering SaaS SaaS and On Premise Positioning Remedyforce Capabilities Remedyforce Integration 30. How do I avoid duplicate records? We recommend you enable and configure CMDB Reconciliation, which is a configurable, rule-based engine to define your own rules for uniqueness by class. If you don t enable and configure CMDB Reconciliation, the Assembly ID field determines uniqueness. This is a system-generated value from the discovery source. As a result, there is a risk of duplicate values when are also importing records from other sources (such as other discovery tools, manual entry, procurement feeds, advanced ship notices) because these sources do not share the same unique value. If you choose not to enable and configure CMDB Reconciliation, to avoid the risk of duplicate records with Remedyforce discovery, ensure the following with your discovered records: The records do not already exist in your Remedyforce CMDB. They will not be discovered and imported from other discovery sources. These same records will not be manually created. If any of these conditions exist and have occurred, you will need to analyze and clean up your data to remove duplicate records. 31. How does this compare to BMC Discovery (ADDM)? Both solutions provide agentless discovery; however, BMC Remedyforce Client Management provides a number of capabilities around software identification, metering and compliance, while BMC Discovery s focus is on the datacenter, providing more indepth discovery for specific datacenter environments. Below is a table highlighting the differences:

12 11 Function Remedyforce Client Management BMC Discovery (ADDM) Agentless Discovery Device Scan for installed software Discovery of Hardware Details, such as memory, processor, BIOS info Discovery of Operating System and Details Discovery of Network Interface MAC Addresses Scheduled Discovery Scans Discovery of Load Balancer Devices Agent-based Discovery Software Catalog (Desktop Software) Software License Management Software Metering Software Prohibiting Ability to create and manage dynamic device groups Ability to dynamically discover AD computers Cluster Discovery Deep Discovery of Application Details such as Websites and Internal Databases Discovery of Fiber Channel HBA Cards Discovery of Host Containers, Blade Enclosure Discovery of Listening Ports Discovery of Load Balancer Services, Pools, Members, and Instances Discovery of Observed Communication between Devices Extended Discovery to Perform additional commands and read configuration files Network Device Port and Speed Mismatch Port Speed and Duplex information for all Network Interfaces Software Catalog (Enterprise Server Software) Data Provenance for Ready Data Validation Business Application Modeling File System to Storage Volume Relationships Host to Load Balancer Relationships Server to Cluster Relationships Server to Server Dependency Relationships Server to Storage Dependency Relationships Software to Software Communication Relationships Automatic Network Device Computer Relationships Virtual Host to Guest Relationships 32. Is the data encrypted? 33. Passwords are encrypted along with the data as it uses HTTPS when transferred.

13 Does it support proxy gateways? We do not support proxy gateways. For Discovery, firewalls can be configured for the scanner access to be restricted to the OnDemand server/port. For compliance and patch management (Premium and Premium Plus offerings), more access is needed to download updates from BMC and vendors. These do support proxy gateways. 35. Does it support two-factor authentication? Two-factor authentication is not applicable in this architecture as the passing of data is automated. Two-factor authentication implies human intervention is involved. If security is concern, please refer to the other FAQs which detail the secure approach. 36. What are the differences between agentless and agent discovery? As the name implies, agentless discovery does not require an agent on each device. Both discover device details. Agent discovery provides a number of additional capabilities beyond discovery, which are documented in the table below: Actions Agentless Discovery Agent Discovery Device Discovery Audit Now Remote Management Compliance Management Software Normalization Patch Management Deployment Management File Transfer Reboot Shut Down Wake Up Access to Device Details Agentless Discovery Agent Discovery File System Registry Windows Events Processes Services From a data perspective, they are very similar. Hardware discovery is the same with or without an agent installed. When it comes to discovery of software, there are some differences. The primary benefit of an agent is that it will leverage a software catalog to normalize, standardize and classify the software.

14 What ports are used and can I change them? The hosted application server will use a range of 10 TCP allocated during the server provisioning process. The hosted application server port ranges are static and cannot be altered. 38. How does this work with firewalls? An on premise device behind an unmanaged firewall that can connect to a public internet IP address and port will create a managed network tunnel used by only the client executable. The client maintained network tunnel allows for bi-directional traffic between the on premise client and the public facing hosted application server. 39. Is it scalable? Yes, very scalable. BMC Remedyforce Client Management can manage in excess of several hundred thousand client workstations. The hosted application server (aka Master Server) can manage up to 5,000 simultaneous client connections. Each client can be either a standalone workstation or a dedicated on premise site relay. Each site relay can manage up to 2,000 client workstations using a parent child hierarchy such as the image depicted below: If you have any questions regarding the solution or content, please contact John Fulton (john_fulton@bmc.com) or Serena Lambiase (serena_lambiase@bmc.com).

15 Business runs on IT. IT runs on BMC Software. Business runs better when IT runs at its best. Tens of thousands of IT organizations around the world from small and mid-market businesses to the Global 100 rely on BMC Software (NASDAQ: BMC) to manage their business services and applications across distributed, mainframe, virtual and cloud environments. BMC helps customers cut costs, reduce risk and achieve business objectives with the broadest choice of IT management solutions, including industry-leading Business Service Management and Cloud Management offerings. Visit for more information. 14

TECHNICAL DESCRIPTION

TECHNICAL DESCRIPTION TECHNICAL DESCRIPTION Product Snow Inventory Version 5 Release date 2016-09-27 Document date 2017-11-24 CONTENTS 1 Introduction... 3 1.1 What s new?... 3 2 Platform overview... 4 2.1 Architecture... 4

More information

Powerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations

Powerful Insights with Every Click. FixStream. Agentless Infrastructure Auto-Discovery for Modern IT Operations Powerful Insights with Every Click FixStream Agentless Infrastructure Auto-Discovery for Modern IT Operations The Challenge AIOps is a big shift from traditional ITOA platforms. ITOA was focused on data

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Phil Schwan Technical

Phil Schwan Technical Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Qualys Cloud Platform

Qualys Cloud Platform 18 QUALYS SECURITY CONFERENCE 2018 Qualys Cloud Platform Looking Under the Hood: What Makes Our Cloud Platform so Scalable and Powerful Dilip Bachwani Vice President, Engineering, Qualys, Inc. Cloud Platform

More information

Security in the Privileged Remote Access Appliance

Security in the Privileged Remote Access Appliance Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.0 Revision B Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5

More information

Discover SUSE Manager

Discover SUSE Manager White Paper SUSE Manager Discover SUSE Manager Table of Contents page Reduce Complexity and Administer All Your IT Assets in a Simple, Consistent Way...2 How SUSE Manager Works...5 User Interface...5 Conclusion...9

More information

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3 Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Service Mesh and Microservices Networking

Service Mesh and Microservices Networking Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards

More information

Remote power and console management in large datacenters

Remote power and console management in large datacenters Remote power and console management in large datacenters A Horváth IT department, CERN, CH-1211 Genève 23, Switzerland E-mail: Andras.Horvath@cern.ch Abstract. Today s datacenters are often built of a

More information

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved.

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved. Venafi Platform Architecture 1 Architecture Basic Professional Services 2018 Venafi. All Rights Reserved. Goals 1 2 3 4 5 Architecture Basics: An overview of Venafi Platform. Required Infrastructure: Services

More information

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications

More information

SysAid Technical Presentation. Phone (Toll-Free US): Phone: +972 (3)

SysAid Technical Presentation.  Phone (Toll-Free US): Phone: +972 (3) SysAid Technical Presentation www.sysaid.com sales@sysaid.com Phone (Toll-Free US): 1-800-686-7047 Phone: +972 (3) 533-3675 SysAid Overview A Global ITSM Solution Provider Technology Built for You Customer-Driven

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.3 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5

More information

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview

Portnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview Portnox CORE On-Premise Technology Introduction Portnox CORE provides a complete solution for Network Access Control (NAC) across wired, wireless, and virtual networks for enterprise managed, mobile and

More information

vrealize Operations Management Pack for NSX for vsphere Release Notes

vrealize Operations Management Pack for NSX for vsphere Release Notes vrealize Operations Management Pack for NSX for vsphere 3.1.1 Release Notes Build: 4247401 Last document update: 24 August 2016 Contents: Upgrading from the Management Pack for NSX for vsphere 2.0 What's

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.4 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices.

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. AirWatch v9.2 Have documentation feedback? Submit a Documentation

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions FAQ December Revision Table of Contents General... 3 Agent Deployment... 5 Cloud Administration... 8 Security... 10 Purchase... 10 Support... 11 Page 2 of 11 justsamit Frequently

More information

Security Challenges: Integrating Apple Computers into Windows Environments

Security Challenges: Integrating Apple Computers into Windows Environments Integrating Apple Computers into Windows Environments White Paper Parallels Mac Management for Microsoft SCCM 2018 Presented By: Table of Contents Environments... 3 Requirements for Managing Mac Natively

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

WhatsConfigured v3.1 User Guide

WhatsConfigured v3.1 User Guide WhatsConfigured v3.1 User Guide Contents Table of Contents Welcome to WhatsConfigured v3.1 Finding more information and updates... 1 Sending feedback... 2 Deploying WhatsConfigured STEP 1: Prepare the

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.7 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

Exam : Implementing Microsoft Azure Infrastructure Solutions

Exam : Implementing Microsoft Azure Infrastructure Solutions Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service

More information

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.5.3 Revision A Contents About this release on page 2 System requirements on page 2 Build number and checksums on page 4 Compatibility on page 5 New features

More information

Dolby Conference Phone 3.1 configuration guide for West

Dolby Conference Phone 3.1 configuration guide for West Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San

More information

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

McAfee epo Deep Command

McAfee epo Deep Command Quick Start Guide McAfee epo Deep Command version 2.4.1 This Quick Start Guide provides high level instructions for setting up McAfee epo Deep Command 2.4.1. For detailed instructions, refer to the McAfee

More information

TrueSight 10 Architecture & Scalability Q&A Best Practice Webinar 8/18/2015

TrueSight 10 Architecture & Scalability Q&A Best Practice Webinar 8/18/2015 Q: Where can I find the TrueSight Operations Management Best Practice material? A: TrueSight OM Best Practice material is published on the BMC Communities web site at the following link. https://communities.bmc.com/docs/doc-37443

More information

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing

More information

CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY

CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY CLOUDLENS PUBLIC, PRIVATE, AND HYBRID CLOUD VISIBILITY ORGANIZATIONS NEED VISIBILITY TO SECURE AND MONITOR THEIR CLOUD ENVIRONMENTS Organizations are migrating workloads to the cloud because it offers

More information

Architectural Flexibility

Architectural Flexibility Architectural Flexibility Key to Successful Monitoring By Shamas Demoret 1st Edition Architectural Flexibility // 1 Introduction Part 1: Checking Individual Systems Active Checks Passive Checks Agent-based

More information

ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT

ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT ELIMINATE SECURITY BLIND SPOTS WITH THE VENAFI AGENT less discovery can t find all keys and certificates Key and certificate management is no longer just an IT function. So it cannot be treated the same

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.2 Table of Contents About ServiceNow Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Edge for All Business

Edge for All Business 1 Edge for All Business Datasheet Zynstra is designed and built for the edge the business-critical compute activity that takes place outside a large central datacenter, in branches, remote offices, or

More information

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions 1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-370 Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions Version: Demo QUESTION NO: 1 Which connection type is used when WorxWeb for ios is configured to

More information

FIREWALL BEST PRACTICES TO BLOCK

FIREWALL BEST PRACTICES TO BLOCK Brought to you by Enterprie Control Systems FIREWALL BEST PRACTICES TO BLOCK Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.1 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5

More information

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware Workspace ONE UEM VMware AirWatch Cloud Connector VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

SoftLayer Security and Compliance:

SoftLayer Security and Compliance: SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

Symantec Exam Administration of Altiris Client Management Suite 7.1 Version: 6.1 [ Total Questions: 133 ]

Symantec Exam Administration of Altiris Client Management Suite 7.1 Version: 6.1 [ Total Questions: 133 ] s@lm@n Symantec Exam 250-402 Administration of Altiris Client Management Suite 7.1 Version: 6.1 [ Total Questions: 133 ] Question No : 1 What are two prerequisites for installing and configuring IT Analytics?

More information

Edge Device Manager Quick Start Guide. Version R15

Edge Device Manager Quick Start Guide. Version R15 Edge Device Manager Quick Start Guide Version R15 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information

Implementing DVN. directpacket Product Guide

Implementing DVN. directpacket Product Guide Implementing DVN directpacket Product Guide directpacket Research www.directpacket.com 2 1 DVN and the IPC Community The Secure Dedicated Versatile Network (DVN) Server is a hardened internet facing device

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

WhatsConnected v3.5 User Guide

WhatsConnected v3.5 User Guide WhatsConnected v3.5 User Guide Contents Table of Contents Welcome to WhatsConnected Finding more information and updates... 5 Installing and Configuring WhatsConnected System requirements... 6 Installation

More information

Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541

Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541 Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541 Compliance and Settings Management Device Management

More information

Oracle Enterprise Manager 11g Ops Center 2.5 Hands-on Lab

Oracle Enterprise Manager 11g Ops Center 2.5 Hands-on Lab Oracle Enterprise Manager 11g Ops Center 2.5 Hands-on Lab Introduction to Enterprise Manager 11g Oracle Enterprise Manager 11g is the centerpiece of Oracle's integrated IT management strategy, which rejects

More information

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst ESG Lab Review Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst Abstract: This ESG Lab Review documents hands-on testing of Shavlik

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018 How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

ForeScout Extended Module for ServiceNow

ForeScout Extended Module for ServiceNow ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

Session 7: Configuration Manager

Session 7: Configuration Manager Session 7: Configuration Manager Mark Aslett Consultant Adam Shepherd Consultant MCS Talks Infrastructure Architecture Agenda Introduction Gathering requirements Core Concepts Hierarchy Design Scaling

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access

More information

Centerity Monitor 4.0. Administration Guide

Centerity Monitor 4.0. Administration Guide Centerity Monitor 4.0 Administration Guide May 2017 About This Guide 2 Contents About This Guide... 8 End-User License Agreement (EULA)... 8 Before You Begin... 8 Audience... 8 Centerity Monitor User Guide...

More information

App Gateway Deployment Guide

App Gateway Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E App Gateway Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical

More information

Edge Device Manager R15 Release Notes

Edge Device Manager R15 Release Notes 2017-03 Software releases are created to add new features, make enhancements or correct defects. These releases are tested on all current, actively shipping platforms and operating systems as applicable.

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.3.3 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Oracle Integration Cloud Service Project. Author: Gopinath Soundarrajan Oracle Infrastructure Cloud Architect Date: 03/Dec/2016

Oracle Integration Cloud Service Project. Author: Gopinath Soundarrajan Oracle Infrastructure Cloud Architect Date: 03/Dec/2016 Oracle Integration Cloud Service Project Author: Gopinath Soundarrajan Oracle Infrastructure Cloud Architect Date: 03/Dec/2016 Oracle Java Cloud Service Project Oracle Java Cloud Service Project Integration

More information

Cisco Configuration Engine 2.0

Cisco Configuration Engine 2.0 Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes

More information

2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco AnyConnect as a Service György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security

More information

Migration and Building of Data Centers in IBM SoftLayer

Migration and Building of Data Centers in IBM SoftLayer Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into

More information

Aerohive and IntelliGO End-to-End Security for devices on your network

Aerohive and IntelliGO End-to-End Security for devices on your network Aerohive and IntelliGO End-to-End Security for devices on your network Introduction Networks have long used a password to authenticate users and devices. Today, many cyber attacks can be used to capture

More information

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview. Citrix Connector 3.1 May 02, 2016 About this release System requirements Technical overview Plan Install Citrix Connector Upgrade Create applications Deploy applications to machine catalogs Publish applications

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Cloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer

Cloud, SDN and BIGIQ. Philippe Bogaerts Senior Field Systems Engineer Cloud, SDN and BIGIQ Philippe Bogaerts Senior Field Systems Engineer Virtual Editions TMOS/LTM 12.0 Highlights 1 NIC support Azure Marketplace Kernel Independent driver Enhanced Hypervisor support F5 Networks,

More information

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0

Forescout. eyeextend for ServiceNow. Configuration Guide. Version 2.0 Forescout Version 2.0 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018 How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

CMB-207-1I Citrix Desktop Virtualization Fast Track

CMB-207-1I Citrix Desktop Virtualization Fast Track Page1 CMB-207-1I Citrix Desktop Virtualization Fast Track This fast-paced course covers select content from training courses CXA-206: Citrix XenApp 6.5 Administration and CXD-202: Citrix XenDesktop 5 Administration

More information

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version: Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named

More information

Cisco Prime Home 5.1 Technical

Cisco Prime Home 5.1 Technical Data Sheet Cisco Prime Home 5.1 Technical The proliferation of Internet-connected devices and the explosion of video and data traffic are driving complexity in the home network. Increasing numbers of new

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.4.8 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Brocade Virtual Traffic Manager and Parallels Remote Application Server

Brocade Virtual Traffic Manager and Parallels Remote Application Server White Paper Parallels Brocade Virtual Traffic Manager and Parallels Deployment Guide 01 Contents Preface...4 About This Guide...4 Audience...4 Contacting Brocade...4 Internet...4 Technical Support...4

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing Citrix XenDesktop 7.6 Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing Citrix XenDesktop 7.6 Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-401 Exam Name: Designing Citrix XenDesktop 7.6 Solutions Version: Demo DEMO QUESTION 1 Which option requires the fewest components to implement a fault-tolerant, load-balanced

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

Reinvent Your 2013 Security Management Strategy

Reinvent Your 2013 Security Management Strategy Reinvent Your 2013 Security Management Strategy Laurent Boutet 18 septembre 2013 Phone:+33 6 25 34 12 01 Email:laurent.boutet@skyboxsecurity.com www.skyboxsecurity.com What are Your Key Objectives for

More information

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief Adaptive Authentication Adapter for Citrix XenApp Adaptive Authentication in Citrix XenApp Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing costeffective

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Veritas InfoScale Operations Manager 7.2 Installation and Configuration Guide

Veritas InfoScale Operations Manager 7.2 Installation and Configuration Guide Veritas InfoScale Operations Manager 7.2 Installation and Configuration Guide June 2017 Veritas InfoScale Operations Manager 7.2 Installation and Configuration Guide Last updated: 2017-06-06 Document version:

More information

Control-M and Payment Card Industry Data Security Standard (PCI DSS)

Control-M and Payment Card Industry Data Security Standard (PCI DSS) Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M

More information

Tableau Server on Microsoft Azure:

Tableau Server on Microsoft Azure: Tableau Server on Microsoft Azure: Deployment Guidelines and Best Practices April 2017 Table of Contents Abstract...3 Introduction to Tableau With Microsoft Azure...3 Option 1 Self Deployment via Azure

More information