Changing the paradigm Innovative approach to automating configuration management with proven, patented technology Versatile experience with 1000s of global.

Slides:



Advertisements
Similar presentations
Altiris for Desktop Management and More! Presented by: ITS (Scott Arnst and Kathleen Conover) January 16, 2004.
Advertisements

Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Office-2007 Deployment Updates & Discussion Panel Brad Sharp – UNC Rick Cisneros (Rick Beck) – Metro State Chad Burnham – DU Jon Giltner – UCB Fall 2007.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
General Operation and Facts As of 3/24/2014. Virtual Desktop 1. What is a Virtual Desktop? 2. Why VDI? 3. Installing the Virtual Desktop 4. Accessing.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Protect Your Business and Simplify IT with Symantec and VMware Presenter, Title, Company Date.
The future of Desktops Transform Your Desktop with Virtualization.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Reducing Total Cost of Ownership (TCO) Mike Chon AM Computers.
Imaging Software: Norton Ghost Presented by: Paul Tsan Carlos Vasquez Steven Sanchez.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
Module 5: Creating and Configuring Group Policy
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
ProSupport Plus for PCs and Tablets
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Installing software on personal computer
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Module 8 Implementing Backup and Recovery. Module Overview Planning Backup and Recovery Backing Up Exchange Server 2010 Restoring Exchange Server 2010.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Client Management. Introduction In a typical organization there are a lot of client machines used for day to day operations Client management is a necessary.
GROUP POLICY An overview of Microsoft Windows Group Policy.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
UNM IT Managed Workstations. Benefits of Managed Workstations  Standard software with uniform configuration ensures end users have the same set of applications.
Successful Deployment and Solid Management … Close Relatives Tim Sinclair, General Manager, Windows Enterprise Management.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Chapter Fourteen Windows XP Professional Fault Tolerance.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
What is Driving the Virtual Desktop? VMware View 4: Built for Desktops VMware View 4: Deployment References…Q&A Agenda.
Open MTIP Meeting April 5, Issues with current lab setup (from last meeting) Easier/faster application deployment and maintenance Client diversity.
Why Do Helpdesks Need A Remote Access Tool?. Today’s business environment has proved to be a difficult task to support. With many companies using different.
Deploying Windows 7 Lesson 3. Objectives Understand enterprise deployments Capture an image file Modify an image file Deploy an image file.
Lost Data and Files Recovery Planning Distributed Workforce System Failures Traditional approaches to machine recovery don’t meet the needs of.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
Scott Drucker, Systems Engineer Migrating to Microsoft Vista with WinINSTALL.
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Microsoft Management Seminar Series SMS 2003 Change Management.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—1-1 Getting Started with Cisco Unified Communications Manager Installing and Upgrading Cisco.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
RMM / MDM Cloud Partner Training Series September 2015.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Windows Vista Configuration MCTS : Installing and Upgrading.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Windows Desktop Deployment Service at LANL Mark Wingard Central.
Introduction to Mailbox Migrations Scan, Remediate, Migrate, and Configure with BitTitan Solutions.
Happy Endings: Reengineering Wesleyan’s Software Deployment to Labs and Classrooms Kyle Tousignant 03/22/2016.
Chapter 6: Securing the Cloud
Self-service enrollment for Windows desktops
Hybrid Management and Security
Build a low-touch, highly scalable cloud with IBM SmartCloud Provisioning Academic Initiative © 2011 IBM Corporation.
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Implementing Client Security on Windows 2000 and Windows XP Level 150
Agenda The current Windows XP and Windows XP Desktop situation
John Taylor, Deputy CISO Martin Myers, IT Architect
Presentation transcript:

Changing the paradigm Innovative approach to automating configuration management with proven, patented technology Versatile experience with 1000s of global deployments Award-winning solution bundles imaging, recovery, configuration, compliance and reporting in a single scalable package Partner-driven organization providing unique business value and strong customer support

Reduce Total Cost of Ownership: Reduce support incidents & repeat cases Eliminate desk-side visits Remove malware threats Control Change Management : Cut manual, error-prone changes Minimize business interruptions Increase patch success rate Manage Complexity: Balance admin rights, application updates Coordinate imaging, hardware refreshes Remotely migrate new OSs, new platforms Satisfy Compliance : Enforce and demonstrate control The challenges are clear…

Automation is the key Imaging Migrate & Deploy Increase Success Rate of Patching & Update Process Manage, Enforce & Recover from Disasters Audit & Report

Scalable deployments Remote Desktop (for enterprise deployments) SSL Web Connection (for enterprise deployments) 10 or 10,000 Systems… New York City Chicago London Los Angeles

Automated, zero-touch bare-metal build process Single instance file repository From OS to desired state Create standard imaging and build process to ensure consistency Imaging optionally works from PXE (network boot) in BIOS Customizable client build task allows for scripted boots and installs Build with a single PXE boot < 7 minutes (vs. 21 minutes) Persystent Suite automates the imaging and deployment process Automates admin tasks such as change computer name Continues to automate admin tasks like join domain, auto reboot and create a desired state snapshot The system is now production ready Imaging: 3X faster…automatically

Automate the remote OS migration process Locally backs up user profiles and settings Apply the new Windows 7 or Windows 8 image Remote system has a new restore point for recovery purposes in minutes Metric check on system to verify system can run the new OS Backup all local files to the local system, and files are uploaded to central server Concurrently downloads new files that constitute the new image Applies the local files and new image then creates a new system restore point Remote migration=no onsite tech needed

Automated patches, updates deployed consistently Success rate increases via enforcement of desired state Change management reporting is automated Targeted end-points identified and scheduled to receive a patch Ensure end-points are in a desired state to accept new patch Patch applied through normal process Persystent takes an automated snapshot of the new/updated desired state The patch process is successful Increase patch/update success

Reduces support incidents Limits desk-side visits Eliminate repeat cases Manages Desired State User installs un-authorized programs, reconfigures system, downloads security threat leaving the user unproductive User calls helpdesk which remotely reboots the system or has the user reboot the computer Prior to boot of the OS, the system is brought back to the desired state in seconds File-based repair removes Spyware, unauthorized applications, and any misconfigurations even if system is disconnected from the network while leaving user data alone Creates a detailed file change report to ensure compliance Automated, real-time repair

When disaster strikes…were prepared Industry estimates that 5% of the environments computers will experience hardware failure and require new hardware or a re-image BUT the time to get the system to production is very prolonged and often requires desk-side visits or shipping hardware from central IT Hardware failure User or system admin installs new hard drive Enable system to PXE boot to local network and download the last known desired state image Option 2: use DVD or USB device to boot End-point system is recovered and back into production in minutes

Standard hardware & software reports Quickly identify compliance and operational exceptions Provide groupings at the user, organizational, departmental and geographic levels Demonstrate control over the environment Satisfy compliance: audit/reporting

Reduce operational downtime Reduce support incidents by 90% Enforce policy and compliance Increase application availability Reduce case resolution times, repeat cases Reduce on-site or remote service requests Integrates with existing infrastructure Automated compliance reporting Improved user satisfaction Simple and silent install process…fast Making a difference

I get audited. I get audited a lot. - Michael Tampone Sterling Risk, Chief Technology Officer THE PROBLEM Our external audits required us to demonstrate control over our IT systems. Demonstrating that we could re-image a system wasnt a solution any longer especially due to self inflicted Malware infections. The weight of compliance OUR ACTION Over the last 5 years, Persystent Suite has enabled IT to manage the standard state of our systems. The routine automated recovery process provided the necessary documentation for the external auditors. THE RESULT Having the ability to enforce our standard state enabled us to achieve compliance, even when systems arent connected to our network or agents arent connected to the domain.

THE PROBLEM Student classrooms and computer labs required routine daily re-images between classes to ensure the standard curriculum was available for the next student. Additionally, each semester all campus computers required a new image to ensure the latest and greatest technology refreshes. Traditional lock down solutions, hardening tools and traditional imaging technologies just werent viable. OUR ACTION Over the last 11 years, Persystent Suite enabled the system administrators to automate the recovery of the standard curriculum in seconds. The campus refresh program was also automated with a new image in minutes. THE RESULT Teachers were able to focus their efforts on the curriculum and teaching children rather than classroom preparation. The System Administrators remotely managed all of campus computers centrally rather than local campus visits. The ROI was calculated in days. Educating students

THE PROBLEM To maintain transactional integrity between POS and DVR systems at nearly 10,000 remote locations while ensuring PCI compliance on the restaurant POS networks requires password changes every 90 days and up-to-date patching. Push-based technology will not work. OUR ACTION Over the last 4 years, Utopic has facilitated the scheduling of password changes, retrieval and execution of software updates, and maintaining ideal end state without manual intervention. THE RESULT ROI in less than 30 days based solely on first year savings. Making compliance easier

THE PROBLEM The Long Beach hospital wanted to upgrade and automate the imaging process for multiple platforms and apply an automated zero-touch approach. The VA was experiencing high volumes of support calls, remote assist, and desk-side visits related to mis-configurations and end-user self-induced errors. OUR ACTION Over the past 12 years, Persystent Suite has provided an automated imaging, and self-healing software solution for over 3,600 workstations and laptops. THE RESULT The hospital received ROI in less than 60 days. Self-healing for the VA hospital

Customer testimonials

Demonstrations