#MicroFocusCyberSummit
#MicroFocusCyberSummit ZENworks Keynote Session Gil Cattelain - - PowerPoint PPT Presentation
#MicroFocusCyberSummit ZENworks Keynote Session Gil Cattelain - - PowerPoint PPT Presentation
#MicroFocusCyberSummit ZENworks Keynote Session Gil Cattelain Jason Blackett #MicroFocusCyberSummit Business Challenges Our Products How We Solve Challenges Roadmap Solution and Vision Any Questions Secure Unified Endpoint Management
#MicroFocusCyberSummit
ZENworks Keynote Session
Gil Cattelain Jason Blackett
Business Challenges How We Solve Challenges Solution and Vision Our Products Roadmap Any Questions
Secure Unified Endpoint Management – ZENworks
User challenges
Any device
- Using corporate-owned devices and personal
devices (BYOD)
- Using different operating systems, variety of
apps – and they will get what they want! (Shadow IT)
- Mixing their data and tools from their
professional and personal lives
From any location at any time
- Often from unsecure and non-performant public
WIFI that can be vulnerable to malicious attacks – viruses, malware, spyware etc.
- Exposed to physical threats – lost and stolen
devices, removable devices etc.
- Negligence and accidental risks on the road or at
home
5
Users today want to get their job done using any device – from any location at any time
“Employee mobility leads to 30% better processes and 23% more productivity – and 100% more satisfied employees” – Is Mobility The Answer to Better Productivity, D. Newman, www.forbes.com
IT challenges and benefits
Data, devices and access must be secured and you need to be able to prove it
- Protect the business Intellectual Property of your
- rganization
- Prevent damage to company image and reputation
- Prevent costly regulatory and data breach fines
7
What does it mean to IT: Protect your organization
- 70 million smartphones are lost each year,
with only 7% recovered
- One laptop is stolen every 53 seconds
- 52% of devices are stolen from the
- ffice/workplace and 24% from conferences
- ChannelProNetwork
Empower end-users to make the business more successful
- Ensure users have the business tools they need to
get their job done
- Make it easy for users to request access to services
to get work done
- Automate security as much as possible to prevent
users from accidently leaking data
8
What does it mean to IT: Increase user productivity
2017 Top 5 Threats to IT Security
1.End Users 2.Lack of Security Patching 3.Lack of Security Software and Hardware 4.Inadequate Backup and Planning 5.Stagnate – Inactive IT Staff
Shawn Pate, Senior Technical Advisor WorkSmart (www.worksmart)
Secure and empower the user while driving down costs
- Simplify the processes and tools you use, to keep make IT more effective and productive
- Align the backend business process to make IT strategic to the business
- Improve compliance and lower IT costs
9
What does it mean to IT: End results
- To Empower users through self-service
- To effectively Manage a variety of platforms
- Having Powerful and efficient application and
resource deployment capability
- To Secure both data and devices
- With Consistent management paradigm
- Having a Single Pane of glass
- While leveraging existing investments
Unified Endpoint Management (UEM)
10
What does IT need?
A solution ...
Enabling the digital workspace with ZENworks Our solution…
Encompasses all of the technologies users need to do their jobs
- Mobile devices
- Laptops/desktops
- Apps
- Company store
- Self- services
- Instant messaging
- File sharing etc.
Create a successful and collaborative workforce
- Employee productivity
- IT productivity
- User satisfaction
- Retention of employees
- Collaboration and access
- Etc.
Create a competitive edge
- Revenue growth
- Increased interaction
- Enhanced employee engagement
- Better service
- Increased compliance
- Control and risk
12
What is it? Why you need it? Benefits?
ZENworks – Digital Workspace
Today’s digital workspace is an always connected environment providing instant access to everything users need
Delivering the digital workspace with ZENworks Unified Endpoint Management
Micro Focus ZENworks
AUTOMATION CONFIG SINGLE PANE OF GLASS SECURITY COMPLIANCE USER SELF- SERVICES
ZENworks Overview – Roadmap
ZENworks provides a unified endpoint management solution for managing and securing all of your endpoint devices, in a contextual, user-centric fashion, leveraging the best capabilities of each platform, while maintaining an easy to learn and use management paradigm
What is ZENworks?
What is Unified Endpoint Management?
Client Management Endpoint Mobile Management Enterprise IoT Management
Manages traditional devices:
- Windows
- Linux
- Mac
Usually Agent Based Key Capabilities
- OS Deployment
- Software Delivery
- Configuration
Management
- Inventory
- Remote Mgmt
Manages mobile devices:
- Windows
- iOS
- Android
Leverages native MDM platform capabilities Key Capabilities
- Software delivery
- Device lock down
- Resource
provisioning Manages things that are based on enterprise platforms Key Capabilities
- Inventory
- Lockdown
- Software delivery
Unified Endpoint Management Manages
- Traditional Clients
- Mobile Devices
- IoT Things
Key Capabilities
- Single pane of glass
- Single management paradigm, learn once
- Superset of all 3 traditional tools
- Facilitates user self-service
- Secures devices
- Resource and configuration deployment
Available capabilities dictated by platform, agent may be optional
Unified Endpoint Management Capabilities
Configuration Management Desktop Containers* Asset Management Patch Management* Disk Encryption Endpoint Security Mobile Workspace* Any Device IT Service Management* Reporting Service
ZENworks Suite
Identity
* Additional capabilities available as an add-on to the ZENworks Suite
ZENworks Evolution
We are here
eDirectory Centric Windows Management (ZENworks 1 – 7.0) SOA Based Windows Management (ZENworks 10) Cross platform Client Management (ZENworks 11) Unified Endpoint Management (ZENworks 2017) Secure Unified Endpoint Management Secure Unified Endpoint Management from Anywhere
- Managed Windows 95/NT
– Windows XP
- Built on NetWare /
eDirectory foundation
- Started with simple
application management and grew to full lifecycle management
- Modern Internet friendly,
service oriented architecture with web based mgmt
- Cross platform server,
directory and database infrastructure
- Tightly integrated
management platform for Configuration, Patch and Asset Management
- Support for managing
Windows Vista+, Linux and Macintosh
- Integrated Endpoint
Security Management and Full Disk Encryption
- Single paradigm
management of Windows, Linux, Macintosh, iOS, Android and ActiveSync devices
- Enable users via self-
service and modernized end user interfaces
- Robust dashboarding and
reporting
- Security View of the
Endpoint
- Device risk analysis
- Deeper endpoint
protection
- Integrated with Access and
Identity
- Transition to cloud friendly
architecture
- Offered as a service and
- n-prem
The value of ZENworks Unified Endpoint Management
Empower users through self service and support the devices and applications they want to use to do their job Protect users, their devices and your data from misuse, accidental exposure, patch vulnerabilities and more Minimize administrator learning time and IT costs by having a single administration console and consistent workflows for securing and managing all of your Windows, Linux, Mac, iOS and Android Reduce the complexity of endpoint management software by utilizing one or fewer agent (client) per device Enjoy price breaks associated with owning multiple ZENworks products that grow with you as needed
20
ZENworks Configuration Management Purchasing Information
ZENworks Configuration Management (ZCM) is available as either perpetual license + maintenance or as an annual subscription When purchased per-user, you can manage up to 5 mobile or traditional devices used by a given user with the single license When purchased per-device you must have a license for each device that you will manage, tiered pricing available for mobile vs traditional devices ZCM is also available as part of the ZENworks Suite and Micro Focus Open Workgroup Suite ZCM includes a 2-technician license entitlement for ZENworks Service Desk that could be used to implement all
- f the Self Service capabilities described
21
Summary
Let ZENworks help you…
Empower your end users to work the way they want Secure your data, devices and access to protect your IP and reputation while preventing costly fines Improve IT efficiency by simplifying how you manage and service end users and their devices
- Check out our blogs => https://www.novell.com/communities/coolsolutions/
- Visit our Support Forums => https://forums.novell.com/forum.php
- Attend our Community Webinars => https://www.microfocus.com/about/webinars/
- Make feature recommendations via our Ideas Portal => https://ideas.microfocus.com/MFI
- Review our success stories => https://www.microfocus.com/resources/?type=success-story
Call to Action –
Check out our Data Sheet! Check out Chalk Talks!
Thank You.
#MicroFocusCyberSummit
#MicroFocusCyberSummit
Additional information
#MicroFocusCyberSummit
High-level capabilities of ZENworks that allow you seize the opportunity
27
- ZENworks is a secure unified endpoint management solution that
allows you to manage and secure all of your endpoint devices using a consistent, identity-based management paradigm, from a common web based management console.
- ZENworks provides both robust IT controls and intuitive store-like
self-service to meet IT’s needs while improving customer satisfaction
Introducing ZENworks
Capabilities for Securing Data, Devices and Access
Protect your data
- Encrypt the fixed disks on all of your Windows devices
- Protect data copied to removable storage devices with
centrally managed Bitlocker removable storage encryption
- Ensure mobile devices are encrypted when enrolled for
corporate data access
- Wipe data from the devices if they are lost
- Monitor data copied to removable media
Capabilities for Securing Data, Devices and Access
Secure BYO mobile access through containment
- Securely provision and configure access to corporate
applications, PIM data, documents and web applications on BYO devices
- Ensure data is secure both at-rest and in-motion
- Wipe corporate data without impacting user data
- Limit access to corporate data based on time, location, or
jailbreak status
Capabilities for Securing Data, Devices and Access
Automated OS and Application Patch Vulnerability Scanning and Remediation
- Identify all of the Windows, Linux and MacOS devices that
have known OS patch vulnerabilities
- Identify patch vulnerabilities for the most popular 3rd party
application software
- Define policies to keep your devices patched based on
vendor, severity, patch age, and more
- Track patching with rich dashboarding and reporting
capabilities
Capabilities for Securing Data, Devices and Access
Enforce secure configuration with device management
- Limit the applications that a user can use to interact with
corporate data
- Require secure passwords, display lock and other critical
security settings on your mobile devices
- Provision and configure critical applications such as anti-virus
/ anti-malware
- For enterprise “things” restrict what users can do with them
Capabilities for Securing Data, Devices and Access
Package and secure legacy applications to facilitate productivity in a secure way
- Package legacy applications to save costs and ensure business
continuity
- Restrict the network access of these legacy applications to
specific IPs / DNS in the organization
- Force all containerized application traffic through an HTTP
proxy
Capabilities for Securing Data, Devices and Access
Protect your users from insecure network threats
- Enforce use of VPN when on an unsecure network
- Limit access to corporate resources when on unsecure
networks
- Enforce device firewall settings to protect the device
- Prevent the use of undesirable WiFi
- Provide seamless access to corporate resources on BYO
mobile devices
Capabilities for Empowering the User
Automatically provision users what the business knows they need to get their job done on the device being used
- Assign resources to user or device identity
- Deliver what the user needs and protect the device based on
their location, time of day, device and business role
- Make resources available based on the user’s or device’s role
in the organization
- Apply just enough management based on what the user is
doing
Capabilities for Empowering the User
Provide users with self-service access to IT services
- Prevent “shadow-IT” by giving users an easy way to get what
they need
- Define custom workflows for items that need approvals or
- utside activities so that business owners can approve and IT
isn’t involved in every request
- Provide users a self-service launch pad for their applications
- Allow users to search for known IT issues, FAQs and if needed
- pen Incidents or Requests
Capabilities that reduce IT Costs
Manage the lifecycle of all of your devices in a common way
- A single unified management paradigm means you can learn how to
manage devices one time and then apply that learning to all devices
- Manage the complete cradle to grave lifecycle of the device including
- OS deployment and device provisioning
- Application distribution and management
- Hardware and software inventory
- Application of standardized configuration and security policies
- Remote management to assist the user when needed
Capabilities that reduce IT Costs
Manage the lifecycle of your applications
- Don’t just stop at the distribution of the application, control
the process from distribution to launch to uninstall
- Simple to use UI for building even complex application
deployment and configuration scenarios with little or no scripting required
- Includes a full license for AdminStudio Standard Edition for
application packaging and customization
- Target applications to devices OR users
Capabilities that reduce IT Costs
Leverage your existing investments
- Pick the backend infrastructure that makes sense
- Appliance, Windows or Linux
- Sybase, SQL, Oracle or PostgreSQL
- Leverage existing file servers OR use the content repository
- Leverage your existing identity store for user identity,
hierarchy and group data
- IT wants to manage all devices and
resources from one central location
- Convergence of EM and MDM/EMM
To assure users can..
- Work from any device, from anywhere
at any time
- And have access to self-services &
immediate resources
40
UEM Market Trends
Market Opportunity: 3.73 Billion USD by 2020 Estimated CAGR @ 42.9%
ZENworks – Enabling the Workspace through Unified Endpoint Management
AUTOMATION | CONFIGURATION SINGLE PANE OF GLASS SECURITY COMPLIANCE USER SELF-SERVICES USER WORKSPACE
Workspace automation process for all devices and self-services by selecting any services from any device. Seamless integration of all IT systems by providing a complete view of the workspace. Secure the workspace through endpoint security, encryption, location- awareness, wireless security, containerization and many more. Assure workspace compliance for your assets, licenses, apps, devices, contracts, etc. Request, track, activate, print, file share, collaborate and much more from the workspace.
Self-services Data BYOD Apps Devices
Self-services Data BYOD Apps Devices User Based
Configuration Management, Endpoint Security, Mobile Workspace, Service Desk, Patch Management, Desktop Containers, Asset Management The ZENworks Control Center / Common End User Portal Asset Management, Patch Management, FDE, Endpoint Security Full Disk Encryption, Endpoint Security, Mobile Workspace, Desktop Containers Service Desk, Mobile Workspace, Desktop Containers
End users
- Productivity: Work from any location, using any device
- Effectiveness: Want to share and collaborate with colleagues
- Satisfaction: Want my BYOD devices supported
IT
- Boost IT productivity: Want to focus on other projects
- Show value: Want to align IT with business objectives
- Deliver on time: Want to keep all apps, patches etc. current
Business
- Reduce risk: Want to protect data and avoid security breaches
- Increase compliance: Want to remain compliance on devices and apps etc.
- Cost savings: Want to be able to do more with less
42
Endpoint Management Challenges and Benefits
ZENworks Configuration Management
Unified Endpoint Management
Last Updated: May 7, 2018
The shifting way we work… Unified Endpoint Management Solving IT challenges with ZENworks Configuration Management Empowering end users with ZENworks Configuration Management The power of ZENworks Purchasing information
Agenda
53
The shifting way we work
Unified Endpoint Management and What it Means to You
What experts are saying about mobility and UEM
Secure
70 million smartphones are lost each year, with only 7% recovered One laptop is stolen every 53 seconds 52% of devices are stolen from the
- ffice/workplace and 24% from
conferences
Change
“Over the next seven years everything about PC and mobile device management will begin to shift as we enter the new landscape of UEM.
What you need to know about Unified Endpoint Management, J. Walker, www.monitis.com
Empower
“Employee mobility leads to 30% better processes and 23% more productivity – and 100% more satisfied employees”
The Answer to Better Productivity, D. Newman, www.forbes.com
- ChannelProNetwork
Meeting IT’s Unified Endpoint Management Needs with the ZENworks Configuration Management
5 8
Harold, the Device Manager needs to manage all his users devices while reducing costs and keeping his sanity To do this he needs to:
Quickly deploy new operating systems,
applications and configuration changes across a wide range of devices and platforms
Leverage each platform’s unique capabilities in
easy-to-learn-once manner
Quickly see the status of the organization and
take needed actions
Ensure the security of the device and the data
that resides thereon is maintained
Facilitate access to what he (you) know users
need, and make it easy to request everything else
- Now more than ever, change is the
new norm and he (you) needs to be able to keep up
- Applications are the lifeblood of
productivity, but can be complex and deploying them shouldn’t require you to be a rocket scientist
- To make sure users are productive he
(you) must be able to give the user what they need when they need it
Why is this important to Harold?
The Need
Quickly deploy new operating systems, applications and configuration changes…
ZENworks Configuration Management
What can Harold (and you) do?
The Solution
Automated OS deployment and flexible application management
- Quickly deploy Windows 10 to new and
existing devices
- Deploy and manage the complete lifecycle of
applications across platforms
- Quickly deploy device configuration changes
ZENworks Configuration Management
The Demo
Windows 10 deployment and application management
- Management capabilities of the
device, dictate what he (you) can do – but having to learn how to manage each device differently is confusing and expensive
- To truly manage the device he (you)
need to take advantage of what’s available
Why is this important to Harold?
The Need
Leverage each platform’s unique capabilities in easy-to- learn-once manner
ZENworks Configuration Management
What can Harold (and you) do?
The Solution
Full service management, leveraging the unique capabilities of each platform
- Use native mobile management capabilities
- Leverage the full power of the Windows
platform
- Apple Volume Purchase Program
- Apple Device Enrollment Program
- iOS Configuration Profiles
- Android Enterprise Work Profile and Work Managed
- Not limited to just what Windows MDM allows, manage
Windows 7 – 10 with a consolidated set of capabilities
- Integration with Microsoft Deployment Toolkit (MDT) for
Windows deployments
ZENworks Configuration Management
The Demo
Leveraging native MDM management
- He has diverse platforms and multiple
- perating systems to manage with
more coming all the time
- He doesn’t have the people, time, or
money to manage each device type with a different tool
Why is this important to Harold?
The Need
Manage a wide range of devices and platforms
ZENworks Configuration Management
What can Harold (and you) do?
The Solution
Unified management of all devices in a consistent manner
- Manage laptops, desktops, servers,
smartphones, tablets and even “things”
- Support the variety of devices your users need,
including:
- Manage it all from one console, using a single,
enterprise scale management paradigm
- Windows
- Linux
- Mac
- iOS
- Android
ZENworks Configuration Management
The Demo
Cohesive management paradigm
- Understanding what’s happening in
the endpoint management environment means he (and you) can be more proactive
- Your boss wants to know what he is
(and you are) doing for the
- rganization
Why is this important to Harold?
The Need
Quickly see the status of the
- rganization and take needed
actions
ZENworks Configuration Management
What can Harold (and you) do?
The Solution
Built-in Dashboarding and reporting
- View and customize the dashboards to make it
easy to monitor your environment
- Quickly take action when you identify
something that needs to change
- Provide reports and big screen dashboards
with ZENworks Reporting
ZENworks Configuration Management
The Demo
Dashboarding and Reporting
- Devices are increasingly used outside
workplace and can be easily compromised
- Compromised device needs to be
found/locked/wiped to prevent data leakage
Why is this important to Harold?
The Need
Secure data and devices
ZENworks Configuration Management
What can Harold (and you) do?
The Solution
Built in security policies and controls
- Apply native security controls across platforms
- Take actions when devices are lost or stolen
- Protect Office 365 mobile application data
with support for InTune Application Protection policies
- Further secure devices with Endpoint Security,
Full Disk Encryption and Patch Management
ZENworks Configuration Management
The Demo
Securing devices with policies and quicktasks
Meeting End User Needs with ZENworks Configuration Management
7
Alison, the end user just wants to get her work done To do so, she needs to be able to:
Have access to the data and applications she
needs to do her job
Be able to work on the device she has with her
now
Request new resources without getting
bogged down
- She just wants to get her job done and
expects that IT will give her what she need to do that
- When she needs something, she
usually needs it now and if IT doesn’t give it to her, she’ll probably find a way to get it
Why is this important to Alison?
The Need
Request and access resources without getting bogged down
ZENworks Configuration Management
What can Alison (and you) do?
The Solution
The ZENworks Store and ZENworks Application Window
- Launch any application that has been
provisioned by IT based on identity, role or device
- Request access to any resources that IT has
listed in the ZENworks Store and get access as soon as any business requirements are met
- Allows end users to request services
from IT and for the capabilities to be provisioned without him having to be directly involved in each request
- Prevents “Shadow IT” by empowering
users to get what they want the right way
Why is this important to Harold?
The Need
Empower the end user to do their job and self-serve so IT can focus on other things
ZENworks Configuration Management
What can Harold (and you) do?
The Solution
Leverage the power of identity to target resources and make optional resources available via a workflow driven, self service store
- Target applications at device or user
- Provide an enterprise store where end users can see
what the company can offer
- Automate the request fulfillment process for many
requests
ZENworks Configuration Management
The Demo
ZENworks Store and the ZENworks Application Window
ZENworks Configuration Management
The Key Takeaways
End users want to work differently than they have in the past driving an explosion in the devices that IT has to manage. IT professionals need a way to keep their sanity while empowering end-users and securing all of these devices to unlock the potential of the new digital workspace.
The ZENworks Configuration Management Way
Automated OS deployment with or without MDT Coverage of Windows, iOS, Android, Linux, and Macintosh operating system versions Support for native MDM capabilities such as DEP, VPP, and Android for Work Full lifecycle management, not just distribution Robust dashboarding and report capabilities for operators and their managers Control of native platform security controls All done in a consistent management paradigm using a consolidated on-prem architecture End user driven self-fulfillment allowing the user to unlock their potential
The Power of ZENworks
76
Micro Focus ZENworks
Configuration Management Desktop Containers* Asset Management Patch Management* Disk Encryption Endpoint Security Mobile Management
Any Device
IT Service Management* Reporting Service
Micro Focus ZENworks Suite
Any Device
* Additional capabilities available as an add-on to the ZENworks Suite