A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and.

Slides:



Advertisements
Similar presentations
VITA = Life - YOURS! VITA Managed Workplace Solutions By: TechnologyUS We allow YOU More time to focus on your business initiatives and projects Managed.
Advertisements

A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Teamviewer Developed By: Rene Nodarse & Joseph Hernandez Advisor : Dr.
The System Center Family Microsoft. Mobile Device Manager 2008.
Desktop Central In IT Managers’ Perspective. Agenda Desktop Management Market About Desktop Central Features & Benefits Customer Details Technical Support.
Software Quality Assurance Plan
ISV Partner Alliance Value Policy Policy Management for Microsoft® System Center.
Yale University Information Technology Services Administrative Systems Art Hunt 3/22/04 Software Service Level Agreement with Finance, Procurement and.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Windows Server 2003 Developed By: Timothy Cruz & Flavio Suguimitzu Advisor.
Developed by: David Wong Robin Nadal. Overview Unlike other IT-management tools KACE makes efficient system management available by providing an appliance.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to LogMeIn Developed By: Christine Marie Rodriguez & Richard Calvo Advisor.
8 Systems Analysis and Design in a Changing World, Fifth Edition.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to ManageEngine’s Msp Center Plus Developed By: & Advisor : Dr. S. Masoud.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to SilverBack Technologies Developed By: Matthew Wander & Nestor Zamora.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to LabTech Software Developed By: Brennan Leblanc & Edward Guerra Advisor.
Recovering Stolen Computers and Laptops Omari Grant Danlil Perelshteyn Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida.
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
Using The WDK For Windows Logo And Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
Setting IE Home Page and Starting IE after User Logins Using Kaseya Developed By: Paola Nunez Advisor : Dr. S. Masoud Sadjadi School of Computing and Information.
Client Management. Introduction In a typical organization there are a lot of client machines used for day to day operations Client management is a necessary.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Senior Design – Spring 2009 Richard Gory Focus: Networking & Web.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Numara Track-IT Developed By: Jorge Falcon & Thomas Russo Rodriguez Advisor.
FINAL DEMO Apollo Crew, group 3 T SW Development Project.
A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to HandsFreeNetworks Developed By: Natalia Carvajal & Albert Fernandez Advisor.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Kaseya Fundamentals Workshop Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 DAY FOUR.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Tim Vander Kooi Systems
Chapter Fourteen Windows XP Professional Fault Tolerance.
ACME ACME Solutions Inc. You Focus on Your Business & We Focus on Your IT.
NovaTech You Focus on Your Business & We Focus on Your IT Managed Services.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Introduction to Information and Computer Science Information Systems Lecture c This material (Comp4_Unit9c) was developed by OHSU, funded by the Department.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Antivirus Decommission and Deployment using Kaseya Developed By: Celia McFadden Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Why Do Helpdesks Need A Remote Access Tool?. Today’s business environment has proved to be a difficult task to support. With many companies using different.
A Feature-Based of IT Automation using Kaseya Developed By: Gregory Hayes Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences.
Computer Emergency Notification System (CENS)
IT Staff Survey Overview Over 1,300 responses were received. Staff across all faculties and support services were represented. 50 % of respondents.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
A Feature-Based of IT Automation using Kaseya andAuslogics Registry Cleaner Developed By: Krystle Crawford Advisor : Dr. S. Masoud Sadjadi School of Computing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Gathering Network Requirements Designing and Supporting Computer Networks – Chapter.
Microsoft Management Seminar Series SMS 2003 Change Management.
Software Development A Proposed Process and Methodology.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Senior Project, 2015, Spring Senior Project Website –Version 5 Student: Yamel Peraza, Florida International University Mentor: Masoud Sadjadi, Florida.
Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts Rational Unified Process Fundamentals Module 4: Core Workflows II - Concepts.
A Feature-Based of IT Automation using Remote Control on Safe Mode Developed By: Fernando Perez Advisor : Dr. S. Masoud Sadjadi School of Computing and.
A Feature-Based of IT Automation using Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International.
IT Automation: The Technology Behind Managed Services Wes Powell, Information Technology Consultant.
D E P A R T M E N T O F COMPUTER SCIENCE AND SYSTEMS ANALYSIS SCHOOL OF ENGINEERING & APPLIED SCIENCE O X F O R D O H I O MIAMI UNIVERSITY Software Testing.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Systems Analysis and Design in a Changing World, Fifth Edition
Self-service enrollment for Windows desktops
<Name of Product>Pilot Closeout Meeting <Customer Name>
Kickoff Presentation Date of Presentation Presenter Name
Klopotek is transitioning to a Global Organization
Disaster Recovery as a Service
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Microsoft Virtual Academy
Increase and Improve your PC management with Windows Intune
Capitalize on Your Business’s Technology
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

A Feature-Based Analysis & Comparison of IT Automation Tools: Comparing Kaseya to Developed By: & Advisor : Dr. S. Masoud Sadjadi School of Computing and Information Sciences Florida International University (305)

Agenda Introduction Comparison & Discussion Glossary Acknowledgements References

Overview [Overview the main IT management and automation products / solutions that the company offers along with a summarized description of each individual offering, whether they are free or not, and a brief assessment of the quality of these products (using Kaseya as a reference).]

Background [Overview the main IT management and automation products / solutions that the company offers along with a summarized description of each individual offering, whether they are free or not, and a brief assessment of the quality of these products (using Kaseya as a reference).]

OS Coverage [Which operating systems are supported.]

Grouping Managed Devices [Explain what facilities are provided by this solution to group managed devices (managed devices includes any devices in the network that is being monitored and remotely or locally managed including desktops, laptops, servers, network devices, etc.). Especially, explain if it is possible to group managed devices based on their locality (being in the same subnetwork, for example) and whether it is possible to filter them or group them based on their roles (e.g., servers, workstations, laptops, windows XP, windows Vista, windows 2003 servers, finance computers, sales computers, machines with a specific software installed on them, etc.)]

Functional Coverage [List the functionalities that are covered by the product you are studying. You can compare with Kaseya’s functionalities to the ones supported in this product: Agent-Based Architecture, Auditing & Asset management, Remote Control, Agent Procedures, Monitoring, Patch Management, Backup & Disaster Recovery, Endpoint Security, User State Management, Help Desk, Reporting, and System/User/Admin Management.

1.1 Architecture Explain if the researched solution has an agent-based of agent-less architecture (compare the pros and cons to the agent-based architecture used in Kaseya. Explain what can and cannot be managed by this solution and explain what underlying technology (agent, probe, etc.) is used. Describe the architecture using different architectural diagrams, deployment diagrams, etc. Use the Kaseya Agent module as a reference.

1.2 Auditing & Asset management Discuss if the researched solution has built-in auditing & asset management ability Discuss how auditing is accomplished Discuss what can and cannot be audited Discuss what asset information can and cannot be attained Use the Kaseya Audit module as a reference.

1.3 Remote Control Discuss if the researched solution has built-in remote control ability Discuss what can be done with remote control (file transfer, etc) Use the Kaseya Remote Control module as a reference.

1.4 Automation Discuss if the researched solution has a built-in support for automation, such as agent procedures, scripts, etc. Discuss if the researched solution supports using other automation scripts Discuss the strength, level of sophistication, and ease of use for the supported automation in this solution. Use the Kaseya Agent Procedure module as a reference.

1.5 Monitoring Discuss if the researched solution has built-in monitoring ability Discuss how monitoring is accomplished Discuss what can and cannot be monitored Discuss what monitoring information can and cannot be attained Use the Kaseya Monitoring module as a reference.

1.6 Patch Management Discuss if the researched solution has built-in patch management ability Discuss how patch management is accomplished Discuss what can and cannot be patched Discuss what patch management information can and cannot be attained Use the Kaseya Patch Management module as a reference.

1.7 Backup & Disaster Recovery Discuss if the researched solution has built-in backup & disaster recovery ability Discuss how backup & disaster recovery is accomplished Discuss what can and cannot be backup and recovered Discuss what backup & disaster recovery information can and cannot be attained Use the Kaseya BUDR module as a reference.

1.8 Endpoint Security Discuss if the researched solution has built-in endpoint security ability Discuss how endpoint security is accomplished Discuss what can and cannot be secured via endpoint security Discuss what endpoint security information can and cannot be attained Use the Kaseya KES module as a reference.

1.9 User State Management Discuss if the researched solution has built-in user state management ability Discuss how user state management is accomplished Discuss what user state can and cannot be managed Discuss what user state management information can and cannot be attained Use the Kaseya KDPM module as a reference.

1.10 Help Desk Discuss if the researched solution has built-in help desk ability Discuss how help desk is accomplished Discuss what help desk information can and cannot be attained Use the Kaseya Ticketing and Service Desk modules as reference.

1.11 Reporting Discuss if the researched solution provides predefined executive summary reports Discuss if the researched solution provides customized reports Discuss the strength, level of sophistication, and the ease of use for developing new reports Use the Kaseya Info Center module as a reference.

1.12 System/User/Admin Management Discuss if the researched solution provides configuring the system to the users’ needs Discuss if the researched solution provides a way to restrict access of different functionalities to different admin users Discuss if the researched solution provides a way to restrict access of different machines, objects, etc. to different admin users Discuss the strength, level of sophistication, and the ease of use for defining new users, their access rights, scope of work, etc. Use the Kaseya System module as a reference.

1.13 Usability Discuss the overall usability of the researched solution Is the interface Web-based? Is the interface user friendly? How steep is the learning curve? Do you need to jump from one interface to another one to accomplish a task or everything is well integrated into one portal (compare with the Kaseya Web-based portal)?

1.14 Reliability Discuss the overall reliability of the researched solution How often the system may not be available and for how long (refer to customer online reviews)? How robust are the functionalities? How comprehensive are the functions (e.g., backup and disaster recovery, security, etc.)?

1.15 Performance Discuss the overall performance of the researched solution How fast does the system perform in general? How responsive is the system?

1.16 Supportability Discuss the overall supportability of the researched solution Do they have a strong help desk? Support structure: Tier1/Tier2/Tier3? How fast the support team responds to the request in general?

Agenda Introduction Comparison & Discussion Glossary Acknowledgements References

2. Comparison and Discussion [In this section, you need to discuss and evaluate the solutions introduced in the previous section and compare it to Kaseya, which is our baseline solution. You need to use rating ranged from 1-5 with 1 being BAD, 2 being FAIR, 3 being GOOD, 4 being VERY GOOD, and 5 being EXCELLENT. A solution is called ACCEPTABLE, if it is rated 3 or above. Any solution with a rating of 3 or above is an acceptable solution with regard to your metrics. Any solution below 3 is not acceptable.]

2.1 Evaluating and Discussing 1 Architecture Rating: ? Why? … 2 Audit & Asset Mgt Rating: ? Why? … 3 Remote Control Rating: ? Why? … 4 Automation Rating: ? Why? … 5 Monitoring Rating: ? Why? … 6 Patch Mgt Rating: ? Why? … 7 Backup & Disaster Recovery Rating: ? Why? … 8 Endpoint Security Rating: ? Why? … 9 User State Mgt Rating: ? Why? … 10 HelpDesk Rating: ? Why? … 11 Reporting Rating: ? Why? … 12 System Rating: ? Why? … 13 Usability Rating: ? Why? … 14 Reliability Rating: ? Why? … 15 Performance Rating: ? Why? … 16 Supportability Rating: ? Why? …

2.2 Rating Results Explanation/Discussion KaseyaYour Assigned Solution 1 Architecture 2 Audit & Asset Mgt 3 Remote Control 4 Automation 5 Monitoring 6 Patch Mgt 7 Backup & Disaster Recovery 8 Endpoint Security 9 User State Mgt 10 HelpDesk 11 Reporting 12 System 13 Usability 14 Reliability 15 Performance 16 Supportability Total

3. Glossary [A glossary of important terms, to ensure consistency in the system design document. It also spells out all the acronyms used in this document and explain what each mean.]

4. Acknowledgements [Include all the individuals, with their title and contact information, who helped you in any way with the development of this document. Special thanks should go to the company and the individuals who provided the trial version of the software to you and who answered your questions.]

5. References [All references used to develop this document MUST be listed in this section. Note that it is EXTREMELY important that you properly cite other people’s work. If you want to quote what is mentioned in another document or by another person as is, you have to put the text in double quotes and properly refer to the original document, Web URL, etc. In case you paraphrase, you still MUST properly cite the reference where you found the original material.]