Avocent Confidential
Click to edit Master title style
Product Strategy and Roadmap - 2009
Steve WorkmanVP Product Management
Avocent Confidential
Overview
2008 Milestones Industry Recognition
2009 Product Strategy Roadmap
Avocent Confidential
Avocent Solution Portfolio
Avocent Confidential
2008 – Product Releases
LANDesk Service Management(Touchpaper)
LANDesk Security Suite 8.8
LANDesk ManagementSuite 8.8
Q1 Q2 Q3 Q4
SMCEasy ManageFor ThinkServer
LANDesk Process Manager
Asset LifecycleManager
Power Management
LaunchPad
Avocent Confidential
2008 – Achievement / RecognitionGartner Magic Quadrant – 2008
PC Lifecycle Configuration Management
LANDesk Security Suite wins SC Magazine Innovation award
Avocent Confidential
Asset / Form Editor
Fully extensible
Linked to internal or external data sources
Layout tools—tabs, grids, alignment
Detailed property sheets
Supports both asset record definitions and workflow UI
Enables field change monitoring and control
Avocent Confidential
State Transition Map
Define lifecycle states
Enforce rules, define allowed state changes
Enable query on asset lifecycle status
Tie workflows to state changes
Capture approvals and key data at state change
Require specific data be entered before state change allowed
Avocent Confidential
Process/Workflow Editor
Automate config and policy fulfillment
Enable state transition macros/workflows
Create asset requests
Ensure auditability
Manage notifications and complex alert actions
Enable requests with approvals against the asset repository
Avocent Confidential
Synchronization tool
Select remote source and internal target
Map fields
Choose matching/key
Define rules for how to handle mismatches
Enable a queue for human decision-making
Schedule sync jobs
Avocent Confidential
Complex Query and Report
Define base data sets for RBA
Use embedded attributes to link tables
Grid view is actionable report UI
Grouping, nesting, totals
Exportable as data or saved as viewable file
Simple analytics
Avocent Confidential
User Request Portal
Simplified UI for end user access
RBA controlled
Functional service catalog
Both ALM and LPM
Built on the AMP UI metaphor, technology
Exposes IT services to all users
First step to full ITSM
Avocent Confidential
Initial Reactive Managed Proactive Optimized
The IT Maturity Model
Support fundamentals
Problem Management
Change Management
Knowledge Management
Incident Management (inc. SLA & Self
Service)
Change and Configuration Management
Availability Management
Full IT Business
Management
Integrated ITSM Service Management
Avocent Confidential
Process based service
effectiveness―
Service delivery against agreed
SLAs―
First stages of ITIL in use
―Prevent and
manage breached incidents
―Relevant MI
available for key decision makers
Current requirements
managed effectively
―Increase rate of
change―
Trend and problem-based decision making
―Knowledge-centric self
service―
Processes for risk assessment and impact analysis
―Service Catalogue
All calls logged and prioritized
―Increase in
first call resolution
―Track and
measure call statistics
―Reduce open and overdue
calls―
Reduce issue-led fire fighting
IT Service Management Goals
Prioritizedreporting
and resolution of
issues
Service Level led
performance. Process based repeatability
Best practice, service and
process led IPC
Organization wide model for best practice IT
application governance, budgeting,
strategic decision making and
customer service―
IT enables and drives “service
Innovation”―
Market leading Employee and
Customer satisfaction
Added valueservice
excellence.Consolidated
service delivery
Proactive service delivery
with preventative
measures
ITIL Service Improvement
Program―
Change Advisory Board decision
making―
IT processes for business
improvement―
Flexible, available and adaptable
structure―
IT involved in organizational
planning
Initial Reactive Managed Proactive Optimized
Avocent Confidential
Software Bundles to Match ITIL Maturity
LANDesk Help Desk
LANDesk Service Desk
LANDesk Service Management
Avocent Confidential
Alternative Desktop Solutions
Secure Managed Client (SMC), a way to Simplify IT
Goran Wibran,Director Software Offerings
Avocent Confidential
Introducing Secure Managed Client (SMC)
A game changing technology › Simplifies IT › Delivers the next-generation of PC technology
Utilizing Lenovo Client Virtualization Platform› built on industry standard technology
A storage based alternative desktop computing solution› Simplifies IT› Reduce support costs› Increase data security› While delivering full PC fidelity
Avocent Confidential
Server Based Solutions (Including Storage)
Changing The Alternative Client Computing
Thin Client
Great for task worker Limited functionality Potential lower device cost than PC Costly to implement
Secure Managed Client (SMC)
Simplifies IT Diskless client Full Windows PC Fidelity Scalable Support standard Windows apps No duplication needed Less complex Lowest TCO Lowest cost to implement
Storage Based Solutions
Server Virtualization
Better Windows end- user experience Complex Performance dependent on load Costly to implement
Better Windows end- user experience Complex High Cooling and Power Req Costly to implement
New! Announce
18 Nov
Desktop/Server Blades
Avocent Confidential
ThinkCentre Desktop SMC-compliant desktop
with Intel vPro Technology
Lenovo Storage ArraySupport up to 100 users
Lenovo SMC Software One License Per Client
Lenovo-LANDesk developed software stack utilizing Lenovo Client Virtualization Platform
Secure Managed Client’s 4 Core Ingredients
Lenovo Services to Consult, Train, and Deploy Test Drive Evaluation; Pilot Deployment; Virtual Classrooms; Managed
Deployments; Consulting Services
Avocent Confidential
Physical Hardware External Devices
Lenovo Client Virtualization Platform (LCVP) (Xen)
User Operating System (UOS) (Vista)
SMC a Diskless Client Architecture
SMC MgmtCore
Virtual HDDFiltered, Virtual NIC
Intranet/Internet
User 0 … User NUOS image (R/W)
User OSUser Data
**
User N
User x
User 0**
BootImage
Storage Array
SMC Management
Server
Boot ManageriSCSI controller
(Linux)
iSCSI Boot FW
Boot image (Read only)
DHCP
Active Directory
Avocent Confidential
Alternative Desktop Functional Comparisons vs Tradition PC
Function Traditional PC SMC Thin Client
Server Virtualization
Video/Audio performance same as traditional PC Yes Yes No No
Peripherals compatibility with traditional PC Yes Yes No No
Personal settings same as traditional PC Yes Yes No No
Printer Compatibility and speed same as traditional PC Yes Yes No No
Application compatibility Yes Yes No No
Same OS image as traditional PC Yes Yes No* No
Same hardware compatibility testing Yes Yes No No
Identical DRIVER mapping Yes Yes No No
Identical FOLDER mapping Yes Yes No No
Identical OFFICE templates Yes Yes Yes No
Identical SCREEN refresh rates and drivers Yes Yes No No
Identical MOUSE tracking and drivers Yes Yes No No
Identical USB support Yes Yes No No
Support Free seating Yes Yes No No
Support Alternative Boot Yes Yes No No
Requires additional hardware/OS testing No No Yes Yes
Requires additional cooling and power in data center No No No Yes
Requires duplicate Help Desk training No No Yes Yes
Requires management of virtualization No No No Yes
Requires IT skills in SAN management No Yes Yes/No Yes/No
Option for remote mobile users Yes No No No
Avocent Confidential
LANDesk 2009
Product Roadmap
Avocent Confidential
Customer Challenges
22Avocent Confidential. Internal Use Only.
Avocent Confidential
23
Product Strategy
First, continue our leadership in systems management by focusing and investing in our core functionality
Second, focus on our endpoint security management solutions that are close to our core
Third, help our customers move toward a more controlled service-centric approach to their IT operations
23
Through relentless customer focus we will provide innovative solutions that enable our customers to move from a reactive state to a service-oriented approach
that results in IT and Business alignment
Avocent Confidential
Product Roadmap - Themes
20092008
ProcessAutomation
EnterpriseCore
Enterprise Focus
User ContextManagementContext AwareManagement
2010
Avocent Confidential
Product Roadmap Timeline
SecurityManagement
SystemsManagement
IT ServiceManagement
Q1 Q22009
Q3 Q4 Q1
Pikes Peak
LANDesk Management Suite 9.0
LANDeskSecurity Suite 9.0
Helpdesk
Service Desk 7.3
Asset Lifecycle Manager
2010
Service Desk 7.4
Helpdesk 7.4
Asset Lifecycle Manager 4.0
Code Complete Beta
Code Complete Beta
Customer Engagement
Customer Engagement
Avocent Confidential
LANDesk Service Desk - Detail
1H 2H2H 1H2009 2010
7.3 Enhancements
• Web Analyst• Query Tool Refresh• OOTB enhancements• LANDesk integration• Misc
• Performance• Customer Issues• Workspace quality• Workspace
usability
• Self Service• Knowledge Management• Financial Management• Surveying• User Management Refresh• Misc
• Performance• Customer Issues
7.4 Enhancements
Avocent Confidential
LANDesk Management Suite - Detail
Q1 Q4Q2 Q32009
Planned Enhancements• Core Innovation
– Enterprise Core– Configuration Sharing– Granular RBA– Groups– LDMAIN Lockdown
– Unicode (UTF-8)– Rollup Core
– Win32 Support– Performance / SLM
• User Experience– Reporting
– Data Modeling– Dashboard– Query– Advance Reporting Engine– Custom Canned Reports– New ROI reports
• Existing Components– SWD Sustaining– Active Directory Enhancements– SLM Usage / Performance – Hardware Independent Imaging– Mac Enhancements
(Gateway, agent)– Advance Discovery
• New– Software Application Content
Service (data normalization)– Windows 2008 Server Support– 64-Bit Core support– New Package Builder
Pikes Peak
Enterprise Core
Advance Reporting
Software License Management
Discovery
Avocent Confidential
Enterprise Core
Improved scalability and performance of single core installations
Core-to-core replication of configurations and tasks allowing management of multiple cores from one core
Improved role-based administration
More granular rights allows more flexibility to control which console users are allowed to perform which functions
Customizable user templates will simplify assigning rights to console users
Create teams of users who can share configurations and tasks among a smaller group without sharing with all console users
Improved security of the core by limiting users’ access to shares on the core (e.g. LDMAIN)
Avocent Confidential
LANDesk Discovery Improvements
System Name LANDesk "BEFORE" LANDesk "AFTER"RAID UNKNOWN Microsoft Windows Server 2003 SP1 or SP2SEVEN UNKNOWN FreeBSD 6.1-RELEASE - 6.2TVT88 UNKNOWN Microsoft Windows Server 2003 SP1 or SP2D755 UNKNOWN Microsoft Windows VistaBLACK UNKNOWN Microsoft Windows Server 2003 SP1 or SP2XP002 UNKNOWN Aggressive OS guesses: Microsoft Windows XP SP2 (98%)
SLCDSCNW65-WNovell NetWare 5.70.07 September 18 2007 Novell NetWare 6.5 Open Enterprise Server SP6
SLC-MSNOW-PDC UNKNOWN SLC-ISVSANLAB UNKNOWN Linux 2.6.13 - 2.6.20
SLC-SCHRO-CORE1Windows Version 5.2 (Build 3790 Uniprocessor Free) Microsoft Windows Server 2003 SP1 or SP2
SLC-MSNOW-OSXS UNKNOWN SLC-AMP-DB2 UNKNOWN Microsoft Windows Server 2003 SP1 or SP2SLC-QLIKVIEW UNKNOWN Microsoft Windows Server 2003 SP1 or SP2W2K3-AUTHN UNKNOWN
SLCPSESQL UNKNOWN Aggressive OS guesses: Microsoft Windows Server 2003 SP1 or SP2 (97%)
SLC-BCAMPBELL04 UNKNOWN Microsoft Windows Server 2003 SP1 or SP2SLC-BCAMPBELL07 UNKNOWN SLC-BCAMPBELL03 UNKNOWN Microsoft Windows Server 2003 SP1 or SP2ISVAD2 UNKNOWN Microsoft Windows Server 2003 SP1 or SP2SLC-BCAMPBELL01 UNKNOWN Microsoft Windows Server 2003 SP1 or SP2SLC-BCAMPBELL05 UNKNOWN Linux 2.6.15 - 2.6.20
SLC-NWOLF-CABRA UNKNOWN Apple Mac OS X 10.5 - 10.5.2 (Leopard) (Darwin 9.0.0b5 - 9.2.0)SLC-SVN-TEST UNKNOWN Aggressive OS guesses: Linux 2.6.22 (Fedora Core 6) (98%)SLC-TRONRAMP2K3 UNKNOWN Microsoft Windows Server 2003 SP1 or SP2
Discovery recognition improved from 10% to upwards of 90%
Interrogates open sockets and services
LANDesk teams up with Nmap content source for continued recognition in the future
Avocent Confidential
Software License Monitoring Reduce Costs
Eliminate overbuying of licenses
Know what software is installed and track usage to license purchases
Leverage the right information to negotiate favorable licensing terms
Maintain License Compliance Ensure the organization is legally compliant with software contracts
The Business Software Alliance (BSA) is cracking down on corporate software piracy, with many lawsuits resulting in fines between $11 and $13 million. Bank Technology News Oct. 08
Control the Environment Businesses typically have more software deployed than they realize
Applications are frequently downloaded from the Internet
Prevent unwanted or unauthorized application usage
“Software-license audits are on the rise, with many conducted internally for compliance purposes. But as the economy slows, vendor audits can grow, with salespeople attempting to squeeze more from their existing customer base.” ITManagement.com June 08
Avocent Confidential
New Software License Monitoring
Performance improvements User context methods
Product based License based Group based System based
Improved support for new license types
Improved Product definitions Normalization
Avocent Confidential
Advanced Reporting Configurable Reports & Dashboard
› Choose any data source (table) from LD Core db› Combine reports with other 3rd party data sources› Define your own SQL queries for advanced reports› Modifiable Standard Reports (Use as Template…)› New, easy-to-use reports designer
Drillable Reports› Dynamic graphical charts and graphs› Drill into charts to see grid behind report› Sort and group report layout
New Improved ROI Reports› SWD success reports› Security & Patch Management reports› Antivirus status reports› Software License Monitoring reports
Avocent Confidential
Pikes Peak – Endpoint Security
•Core Innovation– USB encryption / shadow
copy
•Existing Components– Enterprise Patch
Management in a distributed environment
– Connection Control Manager (CCM) Enhancements
•User Experience– Enhanced security reporting– Location aware security
policy enforcement
•New– Antivirus for mail servers– LANDesk Firewall – Next generation Antivirus v8
Avocent Confidential
Summary
2008 product investment will meet the needs of our customers in 2009› Reduce Cost
› Reduce Risk
› Increase Productivity
“Enterprise Focus” - 2009 Development Priority Product team is full steam ahead on Pikes Peak and
ITSM 7.3 Frequent customer communication and involvement
throughout the year is paramount
Avocent Confidential
Thank You!