what’s next for endpoint management?vox.veritas.com/legacyfs/online/veritasdata/11am... ·...
TRANSCRIPT
What’s Next for Endpoint Management?
Hugo Parra
Director of Product Management
User Protection & Productivity
Damon Covey
Director of Product Management
User Protection & Productivity
SYMANTEC VISION 2014
Forward Looking Statements
“Any information regarding pre-release Symantec offerings,
future updates or other planned modifications is subject to
ongoing evaluation by Symantec and therefore subject to
change. This information is provided without warranty of any
kind, express or implied. Customers who purchase Symantec
offerings should make their purchase decision based upon
features that are currently available.”
2 What’s Next for Endpoint Management
SYMANTEC VISION 2014
Recent Developments
What’s Next for Endpoint Management 3
SYMANTEC VISION 2014
We shipped ITMS 7.5!
What’s Next for Endpoint Management 4
Cloud-enabled management
Context specific
flipbooks
Installation speed & size
enhancements
Improved Mac imaging
& SW management
ITA cube extension
utility
ITMS Admin iPad app
Out of box workflow templates
Tailored security via
agent registration
Console speed and ease of use
SYMANTEC VISION 2014
What’s Next
What’s Next for Endpoint Management 5
SYMANTEC VISION 2014
User & Data Centric Device Centric
Shift from Device to User & Data Centric
What’s Next for Endpoint Management
IT Controlled User Controlled
Static Mobile
Technology Toolbox Ready to Use Convenience
On -Premise Cloud Services
Devices
Device User
6
Users
SYMANTEC VISION 2014
Escalating tug-of-war
7
The Era of User Empowerment
Protect company information
Control access to data and network
Predictability and reliability
Reporting, auditing, monitoring
Minimize incidents
Contain costs
IT Staff Easy access to files, apps, email
Use the latest technology & apps
Transferability across devices
Personal stuff untouched
Work anywhere, anytime
Do it themselves
User
What’s Next for Endpoint Management
Freedom, Privacy, Productivity Flexibility, Scalability, Security
SYMANTEC VISION 2014
Cloud-enabled management
Honing in on top-line EPM differentiators
8
Integrated software asset management
Reliable SW virtualization
and streaming
8
Mixed platform management
Broadest patch coverage
How Value
Cross platform support for Windows, Mac, Linux, UNIX, and virtual platforms
Rapidly support new devices and platforms
Track IT assets, organize software licenses and IT contracts, validate software license compliance & spend
Take control, uncover savings, and ensure compliance of IT assets
Catalog of over 50 non-Microsoft applications are updated and applied automatically
Enterprises on average use 22 non-Microsoft applications which all need to be patched on a regular basis
Integrated solution optimized for distributed environments and remote employees
Effectively manage regardless of endpoint location
Repeatedly proven ability to virtualize more applications than any other app virtualization technology
Faster, significantly less error prone delivery and management of software in both standard and VDI environments
What’s Next for Endpoint Management
SYMANTEC VISION 2014 9
CY 2014 CY 2015 CY 2016
What’s Next for Endpoint Management
Symantec Endpoint Management Roadmap
OS support and performance
Server-side OS support updates • Win Srvr 2012 R2 for notification
server and site services • IE10, IE11
Client side OS updates • Mac 10.9 • Windows 8.1, Server 2012 R2 • Windows 7 Embedded • ESXi 5.5 • RHEL 5.10
Reusable targets, flexible filtering • New visual builder • Real-time result verification • Export and import • Reuse targets anywhere
Network Apps (streaming agent)
ITMS 7.5 SP1 (Q2 2014)
Easier to consume core value
Key UI fixes, enhancements • Traditional UI interface • Targets & filters UI
enhancements
Close key functionality gap • Key missing Cloud-Enabled
Mgmt. functionality • Update imaging options • Server mgmt. patch and monitor
Enhancements for large implementations • Improved scalability • Disaster recovery best practice
Snowbird (H1 2015)
Accentuate key differentiators
Software management • Key SW catalog enhancements • SW streaming integration • Patch enhancements
Mac • Mac management gaps
Park City (H2 2015)
Bridge management-security jobs
• Patch with security intelligence
• Cross-product analytic reports
• Consume new cloud-based security and mobility management capabilities from Symantec
Solitude (H2 2016)
SYMANTEC VISION 2014
ITMS 7.5 SP1
What’s Next for Endpoint Management 10
SYMANTEC VISION 2014
Timely, predictable OS platform support
11 What’s Next for Endpoint Management
Early Support Statement • What areas were tested
• Any limitations found
• Helpful workarounds
Full Support Statement • No limitations found: as soon as full
testing is complete
• Code updates required: with next maintenance pack or prod. release
Other key improvements • No blocking of non supported OS
versions
• Tech Support takes calls at the beginning of Early Support phase
Early Support
Full Support
https://www-secure.symantec.com/connect/articles/it-management-suite-os-platform-support
SYMANTEC VISION 2014
November April
OS support added since ITMS 7.5
12 What’s Next for Endpoint Management
Windows 8.1 Early Support Stmt.
Win Srvr 2012 R2 Early Support Stmt.
OS X 10.9 Early Support Stmt.
Red Hat 6.5 Early Support Stmt.
SuSE 11 SP3 Early Support Stmt.
Win 7 Embedded Full Support Stmt.
ESXi 5.5 Full Support Stmt.
Red Hat 5.10 Full Support Stmt.
Windows 8.1 Full Support Stmt.
Win Srvr 2012 R2 Full Support Stmt.
OS X 10.9 Full Support Stmt.
Win 7 Embedded Early Support Stmt.
ESXi 5.5 Early Support Stmt.
Red Hat 5.10 Early Support Stmt.
January February March
SYMANTEC VISION 2014
Powerful filter creation
13
List builder
Raw SQL validator
Custom criteria
Flexible searching, targeting, and filtering
What’s Next for Endpoint Management
Intuitive target management
• Edit conditions • View membership • View dependencies • Create or import static lists • Reuse in all policies and tasks
SYMANTEC VISION 2014 14
Demo of new targeting and filtering
What’s Next for Endpoint Management
SYMANTEC VISION 2014 15
Network Apps
What’s Next for Endpoint Management
How it works
New agent uses network share, DF share, or package repository instead of Workspace Streaming back-end
What it applies to
Desktops, laptops, thin clients, VMware VDI, Citrix XenDesktop
Why it matters to ITMS
Much easier to integrate into software management because of its light weight
Also known as “network mode streaming” or “stand-alone agent”
Desktop / Laptop Users
External Package Repository FileShare
Load Balancer
External Package Repository FileShare
Load Balancer
SYMANTEC VISION 2014
Ap
plic
atio
n
Vir
tual
izat
ion
A
pp
licat
ion
St
ream
ing
+
16
Network Apps adds real, quick value to ITMS
What’s Next for Endpoint Management
• Simplify application delivery and upgrades
• Run incompatible applications at same time
• Simplify OS migrations
• Provision applications on demand (support BYOD)
• Quickly remove apps from users’ machines for security or license compliance reasons
• Instant application delivery, upgrades, as simple as copying app to shared folder
SYMANTEC VISION 2014
Beyond ITMS 7.5 SP1
What’s Next for Endpoint Management 17
SYMANTEC VISION 2014
Expanding boundaryless management
18 What’s Next for Endpoint Management
Cloud-enabled Management 7.5 for Windows endpoints
• Inventory • Software delivery • Patch • App metering
• Mac support
• Remote control
• Application self provisioning
• Software portal
+
SMP Server (or Site Server)
Internal Firewall
External Firewall
SMP Server (or Site Server)
Managed Endpoint Internet
External DMZ Internal
SYMANTEC VISION 2014
Streamlined application management
19 What’s Next for Endpoint Management
Out of the box software catalog definitions for
high-value applications
SYMANTEC VISION 2014
Advanced license management
20 What’s Next for Endpoint Management
Licensing Models • Node
• Device • User • Site • CPU • Storage • Etc.
+
SYMANTEC VISION 2014
Streaming agent integration
21 What’s Next for Endpoint Management
Streaming without duplicate infrastructure
• Package Server as streaming package repository
• Full management of streaming agent
Software asset management
• Rich deployment options
• More accurate usage information
• More license re-harvesting options
• User centric view of software
• VDI specific use cases
Reporting
• Consolidated, consistent view of all software, regardless of model used
• Extended ITAnalytics reports
SYMANTEC VISION 2014
• All endpoints accessing the network are properly configured
• Critical business data is protected
• Risk of attack is minimized
• Cost of ownership is minimized
• Device Choice
• Blurred line between Personal and Business
• Gain access to email & network
• Provision my own apps
• Collaborate with others
• Avoid calling the help desk
Customer jobs in the user-control era Reconciling conflicting IT and end user goals
22
User Jobs IT Jobs
1 2
“Help me maximize my productivity on any device”
“help me maximize user productivity and protection”
Security & Management
Services
Macs/PCs, Phones, and Tablets
What’s Next for Endpoint Management
SYMANTEC VISION 2014
In conclusion
What’s Next for Endpoint Management 23
SYMANTEC VISION 2014
Endpoint Management – Today and Tomorrow
24
Boundaryless World
More users outside the corporate firewall
User Controlled Devices
Little separation between work and personal
Technology Explosion
More devices, applications and security risks
What’s Next for Endpoint Management
SYMANTEC VISION 2014
Announcements
What’s Next for Endpoint Management
Tuesday Wednesday
6 7
2 EPM Luncheons. Eat lunch with EPM experts! • During the scheduled lunch hours on Tuesday & Wednesday
• Sign-up using the session scheduler
2 Endpoint Management User Experiences (Augustus Ballroom)
• BYOD & IT Management Pro
• Win a GoPro Hero 3!
Take full advantage of Vision for EPM • Sign-up for 1 on 1’s
• Visit the Answer Lab (Center of Symantec Booth in the Expo Hall)
• Utilize the self-paced labs
Join and participate in your local User Group
SYMANTEC VISION 2014
Q&A
What’s Next for Endpoint Management
Thank you!
Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.