Enhancing Virtual Environments

Similar documents
Enhancing Virtual Environments

Desktop DNA r11.1. PC DNA Management Challenges

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

HPE Intelligent Management Center

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions

PCI DSS Compliance. White Paper Parallels Remote Application Server

GDPR Controls and Netwrix Auditor Mapping

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Choosing a Full Disk Encryption solution. A simple first step in preparing your business for GDPR

IVANTI ENVIRONMENT MANAGER POLICY QUICK START GUIDE. Environment Manager Policy. Ivanti. Quick Start Guide

Delivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5

WHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER

Printer and Driver Management

VMware Mirage Getting Started Guide

The Microsoft Large Mailbox Vision

Windows User Profile Management

INTEGRATING DELL EQUALLOGIC SANS WITH CITRIX XENSERVER

3CX Mobile Device Manager

Installing and Configuring VMware User Environment Manager. VMware User Environment Manager 9.2

Top 10 Tips for Windows 10 Migration

HIPAA Controls. Powered by Auditor Mapping.

Tips for creating a VDI backup plan

AppSense Environment Manager. Personalization Product Guide Version 10.0

The McAfee MOVE Platform and Virtual Desktop Infrastructure

NetMotion Mobility and Microsoft DirectAccess Comparison

FUJITSU Backup as a Service Rapid Recovery Appliance

BYOD: BRING YOUR OWN DEVICE.

Migration Manager User s Guide

Security Enhancements

Windows 7, Enterprise Desktop Support Technician

Virtual Machine Encryption Security & Compliance in the Cloud

VMware vsphere 4. The Best Platform for Building Cloud Infrastructures

Using ProfileUnity to Migrate from Windows 7 to Windows 10

Disk Encryption Buyers Guide

Could Your Systems be Hindering Your Most Productive Employees?

DATA CENTRE SOLUTIONS

10 Hidden IT Risks That Might Threaten Your Business

The Dropbox Problem: It s Worse than You Think

Installing and Configuring VMware User Environment Manager

Information Security Controls Policy

Printer Installer: Eliminating Print Servers An Architectural and Use Case Overview

Xerox and Cisco Identity Services Engine (ISE) White Paper

SecureDoc: Making BitLocker simple, smart and secure for you. Your guide to encryption success

Designing Data Protection Strategies for Lotus Domino

DEPLOYMENT WHITE PAPER.

Enterprise X-Architecture 5th Generation And VMware Virtualization Solutions

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Enable Modern Work Styles with Microsoft VDI. Jeff Chin Windows Client Solutions Specialist

Immidio White Paper Things You Always Wanted To Know About Windows Profile Management

INTRODUCING VERITAS BACKUP EXEC SUITE

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

SEAhawk and Self Encrypting Drives (SED) Whitepaper

HCI: Hyper-Converged Infrastructure

VMware Mirage Getting Started Guide

Installing and Configuring VMware User Environment Manager. VMware User Environment Manager 9.3

Eliminating Print Servers An Architectural and Use Case Overview

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

PROTECT YOUR DATA FROM MALWARE AND ENSURE BUSINESS CONTINUITY ON THE CLOUD WITH NAVLINK MANAGED AMAZON WEB SERVICES MANAGED AWS

Veeam Agent for Microsoft Windows

MaaS360 Secure Productivity Suite

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Least privilege in the data center

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Managing BYOD Networks

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1

Evolved Backup and Recovery for the Enterprise

Self-Serve Password Reset

Accelerate Your Enterprise Private Cloud Initiative

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.

Real-time Protection for Microsoft Hyper-V

Why Continuity Matters

Veeam Endpoint Backup

Stellar performance for a virtualized world

SECURITY DOCUMENT. 550archi

Microsoft IT deploys Work Folders as an enterprise client data management solution

Five Tips to Mastering Enterprise Mobility

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Simplify Backups. Dell PowerVault DL2000 Family

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Ekran System v Program Overview

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Windows Client, Enterprise Desktop Support Technician

Enhancing and Extending Microsoft SharePoint 2013 for Secure Mobile Access and Management

VMAX ALL FLASH. For Mission-Critical Oracle

a. UTRGV owned, leased or managed computers that fall within the regular UTRGV Computer Security Standard

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

McAfee Embedded Control

AppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Virtual Disaster Recovery

7 Things ISVs Must Know About Virtualization

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

Solution Track 4 Design a Scalable Virtual Desktop Infrastructure

Securing Today s Mobile Workforce

ProfileUnity with FlexApp Technology

Transcription:

Enhancing Virtual Environments When CIOs provision desktops and mobile devices for their users, they have a variety of products to help them from Microsoft, Citrix, VMware and others. Some of our product functionality overlaps with these offerings, but no one provides the ease-of-use, feature range and depth of Ivanti. For desktop and mobile provisioning we offer: DesktopNow and DesktopNow Plus DataNow So how do you handle a sales situation in which you re told, We don t need Ivanti for user personalization, application access control or managing server resources. We have that covered? Well, Ivanti is better and we have the proof. First, though, let s take a look at what CIOs really care about when it comes to provisioning desktops and mobile devices for their users. Automa?on, Security, Performance Businesses want to provision employees quickly in seconds if possible. They need to migrate, upgrade or simply followed to alterna?ve worksta?ons. And they want to deploy applica?ons and share data without encountering barriers, delay or uncontrollable service costs. Compliance Businesses need the right level of auditable, secure access for every individual in every situa?on regardless of loca?on, network or device. What s the right level? It s the level that ensures compliance while being transparent to the user. Cost Avoidance The move to virtualized desktops for cost avoidance and improved service oien causes storage, network and performance issues. It can also impact business con?nuity and create havoc for the help desk. Disaster Recovery, Business Con?nuity Disaster recovery and business con?nuity solu?ons should be flexible, while avoiding costs, resource constraints, complexity and down?me a tall order.

Our flexibility, ease-of-use and range of functionality are unmatched. Here we take the top 30-something customer pain points and map them against a CIO s main business drivers. The key is to focus on the pain that has the most pressing business case associated with it. The Those customer pain points are explained here: Login time logging in to a desktop over a network takes too long. Location-based printing Roaming users struggle to access local printers. Golden images Managing images is cost and resource intensive. A new one is required for every group of users that require something different. Ivanti delivers automated, just in time personalization to the OS and applications, reducing login time from minutes to seconds. Ivanti combines context-aware conditions to control printers, drives and other settings based on where and how a user is connected. For example, device type or name, IP address range or MAC address can identify user location. Ivanti can modify an image in-flight, tailoring the delivery to the recipient s requirements, negating the need for separate gold images

Licensing It s often difficult to identify and enforce software licenses within a large, distributed desktop estate. Desktop lockdown Users alter printers, change the start menu, add device drivers, change screen savers, etc. Any of these could potentially cause confusion or errors. Application lockdown Users remove toolbars, alter security settings, and access items they shouldn t. Consistent end-user experience When a user moves between different desktop delivery mechanisms (laptops, physical, virtual), the user experience can vary dramatically. Group policy objects Changing group policy is a massive and slow undertaking, prone to errors and redundancy. Fine-grain privilege management Granting administrative rights solves many user issues. However, it violates compliance and puts the enterprise at risk. Network access controls The activity or the role of the user needs to determine access to specific network resources. Intelligent session reconnect For occasionally connected devices, such as roaming tablets, reconnecting to an active session can be time consuming and affect security settings. Smart access to key applications Prevent unauthorized users from connecting to corporate resources as well as trusted users attempting to connect from insecure locations. Eliminate user profile issues When a profiles becomes corrupt, the only recourse is deletion and asking users to manually recreate their environments. Intelligent package management Managing multiple application packages, and 10s of thousands of user profiles, is resource and time intensive. Zero day and malware lockout Rogue application execution causes many IT breaches. Typical whitelist solutions can easily be circumvented Ivanti controls which users or devices have permission to run named applications. It places limits on the number of application deployed, which devices or users can execute an application and for how long. This control from Ivanti is recognised by Microsoft for enforcing device-based software license control. Ivanti offers fine-grain control of what a user can change, enforcing settings that ensure the desktop remains in a known good state Without altering the underlying source code, Ivanti enables selected parts of the operating system or specific Windows application content to be secured by preventing access, hiding it or disabling the function. Ivanti abstracts users personalization settings from the OS and applications. We deliver the users familiar experience (desktop settings, application settings, and data) to any device. The Ivanti visual policy model replaces all batch and scripting needs, reducing costs and complexity. Ivanti can dynamically assign and revoke elevated privileges based on policy, providing complete compliance adherence and strict security enforcement Ivanti dynamically assigns and revokes network access rights based on user name, location or device, ensuring compliance and enforcing strict security. Ivanti optimizes profile and registry settings based on extensive trigger points, streamlining session configuration. Context-aware conditions ensure security is applied when users reconnect, greatly speeding up the process. Ivanti employs a list of extensive conditions to govern access to key applications by user, device used, location and how the users connects to the corporate environment. Ivanti provides on-demand per user, per application snapshot and rollback capabilities to quickly and simply remediate profile inconsistencies. We dynamically inject personalization and policy to tailor a single application package to the various needs of users. Having just one package saves disk space, costs, and time. Ivanti Trusted Ownership technology ensures only trusted applications, installed by named users (administrators) are allowed to execute, while userintroduced applications are prevented from launching by default.

Self-healing A user can maliciously or accidentally make changes to a desktop environment that cause downtime and increase support costs Flexible IT management controls Large enterprise environments require comprehensive context-aware controls in order to ensure efficient management. Self-service rollback Should a profile consistency error or corruption occur, the only recourse is to delete the entire profile, with all the user s personalized settings User productivity: personalized applications When users resize windows, customize dictionaries, and add tools bars to their applications, these customizations are lost when they re migrated to a new OS or logon to a new, static profile machine. Fast replacement of lost devices Issuing a replacement device (laptop, tablet or smartphone) wastes valuable time as users reconfigure their environment to be recognizable Advanced local cache for offline users When users work offline, they need their personalized settings to be present as if connected to the corporate network. Application level personalization With roaming profiles, all application and operating system settings are saved at logoff and restored at logon, which causes profile bloat, corruption or slow logons. Improved OS migration Users need to migrate to a new or different OS without losing their familiar environment Personal data recovery Crashed disks, dropped laptops and corrupted data require a reset of the user, which is time consuming and costly. Locked down kiosk-style controls Restricting access to a subset of the OS and applications is vital in unsecure or poorly regulated arenas. Innovative self-healing capabilities enable real-time remediation of malicious or accidental changes to files, processes, services or registry items, protecting critical application and operating system components. Ivanti provides a comprehensive list of conditions and actions to configure desktop environments, along with flexible trigger points to enable complete context-aware desktop management. Ivanti offers a web-based, self-service portal where a user can rollback personalization settings to a known good state, thus reducing support calls and costs. Ivanti abstract user customization and dynamically applies it every time an application starts, delivering a known working environment, regardless of operating system, application delivery mechanism or other changes. Ivanti offers a complete restoration of the lost device, maximizing productivity. It can easily wipe corporate data from lost or stolen tablets and smartphones. Ivanti supports offline and online personalization syncing, ensuring changes are never lost. Offline resiliency is built-in so mid-sync settings are not lost in the event of network outage. Ivanti abstracts OS and individual application personalization settings and manages them in isolation, reducing profile bloat, enabling faster logons and more streamlined rollback in the event of profile inconsistencies. The Ivanti profile abstraction technology allows users to easily migrate between any version of Windows while retaining their customizations, including the adoption of virtualized desktops or sessions Ivanti dynamically recreates a user s last known state with minimum hassle, ensuring less downtime and no loss of customization. Ivanti can prevent access to specific applications as well as block or remove individual parts of applications or the operating system. This reduces complexity for the end user and secures the environment from malicious changes.

Compliance enforcement Controlling user, application and data access in an audited environment is often a legal requirement. Reduced network traffic Moving large, roaming profile files for all users when they sign on causes massive network issues. Script and batch file management Writing and maintaining scripts is difficult and expensive IT, especially without version control or audit capabilities. Scripts and batch files typically execute in sequence, which means logon times are slow. Context aware configuration Grant user access based on the device type connecting to the corporate environment. Increased application performance and user density Rogue processes and memory, resource-hungry applications can reduce user productivity and block other applications from executing in a timely manner. Real time file and registry keys saved Traditionally, file and registry keys are saved only at session end. This often causes profile corruption and synchronization issues. Fault tolerant environment Servers fail, networks crash, data centers go dark. But the user expects the system to cope and to remain productive. The Ivanti approach to application control, privilege management and lockdown, together with selfhealing and highly granular auditing, complement your existing security and management controls. Ivanti helps increase compliance through better security while lowering costs. Ivanti dynamic, granular and on-demand personalization loads and saves only the profile settings required by the user when they need them. This reduces network data transfer during a boot storm. Compressing the settings before transport further reduces bandwidth requirements. Additionally, all end-points communicate via web servers, to reduce network traffic, congestion and load between the web server and the main data store. The Ivanti graphical, drag and drop policy model eliminates batch and scripting needs, massively decreasing cost and complexity. Our multi-threaded engine executes actions in parallel, dramatically reducing logon times. Audit logon actions and use version control to rollback settings in case of configuration errors. Ivanti can apply access to resources based on device type or name, operating system, IP Address or MAC address. With its patented technology, Ivanti Performance Manager intelligently manages CPU and memory resources, allowing optimal application execution and maximizing user density on shared hardware. Ivanti settings are saved to a local, virtual cache whenever they re altered and are re-synchronized to a central data store when applications are closed, assuring maximum reliability. Ivanti offers a multi-tier architecture, based on proven, industry-standard solutions, designed to outperform DR expectations.