470 likes | 669 Views
ScriptLogic and Desktop Authority. Lee Pullen Maine Education Association. Agenda. ScriptLogic Corporate Overview How MEA Uses Desktop Authority Options DEMO ?. Corporate Profile. Provider of Award-Winning Solutions for the Windows Enterprise Founded in 2000 Patented Technologies
E N D
ScriptLogic and Desktop Authority Lee Pullen Maine Education Association
Agenda • ScriptLogic Corporate Overview • How MEA Uses Desktop Authority • Options • DEMO ?
Corporate Profile • Provider of Award-Winning Solutions for the Windows Enterprise • Founded in 2000 • Patented Technologies • 10 Solutions covering: • Desktop Lifecycle Management Active Directory Management • Server Management Vulnerability Management • Application Management • Customer Coverage • 17,000+ SMB and Fortune 500 customers spanning 10 industry verticals • Over 4 Million desktops and servers • Corporate Headquarters in Boca Raton, Florida • Development offices in Orlando, Boca Raton and New Zealand • Sales Offices through the U.S. with international sales offices in the U.K., Australia and Japan
ScriptLogic Today • Market Positioning • A leader in lifecycle management solutions for Windows administration • Target Audience • Network and security administrators up to C-Level • International Expansion • UK, Australia, Japan, New Zealand • 2006 Awards • ScriptLogic has won 18 awards in the past 12 months • Windows IT Pro Readers’ Choice Awards, six awards • Network Computing Editor’s Choice Award winner, Desktop Authority • Best Network Automation and Batch Processing Tool (Redmond) • Best Third-Party Group Policy Manager (Redmond Magazine) • Network Computing Well-Connected Award winner, Desktop Authority
Awards 2004 2002 2003 2004 2005 2006 Ranked #15 • Best Software • Best Scripting Tool • Best Registry Management Tool • Best OS Migration Tool
Things I Like About ScriptLogic & DA • Flexibility • Granularity of assignment • Growing Options • 7.5 – GP Refresh (not just for log in anymore) • Tech Support • Hours could be better, but knowledge is very good • Refinements and Features added • They listen to customer feedback
MEA Uses of DA • Map printers and drives to user based on machine, user, and subnet • GREAT for mobile users visiting other offices • Map ‘My Documents’ to Network Drive • Inactivity (Power/Security) • Remote Control • Java Interface assignable port • Remote Troubleshooting • Helpdesk Chat
Remote • Notification to the user (selectable) once Remote Control initiated (k/b mouse) • Deniable if wanted (Admin override)
MEA Uses of DA continued • Replacements for other options • Remote Control VNC, Altiris • Reg Edits • Group policy refresh • Printer Mappings for multi office users
Cool Tricks • Reset LOCAL Admin password on all machines • Assign Printers and Drives based on location, user, AND machine • Registry Edit • Vs Regedit (Connect to Network Reg) • All keys available • Monitoring • Email notification
What we are looking at • Role Based Administration • Let users help each other? • Event Log / System Monitoring • Group Policy replacement (Centralized Console) • Patching Suite • Compared to WSUS? • 3rd Party Apps supported • Quicker? • Imaging Suite • Upcoming offering (looks like Acronis) • How does it compare to Altiris?
Pricing • Retail pricing but often have special promos • Desktop Authority $38 per seat • USB Lockdown $10 per seat • Imaging Center $10 per seat • 30 day demos fully functional • Contact James Gorson @ Scriptlogic jgorson@scriptlogic.com
Screenshots General Options Includes Local Admin Password set
Reports Desktop Hardware Inventory - Detailed by Component Troubleshooting Log
Questions • Other Options? • What are you using?
More information on other ScriptLogic Applications Jason Judge, CEO & Nick Cavalancia, VP of Product Marketing Management
Compliance • Regulatory • HIPAA, SOX, GLBA, and more • Best Practice • ITIL, COBIT, ISO 17799, and more • Standardization • Enforcement of Security & Configurations • Security • Complete Coverage • Desktop • Server • Active Directory • Full Lifecycle • Assessment • Assignment • Auditing Tackling IT Challenges Productivity • IT – By achieving security and compliance goals without sacrificing productivity • Administrators – by simplifying and automating tasks • Users – by creating consistent, secure and functional working environments
RIP Desktop Lifecycle Mgmt. Migrate Settings (1 hour) Image OS (1-2 hours) Deploy Apps (1-2 hours) Manage Configuration (2 years, 11 months, 30 days, 3 hours) 3 Years Other Solutions Other Solutions Other Solutions Desktop Authority Best of Breed Imaging Sol’n Operating Environment” “Standard “Managed
Security Lifecycle Map • Assess, Assign, and Audit is a continual process • Availability, Accountability and Assurance • Underlying Characteristics of Security • Not always appropriate for every area of security Assess Assign Audit Availability Accountability Assurance ScriptLogic Solutions
AD Security Management • Active Templates • Group Policy Management • Offline Repository • GPO History with Rollback • RSoP (with Offline GPOs) • AD Availability • AD Security Backup / Restore • AD Object Backup/Restore
Security • Establish and enforce levels of administrative ability within AD • Make AD available through the restore of objects and security • Audit AD management usage • Compliance • Comply with controls requiring defining levels of access, availability of systems, process change management, and auditing • Productivity • Simplify advanced AD tasks with one simple solution
Enterprise Patch Management • Covers Servers and Desktops • Full Lifecycle • Scanning, Patching & Reporting • Patches OS and applications from Microsoft and select 3rd-party vendors
Subscription-Based Options • Desktop Focus • Centralized Management and Reporting • Patches OS and applications from Microsoft and select 3rd-party vendors • Protects against known Spyware
Security • Proactively protect against known holes in and threats to OS and application security • Compliance • Comply with controls requiring protection against all known vulnerabilities and threats • Productivity • Centralize and automate the protection of desktops and servers through Patching and/or Anti-Spyware
Complete Desktop Configuration • Patented Validation Logic • Hardware/Software Inventory • Role Based Administration • Turnkey and Custom Reporting • Remote Desktop Management • Integrated Patch Deployment with Reporting • Integrated Anti-Spyware with Reporting
Security • Lock down desktop settings to establish a secure working environment • Compliance • Comply with controls requiring availability of IT systems (desktop); protection against all known vulnerabilities and threats • Productivity • Provide users with “anytime, any desktop” access to a consistent, secure, functional working environment; administrators with centralized desktop management, reporting, security and support
Application Packaging (MSIs) • Focused on the Admin • Comprehensive MSI Mgmt • Creates • Edits • Troubleshoots
Security • Ensure packaged applications include the latest security patches • Compliance/Standardization • Create consistently configured applications for deployment ensuring deployed apps comply with IT standards • Productivity • Centralize and simplify the MSI creation process for administrators • Create “silent” installs requiring no user intervention
Collects data on all aspects of security stored on SQL Server • Turnkey and custom reporting • Active Directory • File Systems, Shares • Printers, Services, Registry • And more…
Security • Assess and audit the existing security configuration for breaches • Validates the strength of security controls • Compliance • Comply with controls requiring assessments, reviews and reporting on security measures • Productivity • Administrators automate the collection of and reporting on all Windows security
Centrally assess and assign Windows server security • NTFS, Registry, Share, Printer • Provides availability of security through backup and restore of NTFS and Registry security
Security • Assess and assign server security enterprise-wide • Make security highly available through restores • Compliance • Comply with controls requiring assessment of existing security measures • Productivity • Centralize and simplify security configuration tasks
Centrally manage services and tasks enterprise-wide • Detailed search capabilities based on service and task parameters • Modify multiple services and tasks as easily as one
Security • Protect against unauthorized use of service accounts via period password changes • Compliance • Comply with controls requiring password and/or services management • Productivity • Perform service management (start, stop, restart, password changes) on numerous servers centrally as a single task
Comprehensive Data migration • Data • NTFS Permissions • Shares and permissions • Attributes • Local Users and Groups • Incremental copies
Security • All aspects of file security (NTFS, Share, Local Groups) are migrated with data making security available on target server • Compliance • Security measures put in place to meet compliance controls will continue to be enforced on the target environment. • Productivity • Comprehensive copying of data and related security sets is automated.
Hides folders and files users do not have access to • Works both for local access andfrom across the network • Hides entire volumes • Useful in Terminal Services/Citrix environments to protect data
Security • Users do not see files/folders they do not have access to, protecting sensitive data from prying eyes • Compliance • By obfuscating inaccessible data, file system auditing will have zero read access false positives • Productivity • Users are limited to seeing file/folders they can access; this focuses the user making them more productive
Audits File System Activity • Intelligent Auditing ensures a single entry per event • Centrally stores in SQL Server or MSDE • Reports can be scheduled and emailed or run in real-time
Security • Validate the strength of implemented controls • Compliance • Comply with controls requiring recording of activity with a secure audit trail • Productivity • Enhance security and compliance initiatives with a secure, centralized and automated auditing solution