Presentation is loading. Please wait.

Presentation is loading. Please wait.

Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.

Similar presentations


Presentation on theme: "Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation."— Presentation transcript:

1 Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation

2 Georgia Technology Authority 2 Dell Desktop Manager (DDM) Implementation Goal ▪Implement a single Desktop Management Console for all in scope agencies that provides software distribution, patch management, antivirus, asset inventory, remote control and data encryption to agency computing devices. ▪Implement an agent that will report hardware and software inventories and aid in delivering services such as AV and Data Encryption for all Win/Tel network connected client systems ▪Utilize collected data to scope technology refresh efforts and reduce duplicated effort Benefits ▪Aid in distribution of packaged applications (Software Distribution) ▪Provide Anti-virus support and reporting ▪Enable Patch compliance ▪Report on Software License compliance ▪Unified Asset Management

3 Georgia Technology Authority 3 3 Secure Data Transfer No VPN Requirement Smart Bandwidth Management Secure Data Transfer No VPN Requirement Smart Bandwidth Management Dell Modular Services Architecture Dell Modular Services are delivered from a secure, global data center network Customer Environment Network Operations Centers Dell Global Center Network Relay Point Desktop Laptop Tablet NOC Data Center NOC Agent Confidential – For Internal Use Only

4 Georgia Technology Authority 4 Key Benefits: Discover, inventory, track and manage distributed desktop and notebook computers to help reduce total cost of ownership while improving security, risk management, and compliance. Dell Asset Management Continuous control and visibility for distributed assets Comprehensive asset discovery & tracking Agent-less discovery of hardware components Set policies, find exceptions Simplified architecture planning Automatically discover, collect, and track distributed desktops and notebooks. Remotely scan and inventory Windows devices, providing visibility without introduction to that agent. Use policies and reports to identify security problems, and help enforce enterprise standards. Evaluate assets for hardware refresh or major software upgrades to help reduce costs and improve success rate. Works over the internet – doesn’t require mobile or remote assets to be connected to internal network or VPN. Visibility into remote assets Value Proposition: 4

5 Georgia Technology Authority 5 Key Benefits: 5 Help ensure security by automating patch management process for Microsoft ® Windows ®, and a variety of third-party applications. Patch Management Centralize and automate patch management Help ensure patch compliance Automate analysis, specify policies for deployment & distributions. Manage patches based on your IT needs. Force deployment of patches to all managed computers whether or not they are on the corporate network. Set policies that govern bandwidth usage at client or network level; control bandwidth consumption for one or all devices. As an optional service, Dell can remotely administer and monitor patch distribution based on best practices. Works over the internet – doesn’t require mobile or remote assets to be connected to internal network or VPN. Value Proposition: Patch-as-a-Service Flexible, customer- defined policy- based patch management Policy driven Bandwidth Management Simplified management of distributed environments

6 Georgia Technology Authority 6 6 Anti-Malware & Virus Management Improve security by enforcing virus and malware definition updates Protect your PCs and help ensure end-point security by centrally deploying Symantec ® and McAfee ® anti-virus software and updates for distributed desktop and notebook computers – whether or not they are on the corporate network. Protect your network by enforcing compliance on devices before they return to the corporate network. Works over the internet – doesn’t require mobile or remote assets to be connected to an internal network or VPN. Centrally monitor virus and malware infections, track update compliance, and identify known vulnerabilities. Centrally activate and track administrative scans on devices when needed to enable virus identification and quarantine. Centrally install software and upgrades without user involvement. Value Proposition: Simplified management of distributed environments Force scans to control outbreaks Network Protection and enforce compliance Track infections, find vulnerabilities Unattended install Key Benefits:

7 Georgia Technology Authority 7 7 Dell Laptop Data Encryption Centrally manage data encryption and data access for distributed computers Value Proposition: Key Benefits: Laptop Data Encryption helps ensure that critical and sensitive data stored on laptop and desktop PCs will not fall into the wrong hands – even if the PC does. Centrally enforce security policies for distributed clients. Helps ensure data stored on laptops and desktops stays encrypted (256 bit AES) even if the PC leaves the network. Encryption key is eliminated and data is made inaccessible under specific pre-set conditions. Trace location of lost machines with user and network data. No end user action required to encrypt or access data. Since applications and system files remain unencrypted, computer performance is not affected. Intelligent encryption Help locate lost laptops Remote security management Policy-based protection Transparent to end users

8 Georgia Technology Authority 8 Comprehensive Laptop Data Security When a laptop is lost, the data becomes inaccessible 8

9 Georgia Technology Authority 9 DDM - Data Points Page 1 1.What is the DDM doing? - The DDM will process hardware and software inventory requests on each asset. Anti-virus software and other Agency approved packages will be delivered via the tool. Sensitivity around network bandwidth is always our consideration and can be tailored to deliver install by TOD, and network bandwidth throttling can be used to manage utilization. The agent scans registry locations, file system, WMI database, and Add/Remove programs for software and hardware inventory.

10 Georgia Technology Authority 10 DDM - Data Points Page 2 2. Network impacts - Each client heartbeats every 15 minutes. The network payload break down is the following: ▪3 Kb for the SSL handshake ▪1 Kb for the agent system information sent to the server ▪2 Kb if there is nothing to do from the server to the agent ▪1-20 Kb if the server sends a task for the agent ▪What will be done to ensure network utilization is managed? ▪DDM will be moving software over the wire, naturally, bandwidth utilization is always a concern. We mitigate the impact of consuming network bandwidth by using a “Relay Point” framework. Systems can be used to store applications and/or patches to then send to a local system on the network. Moving application data closer to the asset frees up the internet pipe.

11 Georgia Technology Authority 11 How Relay Points Work Corporate Office 10.10.1.0/24 Adobe Apple Microsoft RIM Winzip Sun Apache Real Mozilla VMWare Citrix Skype Confidential – For Internal Use Only

12 Georgia Technology Authority 12 DDM – Data Points 3.Security – No local data is changed to accommodate agent. A folder is created on the c: (or other designated file system) to store control files related to the agent. 1.No PID information is inventoried from any asset 2.The Asset data is stored in a Server cluster at Dell Corporate. In the future PODS will exist through out the world. 3.Data is sent over the network encrypted!

13 Georgia Technology Authority 13 DDM Technology Architecture Client Manager Core Agent (SMA) Additional Components Patch Management AntiVirus Data Encryption Hosted Data Centers Data Centers Hosted Update Servers HTTP / HTTPS Communications Server Cluster Databases HTTP / HTTPS Client Systems Control Center HTTP/HTTPS Relay Point (optional) Remote Access Data Centers Symantec LiveUpdate Servers McAffee FTP / HTTP / HTTPS HTTP Secure Communications All communication through secure connections over existing network infrastructure. Normally network configuration changes are not necessary. All communications secure/encrypted & originate from Agent to the Data Centers.

14 Georgia Technology Authority 14 DDM - DDM Data Points Page 3 Summary plan for implementation Agency Discoveries – Completed! Determine distribution mechanism (login script, URL or netscan or all ) Provide DDM Installer information to local Agency contacts (agent, Login script, etc) – Completed! Deploy Login script into Novell and/or Active Directory Deliver agent installer to agency contacts and Pilot test on a few agency chosen machines; prior to wider deployment Provision Relay machines as needed per network capacity maps with agency contacts assistance Configure Patch Policy per Agency requirements Communicate with end users on AV Installation Deploy AV Package technology Deploy Data Encryption Software to designated Laptop users

15 Georgia Technology Authority 15


Download ppt "Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation."

Similar presentations


Ads by Google