Nexthink V5: What is New?

Similar documents
LANDESK White Paper. Maintaining User Productivity through Effective Endpoint Management

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Configuring a Virtual Desktop

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Enhanced Threat Detection, Investigation, and Response

Imperva Incapsula Website Security

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Security from the Inside

CIS Controls Measures and Metrics for Version 7

Snort: The World s Most Widely Deployed IPS Technology

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.

CIS Controls Measures and Metrics for Version 7

Un SOC avanzato per una efficace risposta al cybercrime

McAfee Public Cloud Server Security Suite

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Security Information & Event Management (SIEM)

ESET Remote Administrator 6. Version 6.0 Product Details

itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors

Presentation by Brett Meyer

align security instill confidence

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

ObserveIT 7.1 Release Notes

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

10 FOCUS AREAS FOR BREACH PREVENTION

The Connected Water Plant. Immediate Value. Long-Term Flexibility.

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Altitude Software. Data Protection Heading 2018

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

CyberSecurity Situational Awareness Monitoring & Reporting Platform Pharos. Cyber Security Showcase Wednesday, 29 February 2012 Brussels, Belgium

DeltaV Mobile. Introduction. Product Data Sheet September DeltaV Distributed Control System

Anatomy of a Video Key Measures of a Video s Life Cycle

WEBMETHODS AGILITY FOR THE DIGITAL ENTERPRISE WEBMETHODS. What you can expect from webmethods

Dell One Identity Cloud Access Manager 8.0. Overview

Cisco Industrial Network Director

Symantec Security Monitoring Services

Barracuda Firewall Release Notes 6.6.X

Palo Alto Networks PAN-OS

McAfee epolicy Orchestrator

Automating the Top 20 CIS Critical Security Controls

for businesses with more than 25 seats

ICS Security Monitoring

IBM services and technology solutions for supporting GDPR program

Cisco Industrial Network Director

RSA Security Analytics

Securing Your Cloud Introduction Presentation

Cloud Access Manager Overview

Manufacturing security: Bridging the gap between IT and OT

GFI Product Comparison. GFI WebMonitor 2015 vs. McAfee Web Gateway

Datacenter Management and The Private Cloud. Troy Sharpe Core Infrastructure Specialist Microsoft Corp, Education

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Endpoint Security Manager

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Data Sheet: Archiving Altiris Server Management Suite 7.0 Essential server management: Discover, provision, manage, and monitor

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

RiskSense Attack Surface Validation for Web Applications

Now even your smallest customer can be a profitable one.

Help Your Security Team Sleep at Night

Synchronized Security

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

MEETING ISO STANDARDS

Preparing your network for the next wave of innovation

ForeScout Extended Module for Splunk

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

Supporting the Cloud Transformation of Agencies across the Public Sector

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

Symantec DLP: Detection Innovation and Expanded Coverage

THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM

Intro to Niara. no compromise behavioral analytics. Tomas Muliuolis HPE Aruba Baltics Lead

PCI DSS Compliance. White Paper Parallels Remote Application Server

Deep Security Integration with Sumo Logic

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

DeltaV Mobile. Introduction. Product Data Sheet November DeltaV Distributed Control System

Qualys Cloud Platform

Copyright 2011 Trend Micro Inc.

RSA INCIDENT RESPONSE SERVICES

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Microsoft SharePoint Server 2013 Plan, Configure & Manage

How to Troubleshoot Databases and Exadata Using Oracle Log Analytics

CyberArk Privileged Threat Analytics

Centralized Log Hosting Manual for User

Building Resilience in a Digital Enterprise

Behavioral Analytics A Closer Look

Get Started with Cisco DNA Center

Cisco Collaborative Knowledge

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

Accelerate Your Enterprise Private Cloud Initiative

Beyond Blind Defense: Gaining Insights from Proactive App Sec

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

Risk Intelligence. Quick Start Guide - Data Breach Risk

Dynamic Datacenter Security Solidex, November 2009

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Incident Response Agility: Leverage the Past and Present into the Future

Comprehensive datacenter protection

Copyright 2018, Oracle and/or its affiliates. All rights reserved.

Scrutinizer Flow Analytics

Transcription:

Nexthink V5: What is New? Nexthink V5 is scheduled to be released at the end of December 2013. Watch a preview at http://www.nexthink.com/itanalytics/v5/. Nexthink will host two events in January 2014 to launch V5: Partner 14 and Analytics 14. We welcome our customers and partners to join us at Analytics 14 to learn how to unleash the Nexthink V5 End-user IT Analytics platform and use it to its fullest potential. Discover the new Nexthink V5 Academy certifications center for security, ITSM, transformation and specific technology integrations. This is a great opportunity to attend sessions presented by Nexthink's best technology experts combined with real-world implementations, practical guidance and experience from V5 EA (early adopter) customers and partners. Forrester Research will provide a playbook designed to help prioritize and plan your IT investments in 2014. We will be forming Nexthink User Groups at the event.

In brief: Nexthink V5 raises the bar to new heights! V5 introduces a new modular product architecture and four modules. Actionable dashboard that seamlessly integrates real-time and historical data into a single view even for large environments Data Privacy Nexthink protects user's privacy and provides new features to anonymize analytics data and restrict access for specific roles Improve Incident & Problem Mgmt through IT analytics. Reduce incidents by 35%, solve problems 60% faster and move to a proactive model. Web & Cloud module is a new module. Learn how to map all intranet and extranet activities to applications and analyze their impact. Security module adds application binary and website tagging and categorization to more easily identify potential security threats in real-time. VDI Transformation module provides a framework and methodology to better plan, execute and measure the impact of all your transformation projects. Integration Toolkit module is used to integrate Nexthink with other systems and processes. Integrate Nexthink to improve processes and maximize the ROI.

ITSM: IT services analytics in real-time The concept of services in V5 has been rewritten from scratch, drastically improving metric accuracy, delivering better cause analysis, and breaking previous scalability limitations: New Finder Service View for in-depth analysis and visualizations: Real-time overview of all service metrics User friendly visualization with location-based drill-down to analyze issues Improved cause analysis of issues between network, applications, or devices Location-based grouping of devices for improved service cartography New smart analysis of service-related issues to automatically identify: Connectivity issues with a close-tozero false-positives ratio Network performance issues from self-learned baselines by location Abnormal application crash rates

Improved services metrics are computed in real-time by Nexthink Engines. Data is aggregated every 10 minutes in Nexthink Portal to provide a real-time interface. Enhanced Portal Service widget is designed to show the status of multiple services in one dashboard, running in real-time and including more metrics. New service alerts are computed at the Portal level by hierarchy and aggregated over all Engines. Alerts can be configured based on roles; for instance, a local IT manager can be alerted if a user can t use Microsoft Office, while a CIO would be alerted only when a whole country is experiencing issues. Main benefits: Real-time visibility, showing the status and causes of issues with critical IT services for all business users in a single, cross-engine, dashboard. Be alerted of service issues with the appropriate level of detail based on role in the organization. Analyze service issues quickly: detect where the problem is located, who is affected, and whether the issue is caused at the applications, network, or devices level.

Analytics and product usability Smart search and improved user experience in Nexthink Finder A smart search for the Finder. The search algorithm understands the semantic of the search string and proposes results based on that. For instance, the user can type computers firefox ; Nexthink will provide (among others) the following results: Devices where Firefox is installed Devices executing Firefox Devices with network issues of Firefox Devices where Firefox crashes A brand new login screen allows quicker access to the Finder. Collapsible accordion and restructured interface to maximize available space, showing on-screen what really matters.

Security Broader and smarter security metrics Endpoint security information is retrieved in a completely new way, applying new techniques to extend vendor and product coverage to those most commonly available on the market: Visibility of antivirus products installed on a device. For each one we provide the display name, real-time protection (RTP) status, and update status. Visibility of firewall products installed on a device. For each one we provide the display name and RTP status Visibility of antispyware products installed on a device. For each one we provide the display name, RTP status, and update status. Main benefits: Visibility for all installed antivirus, firewall, and antispyware, versus a select limited number of vendors and specific products. Ability to know if the endpoint is configured properly Has Windows Firewall been replaced by Symantec? Has Windows Defender been replaced by Bitdefender?

Analytics for all web & cloud applications V5 introduces un-matched visibility for web & cloud applications. All HTTP and HTTPS requests made by any application (not only browsers) are monitored by the new Nexthink Collector V5. For each request it computes metrics such as: the incoming and outgoing traffic volume the network response time the web request duration the protocol used HTTP requests: visibility on status code including errors (2xx, 3xx, 4xx, and 5xx) Nexthink V5 brings a new Web & Cloud applications cartography in the Finder. All V5 service extensions are available for web applications, internal or cloud. In addition, extensive privacy configuration options are available to discard specific data or make it available only to specific roles. Tagging of cloud applications and web domains with key information, including: Threat level obtained by aggregating several threat providers Hosting country 20 app categories (business, IT, security threat, )

Main Benefits: Real-time web and cloud applications discovery, with zero configuration: All internal web applications accessed through browsers or rich clients All external web domains and cloud applications accessed through browsers Machines acting as web proxies Web activity of any application ITSM: Usage patterns of web-based business applications Identification of problems due to web application access with unsupported browsers or system configurations Real-time monitoring of web applications, including metrics regarding performance and errors Security: Automatic detection of obsolete encryption standards Access to web applications by unauthorized users Large downloads/uploads of data Access to insecure web domains Applications accessing unwanted web content or sending data to untrusted web domains

Product manageability Scalable and simplified license management Whether your organization has 1,000 or 250,000 devices, with Nexthink V5 only one activation key/file is needed, no matter how many Engines you have. You can activate the product in five clicks and assign license slots for devices to all Engines with a single, centralized interface. Engine boosted to support up to 10,000 devices Nexthink Engine is now deployed as a 64-bit server increasing the number of devices supported per Engine up to 10,000. With Web & Cloud, for instance, an Engine can support up to 8,000 devices (depending on the privacy settings).