#MicroFocusCyberSummit ZENworks Keynote Session Gil Cattelain - - PowerPoint PPT Presentation

microfocuscybersummit zenworks keynote session
SMART_READER_LITE
LIVE PREVIEW

#MicroFocusCyberSummit ZENworks Keynote Session Gil Cattelain - - PowerPoint PPT Presentation

#MicroFocusCyberSummit ZENworks Keynote Session Gil Cattelain Jason Blackett #MicroFocusCyberSummit Business Challenges Our Products How We Solve Challenges Roadmap Solution and Vision Any Questions Secure Unified Endpoint Management


slide-1
SLIDE 1

#MicroFocusCyberSummit

slide-2
SLIDE 2

#MicroFocusCyberSummit

ZENworks Keynote Session

Gil Cattelain Jason Blackett

slide-3
SLIDE 3

Business Challenges How We Solve Challenges Solution and Vision Our Products Roadmap Any Questions

Secure Unified Endpoint Management – ZENworks

slide-4
SLIDE 4

User challenges

slide-5
SLIDE 5

Any device

  • Using corporate-owned devices and personal

devices (BYOD)

  • Using different operating systems, variety of

apps – and they will get what they want! (Shadow IT)

  • Mixing their data and tools from their

professional and personal lives

From any location at any time

  • Often from unsecure and non-performant public

WIFI that can be vulnerable to malicious attacks – viruses, malware, spyware etc.

  • Exposed to physical threats – lost and stolen

devices, removable devices etc.

  • Negligence and accidental risks on the road or at

home

5

Users today want to get their job done using any device – from any location at any time

“Employee mobility leads to 30% better processes and 23% more productivity – and 100% more satisfied employees” – Is Mobility The Answer to Better Productivity, D. Newman, www.forbes.com

slide-6
SLIDE 6

IT challenges and benefits

slide-7
SLIDE 7

Data, devices and access must be secured and you need to be able to prove it

  • Protect the business Intellectual Property of your
  • rganization
  • Prevent damage to company image and reputation
  • Prevent costly regulatory and data breach fines

7

What does it mean to IT: Protect your organization

  • 70 million smartphones are lost each year,

with only 7% recovered

  • One laptop is stolen every 53 seconds
  • 52% of devices are stolen from the
  • ffice/workplace and 24% from conferences
  • ChannelProNetwork
slide-8
SLIDE 8

Empower end-users to make the business more successful

  • Ensure users have the business tools they need to

get their job done

  • Make it easy for users to request access to services

to get work done

  • Automate security as much as possible to prevent

users from accidently leaking data

8

What does it mean to IT: Increase user productivity

2017 Top 5 Threats to IT Security

1.End Users 2.Lack of Security Patching 3.Lack of Security Software and Hardware 4.Inadequate Backup and Planning 5.Stagnate – Inactive IT Staff

Shawn Pate, Senior Technical Advisor WorkSmart (www.worksmart)

slide-9
SLIDE 9

Secure and empower the user while driving down costs

  • Simplify the processes and tools you use, to keep make IT more effective and productive
  • Align the backend business process to make IT strategic to the business
  • Improve compliance and lower IT costs

9

What does it mean to IT: End results

slide-10
SLIDE 10
  • To Empower users through self-service
  • To effectively Manage a variety of platforms
  • Having Powerful and efficient application and

resource deployment capability

  • To Secure both data and devices
  • With Consistent management paradigm
  • Having a Single Pane of glass
  • While leveraging existing investments

Unified Endpoint Management (UEM)

10

What does IT need?

A solution ...

slide-11
SLIDE 11

Enabling the digital workspace with ZENworks Our solution…

slide-12
SLIDE 12

Encompasses all of the technologies users need to do their jobs

  • Mobile devices
  • Laptops/desktops
  • Apps
  • Company store
  • Self- services
  • Email
  • Instant messaging
  • File sharing etc.

Create a successful and collaborative workforce

  • Employee productivity
  • IT productivity
  • User satisfaction
  • Retention of employees
  • Collaboration and access
  • Etc.

Create a competitive edge

  • Revenue growth
  • Increased interaction
  • Enhanced employee engagement
  • Better service
  • Increased compliance
  • Control and risk

12

What is it? Why you need it? Benefits?

ZENworks – Digital Workspace

Today’s digital workspace is an always connected environment providing instant access to everything users need

slide-13
SLIDE 13

Delivering the digital workspace with ZENworks Unified Endpoint Management

Micro Focus ZENworks

AUTOMATION CONFIG SINGLE PANE OF GLASS SECURITY COMPLIANCE USER SELF- SERVICES

slide-14
SLIDE 14

ZENworks Overview – Roadmap

slide-15
SLIDE 15

ZENworks provides a unified endpoint management solution for managing and securing all of your endpoint devices, in a contextual, user-centric fashion, leveraging the best capabilities of each platform, while maintaining an easy to learn and use management paradigm

What is ZENworks?

slide-16
SLIDE 16

What is Unified Endpoint Management?

Client Management Endpoint Mobile Management Enterprise IoT Management

Manages traditional devices:

  • Windows
  • Linux
  • Mac

Usually Agent Based Key Capabilities

  • OS Deployment
  • Software Delivery
  • Configuration

Management

  • Inventory
  • Remote Mgmt

Manages mobile devices:

  • Windows
  • iOS
  • Android

Leverages native MDM platform capabilities Key Capabilities

  • Software delivery
  • Device lock down
  • Resource

provisioning Manages things that are based on enterprise platforms Key Capabilities

  • Inventory
  • Lockdown
  • Software delivery

Unified Endpoint Management Manages

  • Traditional Clients
  • Mobile Devices
  • IoT Things

Key Capabilities

  • Single pane of glass
  • Single management paradigm, learn once
  • Superset of all 3 traditional tools
  • Facilitates user self-service
  • Secures devices
  • Resource and configuration deployment

Available capabilities dictated by platform, agent may be optional

slide-17
SLIDE 17

Unified Endpoint Management Capabilities

Configuration Management Desktop Containers* Asset Management Patch Management* Disk Encryption Endpoint Security Mobile Workspace* Any Device IT Service Management* Reporting Service

ZENworks Suite

Identity

* Additional capabilities available as an add-on to the ZENworks Suite

slide-18
SLIDE 18

ZENworks Evolution

We are here

eDirectory Centric Windows Management (ZENworks 1 – 7.0) SOA Based Windows Management (ZENworks 10) Cross platform Client Management (ZENworks 11) Unified Endpoint Management (ZENworks 2017) Secure Unified Endpoint Management Secure Unified Endpoint Management from Anywhere

  • Managed Windows 95/NT

– Windows XP

  • Built on NetWare /

eDirectory foundation

  • Started with simple

application management and grew to full lifecycle management

  • Modern Internet friendly,

service oriented architecture with web based mgmt

  • Cross platform server,

directory and database infrastructure

  • Tightly integrated

management platform for Configuration, Patch and Asset Management

  • Support for managing

Windows Vista+, Linux and Macintosh

  • Integrated Endpoint

Security Management and Full Disk Encryption

  • Single paradigm

management of Windows, Linux, Macintosh, iOS, Android and ActiveSync devices

  • Enable users via self-

service and modernized end user interfaces

  • Robust dashboarding and

reporting

  • Security View of the

Endpoint

  • Device risk analysis
  • Deeper endpoint

protection

  • Integrated with Access and

Identity

  • Transition to cloud friendly

architecture

  • Offered as a service and
  • n-prem
slide-19
SLIDE 19

The value of ZENworks Unified Endpoint Management

Empower users through self service and support the devices and applications they want to use to do their job Protect users, their devices and your data from misuse, accidental exposure, patch vulnerabilities and more Minimize administrator learning time and IT costs by having a single administration console and consistent workflows for securing and managing all of your Windows, Linux, Mac, iOS and Android Reduce the complexity of endpoint management software by utilizing one or fewer agent (client) per device Enjoy price breaks associated with owning multiple ZENworks products that grow with you as needed

slide-20
SLIDE 20

20

ZENworks Configuration Management Purchasing Information

ZENworks Configuration Management (ZCM) is available as either perpetual license + maintenance or as an annual subscription When purchased per-user, you can manage up to 5 mobile or traditional devices used by a given user with the single license When purchased per-device you must have a license for each device that you will manage, tiered pricing available for mobile vs traditional devices ZCM is also available as part of the ZENworks Suite and Micro Focus Open Workgroup Suite ZCM includes a 2-technician license entitlement for ZENworks Service Desk that could be used to implement all

  • f the Self Service capabilities described
slide-21
SLIDE 21

21

Summary

Let ZENworks help you…

Empower your end users to work the way they want Secure your data, devices and access to protect your IP and reputation while preventing costly fines Improve IT efficiency by simplifying how you manage and service end users and their devices

slide-22
SLIDE 22
  • Check out our blogs => https://www.novell.com/communities/coolsolutions/
  • Visit our Support Forums => https://forums.novell.com/forum.php
  • Attend our Community Webinars => https://www.microfocus.com/about/webinars/
  • Make feature recommendations via our Ideas Portal => https://ideas.microfocus.com/MFI
  • Review our success stories => https://www.microfocus.com/resources/?type=success-story

Call to Action –

Check out our Data Sheet! Check out Chalk Talks!

slide-23
SLIDE 23
slide-24
SLIDE 24

Thank You.

#MicroFocusCyberSummit

slide-25
SLIDE 25

#MicroFocusCyberSummit

slide-26
SLIDE 26

Additional information

#MicroFocusCyberSummit

slide-27
SLIDE 27

High-level capabilities of ZENworks that allow you seize the opportunity

27

slide-28
SLIDE 28
  • ZENworks is a secure unified endpoint management solution that

allows you to manage and secure all of your endpoint devices using a consistent, identity-based management paradigm, from a common web based management console.

  • ZENworks provides both robust IT controls and intuitive store-like

self-service to meet IT’s needs while improving customer satisfaction

Introducing ZENworks

slide-29
SLIDE 29

Capabilities for Securing Data, Devices and Access

Protect your data

  • Encrypt the fixed disks on all of your Windows devices
  • Protect data copied to removable storage devices with

centrally managed Bitlocker removable storage encryption

  • Ensure mobile devices are encrypted when enrolled for

corporate data access

  • Wipe data from the devices if they are lost
  • Monitor data copied to removable media
slide-30
SLIDE 30

Capabilities for Securing Data, Devices and Access

Secure BYO mobile access through containment

  • Securely provision and configure access to corporate

applications, PIM data, documents and web applications on BYO devices

  • Ensure data is secure both at-rest and in-motion
  • Wipe corporate data without impacting user data
  • Limit access to corporate data based on time, location, or

jailbreak status

slide-31
SLIDE 31

Capabilities for Securing Data, Devices and Access

Automated OS and Application Patch Vulnerability Scanning and Remediation

  • Identify all of the Windows, Linux and MacOS devices that

have known OS patch vulnerabilities

  • Identify patch vulnerabilities for the most popular 3rd party

application software

  • Define policies to keep your devices patched based on

vendor, severity, patch age, and more

  • Track patching with rich dashboarding and reporting

capabilities

slide-32
SLIDE 32

Capabilities for Securing Data, Devices and Access

Enforce secure configuration with device management

  • Limit the applications that a user can use to interact with

corporate data

  • Require secure passwords, display lock and other critical

security settings on your mobile devices

  • Provision and configure critical applications such as anti-virus

/ anti-malware

  • For enterprise “things” restrict what users can do with them
slide-33
SLIDE 33

Capabilities for Securing Data, Devices and Access

Package and secure legacy applications to facilitate productivity in a secure way

  • Package legacy applications to save costs and ensure business

continuity

  • Restrict the network access of these legacy applications to

specific IPs / DNS in the organization

  • Force all containerized application traffic through an HTTP

proxy

slide-34
SLIDE 34

Capabilities for Securing Data, Devices and Access

Protect your users from insecure network threats

  • Enforce use of VPN when on an unsecure network
  • Limit access to corporate resources when on unsecure

networks

  • Enforce device firewall settings to protect the device
  • Prevent the use of undesirable WiFi
  • Provide seamless access to corporate resources on BYO

mobile devices

slide-35
SLIDE 35

Capabilities for Empowering the User

Automatically provision users what the business knows they need to get their job done on the device being used

  • Assign resources to user or device identity
  • Deliver what the user needs and protect the device based on

their location, time of day, device and business role

  • Make resources available based on the user’s or device’s role

in the organization

  • Apply just enough management based on what the user is

doing

slide-36
SLIDE 36

Capabilities for Empowering the User

Provide users with self-service access to IT services

  • Prevent “shadow-IT” by giving users an easy way to get what

they need

  • Define custom workflows for items that need approvals or
  • utside activities so that business owners can approve and IT

isn’t involved in every request

  • Provide users a self-service launch pad for their applications
  • Allow users to search for known IT issues, FAQs and if needed
  • pen Incidents or Requests
slide-37
SLIDE 37

Capabilities that reduce IT Costs

Manage the lifecycle of all of your devices in a common way

  • A single unified management paradigm means you can learn how to

manage devices one time and then apply that learning to all devices

  • Manage the complete cradle to grave lifecycle of the device including
  • OS deployment and device provisioning
  • Application distribution and management
  • Hardware and software inventory
  • Application of standardized configuration and security policies
  • Remote management to assist the user when needed
slide-38
SLIDE 38

Capabilities that reduce IT Costs

Manage the lifecycle of your applications

  • Don’t just stop at the distribution of the application, control

the process from distribution to launch to uninstall

  • Simple to use UI for building even complex application

deployment and configuration scenarios with little or no scripting required

  • Includes a full license for AdminStudio Standard Edition for

application packaging and customization

  • Target applications to devices OR users
slide-39
SLIDE 39

Capabilities that reduce IT Costs

Leverage your existing investments

  • Pick the backend infrastructure that makes sense
  • Appliance, Windows or Linux
  • Sybase, SQL, Oracle or PostgreSQL
  • Leverage existing file servers OR use the content repository
  • Leverage your existing identity store for user identity,

hierarchy and group data

slide-40
SLIDE 40
  • IT wants to manage all devices and

resources from one central location

  • Convergence of EM and MDM/EMM

To assure users can..

  • Work from any device, from anywhere

at any time

  • And have access to self-services &

immediate resources

40

UEM Market Trends

Market Opportunity: 3.73 Billion USD by 2020 Estimated CAGR @ 42.9%

slide-41
SLIDE 41

ZENworks – Enabling the Workspace through Unified Endpoint Management

AUTOMATION | CONFIGURATION SINGLE PANE OF GLASS SECURITY COMPLIANCE USER SELF-SERVICES USER WORKSPACE

Workspace automation process for all devices and self-services by selecting any services from any device. Seamless integration of all IT systems by providing a complete view of the workspace. Secure the workspace through endpoint security, encryption, location- awareness, wireless security, containerization and many more. Assure workspace compliance for your assets, licenses, apps, devices, contracts, etc. Request, track, activate, print, file share, collaborate and much more from the workspace.

Self-services Data BYOD Apps Devices

Self-services Data BYOD Apps Devices User Based

Configuration Management, Endpoint Security, Mobile Workspace, Service Desk, Patch Management, Desktop Containers, Asset Management The ZENworks Control Center / Common End User Portal Asset Management, Patch Management, FDE, Endpoint Security Full Disk Encryption, Endpoint Security, Mobile Workspace, Desktop Containers Service Desk, Mobile Workspace, Desktop Containers

slide-42
SLIDE 42

End users

  • Productivity: Work from any location, using any device
  • Effectiveness: Want to share and collaborate with colleagues
  • Satisfaction: Want my BYOD devices supported

IT

  • Boost IT productivity: Want to focus on other projects
  • Show value: Want to align IT with business objectives
  • Deliver on time: Want to keep all apps, patches etc. current

Business

  • Reduce risk: Want to protect data and avoid security breaches
  • Increase compliance: Want to remain compliance on devices and apps etc.
  • Cost savings: Want to be able to do more with less

42

Endpoint Management Challenges and Benefits

slide-43
SLIDE 43

ZENworks Configuration Management

Unified Endpoint Management

Last Updated: May 7, 2018

slide-44
SLIDE 44

The shifting way we work… Unified Endpoint Management Solving IT challenges with ZENworks Configuration Management Empowering end users with ZENworks Configuration Management The power of ZENworks Purchasing information

Agenda

53

slide-45
SLIDE 45

The shifting way we work

slide-46
SLIDE 46

Unified Endpoint Management and What it Means to You

slide-47
SLIDE 47

What experts are saying about mobility and UEM

Secure

70 million smartphones are lost each year, with only 7% recovered One laptop is stolen every 53 seconds 52% of devices are stolen from the

  • ffice/workplace and 24% from

conferences

Change

“Over the next seven years everything about PC and mobile device management will begin to shift as we enter the new landscape of UEM.

What you need to know about Unified Endpoint Management, J. Walker, www.monitis.com

Empower

“Employee mobility leads to 30% better processes and 23% more productivity – and 100% more satisfied employees”

The Answer to Better Productivity, D. Newman, www.forbes.com

  • ChannelProNetwork
slide-48
SLIDE 48

Meeting IT’s Unified Endpoint Management Needs with the ZENworks Configuration Management

slide-49
SLIDE 49

5 8

Harold, the Device Manager needs to manage all his users devices while reducing costs and keeping his sanity To do this he needs to:

 Quickly deploy new operating systems,

applications and configuration changes across a wide range of devices and platforms

 Leverage each platform’s unique capabilities in

easy-to-learn-once manner

 Quickly see the status of the organization and

take needed actions

 Ensure the security of the device and the data

that resides thereon is maintained

 Facilitate access to what he (you) know users

need, and make it easy to request everything else

slide-50
SLIDE 50
  • Now more than ever, change is the

new norm and he (you) needs to be able to keep up

  • Applications are the lifeblood of

productivity, but can be complex and deploying them shouldn’t require you to be a rocket scientist

  • To make sure users are productive he

(you) must be able to give the user what they need when they need it

Why is this important to Harold?

The Need

Quickly deploy new operating systems, applications and configuration changes…

ZENworks Configuration Management

What can Harold (and you) do?

The Solution

Automated OS deployment and flexible application management

  • Quickly deploy Windows 10 to new and

existing devices

  • Deploy and manage the complete lifecycle of

applications across platforms

  • Quickly deploy device configuration changes
slide-51
SLIDE 51

ZENworks Configuration Management

The Demo

Windows 10 deployment and application management

slide-52
SLIDE 52
  • Management capabilities of the

device, dictate what he (you) can do – but having to learn how to manage each device differently is confusing and expensive

  • To truly manage the device he (you)

need to take advantage of what’s available

Why is this important to Harold?

The Need

Leverage each platform’s unique capabilities in easy-to- learn-once manner

ZENworks Configuration Management

What can Harold (and you) do?

The Solution

Full service management, leveraging the unique capabilities of each platform

  • Use native mobile management capabilities
  • Leverage the full power of the Windows

platform

  • Apple Volume Purchase Program
  • Apple Device Enrollment Program
  • iOS Configuration Profiles
  • Android Enterprise Work Profile and Work Managed
  • Not limited to just what Windows MDM allows, manage

Windows 7 – 10 with a consolidated set of capabilities

  • Integration with Microsoft Deployment Toolkit (MDT) for

Windows deployments

slide-53
SLIDE 53

ZENworks Configuration Management

The Demo

Leveraging native MDM management

slide-54
SLIDE 54
  • He has diverse platforms and multiple
  • perating systems to manage with

more coming all the time

  • He doesn’t have the people, time, or

money to manage each device type with a different tool

Why is this important to Harold?

The Need

Manage a wide range of devices and platforms

ZENworks Configuration Management

What can Harold (and you) do?

The Solution

Unified management of all devices in a consistent manner

  • Manage laptops, desktops, servers,

smartphones, tablets and even “things”

  • Support the variety of devices your users need,

including:

  • Manage it all from one console, using a single,

enterprise scale management paradigm

  • Windows
  • Linux
  • Mac
  • iOS
  • Android
slide-55
SLIDE 55

ZENworks Configuration Management

The Demo

Cohesive management paradigm

slide-56
SLIDE 56
  • Understanding what’s happening in

the endpoint management environment means he (and you) can be more proactive

  • Your boss wants to know what he is

(and you are) doing for the

  • rganization

Why is this important to Harold?

The Need

Quickly see the status of the

  • rganization and take needed

actions

ZENworks Configuration Management

What can Harold (and you) do?

The Solution

Built-in Dashboarding and reporting

  • View and customize the dashboards to make it

easy to monitor your environment

  • Quickly take action when you identify

something that needs to change

  • Provide reports and big screen dashboards

with ZENworks Reporting

slide-57
SLIDE 57

ZENworks Configuration Management

The Demo

Dashboarding and Reporting

slide-58
SLIDE 58
  • Devices are increasingly used outside

workplace and can be easily compromised

  • Compromised device needs to be

found/locked/wiped to prevent data leakage

Why is this important to Harold?

The Need

Secure data and devices

ZENworks Configuration Management

What can Harold (and you) do?

The Solution

Built in security policies and controls

  • Apply native security controls across platforms
  • Take actions when devices are lost or stolen
  • Protect Office 365 mobile application data

with support for InTune Application Protection policies

  • Further secure devices with Endpoint Security,

Full Disk Encryption and Patch Management

slide-59
SLIDE 59

ZENworks Configuration Management

The Demo

Securing devices with policies and quicktasks

slide-60
SLIDE 60

Meeting End User Needs with ZENworks Configuration Management

slide-61
SLIDE 61

7

Alison, the end user just wants to get her work done To do so, she needs to be able to:

 Have access to the data and applications she

needs to do her job

 Be able to work on the device she has with her

now

 Request new resources without getting

bogged down

slide-62
SLIDE 62
  • She just wants to get her job done and

expects that IT will give her what she need to do that

  • When she needs something, she

usually needs it now and if IT doesn’t give it to her, she’ll probably find a way to get it

Why is this important to Alison?

The Need

Request and access resources without getting bogged down

ZENworks Configuration Management

What can Alison (and you) do?

The Solution

The ZENworks Store and ZENworks Application Window

  • Launch any application that has been

provisioned by IT based on identity, role or device

  • Request access to any resources that IT has

listed in the ZENworks Store and get access as soon as any business requirements are met

slide-63
SLIDE 63
  • Allows end users to request services

from IT and for the capabilities to be provisioned without him having to be directly involved in each request

  • Prevents “Shadow IT” by empowering

users to get what they want the right way

Why is this important to Harold?

The Need

Empower the end user to do their job and self-serve so IT can focus on other things

ZENworks Configuration Management

What can Harold (and you) do?

The Solution

Leverage the power of identity to target resources and make optional resources available via a workflow driven, self service store

  • Target applications at device or user
  • Provide an enterprise store where end users can see

what the company can offer

  • Automate the request fulfillment process for many

requests

slide-64
SLIDE 64

ZENworks Configuration Management

The Demo

ZENworks Store and the ZENworks Application Window

slide-65
SLIDE 65

ZENworks Configuration Management

The Key Takeaways

End users want to work differently than they have in the past driving an explosion in the devices that IT has to manage. IT professionals need a way to keep their sanity while empowering end-users and securing all of these devices to unlock the potential of the new digital workspace.

The ZENworks Configuration Management Way

Automated OS deployment with or without MDT Coverage of Windows, iOS, Android, Linux, and Macintosh operating system versions Support for native MDM capabilities such as DEP, VPP, and Android for Work Full lifecycle management, not just distribution Robust dashboarding and report capabilities for operators and their managers Control of native platform security controls All done in a consistent management paradigm using a consolidated on-prem architecture End user driven self-fulfillment allowing the user to unlock their potential

slide-66
SLIDE 66

The Power of ZENworks

slide-67
SLIDE 67

76

Micro Focus ZENworks

Configuration Management Desktop Containers* Asset Management Patch Management* Disk Encryption Endpoint Security Mobile Management

Any Device

IT Service Management* Reporting Service

Micro Focus ZENworks Suite

Any Device

* Additional capabilities available as an add-on to the ZENworks Suite

slide-68
SLIDE 68

Purchasing Information

slide-69
SLIDE 69

Thank you.