micro focus presentation template · 2017 top 5 threats to it security 1.end users ... zenworks...

69
#MicroFocusCyberSummit

Upload: others

Post on 12-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

#MicroFocusCyberSummit

Page 2: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

#MicroFocusCyberSummit

ZENworks Keynote Session

Gil Cattelain

Jason Blackett

Page 3: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Business Challenges

How We Solve Challenges

Solution and Vision

Our Products

Roadmap

Any Questions

Secure Unified Endpoint Management – ZENworks

Page 4: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

User challenges

Page 5: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Any device

Using corporate-owned devices and personal devices (BYOD)

Using different operating systems, variety of apps – and they will get what they want! (Shadow IT)

Mixing their data and tools from their professional and personal lives

From any location at any time

Often from unsecure and non-performant public WIFI that can be vulnerable to malicious attacks – viruses, malware, spyware etc.

Exposed to physical threats – lost and stolen devices, removable devices etc.

Negligence and accidental risks on the road or at home

5

Users today want to get their job done using any device – from any location at any time

“Employee mobility leads to 30% better processes and 23% more productivity – and 100% more satisfied employees” – Is Mobility The Answer to Better Productivity, D. Newman, www.forbes.com

Page 6: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

IT challenges and benefits

Page 7: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Data, devices and access must be secured and you need to be able to prove it

Protect the business Intellectual Property of your organization

Prevent damage to company image and reputation

Prevent costly regulatory and data breach fines

7

What does it mean to IT: Protect your organization

• 70 million smartphones are lost each year, with only 7% recovered

• One laptop is stolen every 53 seconds

• 52% of devices are stolen from the office/workplace and 24% from conferences

- ChannelProNetwork

Page 8: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Empower end-users to make the business more successful

Ensure users have the business tools they need to get their job done

Make it easy for users to request access to services to get work done

Automate security as much as possible to prevent users from accidently leaking data

8

What does it mean to IT: Increase user productivity

2017 Top 5 Threats to IT Security1.End Users2.Lack of Security Patching3.Lack of Security Software and Hardware4.Inadequate Backup and Planning5.Stagnate – Inactive IT Staff

Shawn Pate, Senior Technical AdvisorWorkSmart (www.worksmart)

Page 9: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Secure and empower the user while driving down costs

Simplify the processes and tools you use, to keep make IT more effective and productive

Align the backend business process to make IT strategic to the business

Improve compliance and lower IT costs

9

What does it mean to IT: End results

Page 10: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

To Empower users through self-service

To effectively Manage a variety of platforms

Having Powerful and efficient application and resource deployment capability

To Secure both data and devices

With Consistent management paradigm

Having a Single Pane of glass

While leveraging existing investments

Unified Endpoint Management (UEM)

10

What does IT need?

A solution ...

Page 11: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Enabling the digital workspace with ZENworks

Our solution…

Page 12: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Encompasses all of the technologies users need to do their jobs

Mobile devices

Laptops/desktops

Apps

Company store

Self- services

Email

Instant messaging

File sharing etc.

Create a successful and collaborative workforce

Employee productivity

IT productivity

User satisfaction

Retention of employees

Collaboration and access

Etc.

Create a competitive edge

Revenue growth

Increased interaction

Enhanced employee engagement

Better service

Increased compliance

Control and risk

12

What is it? Why you need it? Benefits?

ZENworks – Digital Workspace

Today’s digital workspace is an always connected environment providing instant access to everything users need

Page 13: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Delivering the digital

workspace with ZENworksUnified Endpoint Management

Micro Focus ZENworks

AUTOMATIONCONFIG

SINGLE PANEOF GLASS

SECURITY

COMPLIANCE

USER SELF-SERVICES

Page 14: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks Overview – Roadmap

Page 15: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks provides a unified endpoint management solution for managing and securing all of your endpoint devices, in a contextual, user-centric fashion, leveraging the best capabilities of each platform, while maintaining an easy to learn and use management paradigm

What is ZENworks?

Page 16: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

What is Unified Endpoint Management?

Client ManagementEndpoint MobileManagement

Enterprise IoT Management

Manages traditional devices:• Windows• Linux• Mac

Usually Agent Based

Key Capabilities• OS Deployment• Software Delivery• Configuration

Management• Inventory• Remote Mgmt

Manages mobile devices:• Windows• iOS• Android

Leverages native MDM platform capabilities

Key Capabilities• Software delivery• Device lock down• Resource

provisioningManages things that are based on enterprise platforms

Key Capabilities• Inventory• Lockdown• Software delivery

Unified Endpoint Management

Manages• Traditional Clients• Mobile Devices• IoT Things

Key Capabilities• Single pane of glass• Single management paradigm, learn once• Superset of all 3 traditional tools• Facilitates user self-service• Secures devices• Resource and configuration deployment

Available capabilities dictated by platform, agent may be optional

Page 17: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Unified Endpoint Management Capabilities

ConfigurationManagement

DesktopContainers*

AssetManagement

PatchManagement*

Disk Encryption

EndpointSecurity

MobileWorkspace*

Any Device

IT Service Management*

ReportingService

ZENworks Suite

Identity

* Additional capabilities available as an add-on to the ZENworks Suite

Page 18: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks Evolution

We are here

eDirectory Centric Windows Management

(ZENworks 1 – 7.0)

SOA Based Windows Management

(ZENworks 10)

Cross platform Client Management

(ZENworks 11)

Unified Endpoint Management

(ZENworks 2017)

Secure Unified Endpoint Management

Secure Unified Endpoint Management from Anywhere

• Managed Windows 95/NT – Windows XP

• Built on NetWare / eDirectory foundation

• Started with simple application management and grew to full lifecycle management

• Modern Internet friendly, service oriented architecture with web based mgmt

• Cross platform server, directory and database infrastructure

• Tightly integrated management platform for Configuration, Patch and Asset Management

• Support for managing Windows Vista+, Linux and Macintosh

• Integrated Endpoint Security Management and Full Disk Encryption

• Single paradigm management of Windows, Linux, Macintosh, iOS, Android and ActiveSync devices

• Enable users via self-service and modernized end user interfaces

• Robust dashboarding and reporting

• Security View of the Endpoint

• Device risk analysis

• Deeper endpoint protection

• Integrated with Access and Identity

• Transition to cloud friendly architecture

• Offered as a service and on-prem

Page 19: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

The value of ZENworks Unified Endpoint Management

Empower users through self service and support the devices and applications they want to use to do their job

Protect users, their devices and your data from misuse, accidental exposure, patch vulnerabilities and more

Minimize administrator learning time and IT costs by having a single administration console and consistent workflows for securing and managing all of your Windows, Linux, Mac, iOS and Android

Reduce the complexity of endpoint management software by utilizing one or fewer agent (client) per device

Enjoy price breaks associated with owning multiple ZENworks products that grow with you as needed

Page 20: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

20

ZENworks Configuration Management Purchasing Information

ZENworks Configuration Management (ZCM) is available as either perpetual license + maintenance or as an annual subscription

When purchased per-user, you can manage up to 5 mobile or traditional devices used by a given user with the single license

When purchased per-device you must have a license for each device that you will manage, tiered pricing available for mobile vs traditional devices

ZCM is also available as part of the ZENworks Suite and Micro Focus Open Workgroup Suite

ZCM includes a 2-technician license entitlement for ZENworks Service Desk that could be used to implement all of the Self Service capabilities described

Page 21: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

21

Summary Let ZENworks help you…

Empower your end users to work the way they want

Secure your data, devices and access to protect your IP and reputation while preventing costly fines

Improve IT efficiency by simplifying how you manage and service end users and their devices

Page 22: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Check out our blogs => https://www.novell.com/communities/coolsolutions/

Visit our Support Forums => https://forums.novell.com/forum.php

Attend our Community Webinars => https://www.microfocus.com/about/webinars/

Make feature recommendations via our Ideas Portal => https://ideas.microfocus.com/MFI

Review our success stories => https://www.microfocus.com/resources/?type=success-story

Call to Action –

Check out our Data Sheet!Check out Chalk Talks!

Page 23: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual
Page 24: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Thank You.

#MicroFocusCyberSummit

Page 25: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

#MicroFocusCyberSummit

Page 26: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Additional information

#MicroFocusCyberSummit

Page 27: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

High-level capabilities of ZENworks that allow you seize the opportunity

27

Page 28: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks is a secure unified endpoint management solution that allows you to manage and secure all of your endpoint devices using a consistent, identity-based management paradigm, from a common web based management console.

ZENworks provides both robust IT controls and intuitive store-like self-service to meet IT’s needs while improving customer satisfaction

Introducing ZENworks

Page 29: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities for Securing Data, Devices and Access

Protect your data

• Encrypt the fixed disks on all of your Windows devices

• Protect data copied to removable storage devices with centrally managed Bitlocker removable storage encryption

• Ensure mobile devices are encrypted when enrolled for corporate data access

• Wipe data from the devices if they are lost

• Monitor data copied to removable media

Page 30: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities for Securing Data, Devices and Access

Secure BYO mobile access through containment

• Securely provision and configure access to corporate applications, PIM data, documents and web applications on BYO devices

• Ensure data is secure both at-rest and in-motion

• Wipe corporate data without impacting user data

• Limit access to corporate data based on time, location, or jailbreak status

Page 31: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities for Securing Data, Devices and Access

Automated OS and Application Patch Vulnerability Scanning and Remediation

• Identify all of the Windows, Linux and MacOS devices that have known OS patch vulnerabilities

• Identify patch vulnerabilities for the most popular 3rd party application software

• Define policies to keep your devices patched based on vendor, severity, patch age, and more

• Track patching with rich dashboarding and reporting capabilities

Page 32: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities for Securing Data, Devices and Access

Enforce secure configuration with device management

• Limit the applications that a user can use to interact with corporate data

• Require secure passwords, display lock and other critical security settings on your mobile devices

• Provision and configure critical applications such as anti-virus / anti-malware

• For enterprise “things” restrict what users can do with them

Page 33: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities for Securing Data, Devices and Access

Package and secure legacy applications to facilitate productivity in a secure way

• Package legacy applications to save costs and ensure business continuity

• Restrict the network access of these legacy applications to specific IPs / DNS in the organization

• Force all containerized application traffic through an HTTP proxy

Page 34: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities for Securing Data, Devices and Access

Protect your users from insecure network threats

• Enforce use of VPN when on an unsecure network

• Limit access to corporate resources when on unsecure networks

• Enforce device firewall settings to protect the device

• Prevent the use of undesirable WiFi

• Provide seamless access to corporate resources on BYO mobile devices

Page 35: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities for Empowering the User

Automatically provision users what the business knows they need to get their job done on the device being used

• Assign resources to user or device identity

• Deliver what the user needs and protect the device based on their location, time of day, device and business role

• Make resources available based on the user’s or device’s role in the organization

• Apply just enough management based on what the user is doing

Page 36: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities for Empowering the User

Provide users with self-service access to IT services

• Prevent “shadow-IT” by giving users an easy way to get what they need

• Define custom workflows for items that need approvals or outside activities so that business owners can approve and IT isn’t involved in every request

• Provide users a self-service launch pad for their applications

• Allow users to search for known IT issues, FAQs and if needed open Incidents or Requests

Page 37: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities that reduce IT Costs

Manage the lifecycle of all of your devices in a common way

• A single unified management paradigm means you can learn how to manage devices one time and then apply that learning to all devices

• Manage the complete cradle to grave lifecycle of the device including

• OS deployment and device provisioning

• Application distribution and management

• Hardware and software inventory

• Application of standardized configuration and security policies

• Remote management to assist the user when needed

Page 38: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities that reduce IT Costs

Manage the lifecycle of your applications

• Don’t just stop at the distribution of the application, control the process from distribution to launch to uninstall

• Simple to use UI for building even complex application deployment and configuration scenarios with little or no scripting required

• Includes a full license for AdminStudio Standard Edition for application packaging and customization

• Target applications to devices OR users

Page 39: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Capabilities that reduce IT Costs

Leverage your existing investments

• Pick the backend infrastructure that makes sense

• Appliance, Windows or Linux

• Sybase, SQL, Oracle or PostgreSQL

• Leverage existing file servers OR use the content repository

• Leverage your existing identity store for user identity, hierarchy and group data

Page 40: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

IT wants to manage all devices and resources from one central location

Convergence of EM and MDM/EMM

To assure users can..

Work from any device, from anywhere at any time

And have access to self-services & immediate resources

40

UEM Market Trends

Market Opportunity: 3.73 Billion USD by 2020

Estimated CAGR @ 42.9%

Page 41: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks – Enabling the Workspace through Unified Endpoint Management

AUTOMATION | CONFIGURATION

SINGLE PANE OF GLASS

SECURITY

COMPLIANCE

USER SELF-SERVICES

USER WORKSPACE

Workspace automation process for all devices and self-services by selecting any services from any device.

Seamless integration of all IT systems by providing a complete view of the workspace.

Secure the workspace through endpoint security, encryption, location-awareness, wireless security, containerization and many more.

Assure workspace compliance for your assets, licenses, apps, devices, contracts, etc.

Request, track, activate, print, file share, collaborate and much more from the workspace.

Self-services

Data

BYOD Apps

Devices

Self-services

Data

BYOD Apps

Devices

User Based

Configuration Management, Endpoint Security, Mobile Workspace, Service Desk,Patch Management, Desktop Containers, Asset Management

The ZENworks Control Center / Common End User Portal

Asset Management, Patch Management, FDE, Endpoint Security

Full Disk Encryption, Endpoint Security, Mobile Workspace, Desktop Containers

Service Desk, Mobile Workspace, Desktop Containers

Page 42: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

End users

Productivity: Work from any location, using any device

Effectiveness: Want to share and collaborate with colleagues

Satisfaction: Want my BYOD devices supported

IT

Boost IT productivity: Want to focus on other projects

Show value: Want to align IT with business objectives

Deliver on time: Want to keep all apps, patches etc. current

Business

Reduce risk: Want to protect data and avoid security breaches

Increase compliance: Want to remain compliance on devices and apps etc.

Cost savings: Want to be able to do more with less

42

Endpoint Management Challenges and Benefits

Page 43: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks Configuration ManagementUnified Endpoint ManagementLast Updated: May 7, 2018

Page 44: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

The shifting way we work…

Unified Endpoint Management

Solving IT challenges with ZENworks Configuration Management

Empowering end users with ZENworks Configuration Management

The power of ZENworks

Purchasing information

Agenda

53

Page 45: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

The shifting way we work

Page 46: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Unified Endpoint Management and What it Means to You

Page 47: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

What experts are saying about mobility and UEM

Secure

70 million smartphones are lost each year, with only 7% recovered

One laptop is stolen every 53 seconds

52% of devices are stolen from the office/workplace and 24% from conferences

Change

“Over the next seven years everything about PC and mobile device management will begin to shift as we enter the new landscape of UEM.

What you need to know about Unified Endpoint Management, J. Walker, www.monitis.com

Empower

“Employee mobility leads to 30% better processes and 23% more productivity –and 100% more satisfied employees”

The Answer to Better Productivity, D. Newman, www.forbes.com

- ChannelProNetwork

Page 48: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Meeting IT’s Unified Endpoint Management Needs with the ZENworks Configuration Management

Page 49: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

58

Harold, the Device Manager needs to manage all his users devices while reducing costs and keeping his sanity

To do this he needs to:

Quickly deploy new operating systems, applications and configuration changes across a wide range of devices and platforms

Leverage each platform’s unique capabilities in easy-to-learn-once manner

Quickly see the status of the organization and take needed actions

Ensure the security of the device and the data that resides thereon is maintained

Facilitate access to what he (you) know users need, and make it easy to request everything else

Page 50: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Now more than ever, change is the new norm and he (you) needs to be able to keep up

Applications are the lifeblood of productivity, but can be complex and deploying them shouldn’t require you to be a rocket scientist

To make sure users are productive he (you) must be able to give the user what they need when they need it

Why is this important to Harold?

The NeedQuickly deploy new operating systems, applications and configuration changes…

ZENworks ConfigurationManagement

What can Harold (and you) do?

The SolutionAutomated OS deployment and flexible application management

Quickly deploy Windows 10 to new and existing devices

Deploy and manage the complete lifecycle of applications across platforms

Quickly deploy device configuration changes

Page 51: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks ConfigurationManagement

The DemoWindows 10 deployment and application management

Page 52: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Management capabilities of the device, dictate what he (you) can do –but having to learn how to manage each device differently is confusing and expensive

To truly manage the device he (you) need to take advantage of what’s available

Why is this important to Harold?

The NeedLeverage each platform’s unique capabilities in easy-to-learn-once manner

ZENworks ConfigurationManagement

What can Harold (and you) do?

The SolutionFull service management, leveraging the unique capabilities of each platform

Use native mobile management capabilities

Leverage the full power of the Windows platform

Apple Volume Purchase Program Apple Device Enrollment Program iOS Configuration Profiles Android Enterprise Work Profile and Work Managed

Not limited to just what Windows MDM allows, manage Windows 7 – 10 with a consolidated set of capabilities

Integration with Microsoft Deployment Toolkit (MDT) for Windows deployments

Page 53: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks ConfigurationManagement

The DemoLeveraging native MDM management

Page 54: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

He has diverse platforms and multiple operating systems to manage with more coming all the time

He doesn’t have the people, time, or money to manage each device type with a different tool

Why is this important to Harold?

The NeedManage a wide range of devices and platforms ZENworks Configuration

Management

What can Harold (and you) do?

The SolutionUnified management of all devices in a consistent manner

Manage laptops, desktops, servers, smartphones, tablets and even “things”

Support the variety of devices your users need, including:

Manage it all from one console, using a single, enterprise scale management paradigm

Windows Linux Mac iOS Android

Page 55: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks ConfigurationManagement

The DemoCohesive management paradigm

Page 56: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Understanding what’s happening in the endpoint management environment means he (and you) can be more proactive

Your boss wants to know what he is (and you are) doing for the organization

Why is this important to Harold?

The NeedQuickly see the status of the organization and take needed actions

ZENworks ConfigurationManagement

What can Harold (and you) do?

The SolutionBuilt-in Dashboarding and reporting

View and customize the dashboards to make it easy to monitor your environment

Quickly take action when you identify something that needs to change

Provide reports and big screen dashboards with ZENworks Reporting

Page 57: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks ConfigurationManagement

The DemoDashboarding and Reporting

Page 58: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Devices are increasingly used outside workplace and can be easily compromised

Compromised device needs to be found/locked/wiped to prevent data leakage

Why is this important to Harold?

The NeedSecure data and devices

ZENworks ConfigurationManagement

What can Harold (and you) do?

The SolutionBuilt in security policies and controls

Apply native security controls across platforms

Take actions when devices are lost or stolen

Protect Office 365 mobile application data with support for InTune Application Protection policies

Further secure devices with Endpoint Security, Full Disk Encryption and Patch Management

Page 59: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks ConfigurationManagement

The DemoSecuring devices with policies and quicktasks

Page 60: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Meeting End User Needs with ZENworks Configuration Management

Page 61: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

70

Alison, the end user just wants to get her work done

To do so, she needs to be able to:

Have access to the data and applications she needs to do her job

Be able to work on the device she has with her now

Request new resources without getting bogged down

Page 62: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

She just wants to get her job done and expects that IT will give her what she need to do that

When she needs something, she usually needs it now and if IT doesn’t give it to her, she’ll probably find a way to get it

Why is this important to Alison?

The NeedRequest and access resources without getting bogged down ZENworks Configuration

Management

What can Alison (and you) do?

The SolutionThe ZENworks Store and ZENworks Application Window

Launch any application that has been provisioned by IT based on identity, role or device

Request access to any resources that IT has listed in the ZENworks Store and get access as soon as any business requirements are met

Page 63: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Allows end users to request services from IT and for the capabilities to be provisioned without him having to be directly involved in each request

Prevents “Shadow IT” by empowering users to get what they want the right way

Why is this important to Harold?

The NeedEmpower the end user to do their job and self-serve so IT can focus on other things

ZENworks ConfigurationManagement

What can Harold (and you) do?

The SolutionLeverage the power of identity to target resources and make optional resources available via a workflow driven, self service store

Target applications at device or user

Provide an enterprise store where end users can see what the company can offer

Automate the request fulfillment process for many requests

Page 64: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks ConfigurationManagement

The DemoZENworks Store and the ZENworks Application Window

Page 65: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

ZENworks ConfigurationManagement

The Key TakeawaysEnd users want to work differently than they have in the past driving an explosion in the devices that IT has to manage. IT professionals need a way to keep their sanity while empowering end-users and securing all of these devices to unlock the potential of the new digital workspace.

The ZENworks Configuration Management Way

Automated OS deployment with or without MDT

Coverage of Windows, iOS, Android, Linux, and Macintosh operating system versions

Support for native MDM capabilities such as DEP, VPP, and Android for Work

Full lifecycle management, not just distribution

Robust dashboarding and report capabilities for operators and their managers

Control of native platform security controls

All done in a consistent management paradigm using a consolidated on-prem architecture

End user driven self-fulfillment allowing the user to unlock their potential

Page 66: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

The Power of ZENworks

Page 67: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

76

Micro Focus ZENworks

ConfigurationManagement

DesktopContainers*

AssetManagement

PatchManagement*

Disk Encryption

EndpointSecurity

MobileManagement

Any Device

IT Service Management*

ReportingService

Micro FocusZENworks Suite

AnyDevice

* Additional capabilities available as an add-on to the ZENworks Suite

Page 68: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Purchasing Information

Page 69: Micro Focus Presentation Template · 2017 Top 5 Threats to IT Security 1.End Users ... ZENworks Overview ... ZENworks Configuration Management (ZCM) is available as either perpetual

Thank you.