1 / 47

ScriptLogic and Desktop Authority

ScriptLogic and Desktop Authority. Lee Pullen Maine Education Association. Agenda. ScriptLogic Corporate Overview How MEA Uses Desktop Authority Options DEMO ?. Corporate Profile. Provider of Award-Winning Solutions for the Windows Enterprise Founded in 2000 Patented Technologies

nam
Download Presentation

ScriptLogic and Desktop Authority

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ScriptLogic and Desktop Authority Lee Pullen Maine Education Association

  2. Agenda • ScriptLogic Corporate Overview • How MEA Uses Desktop Authority • Options • DEMO ?

  3. Corporate Profile • Provider of Award-Winning Solutions for the Windows Enterprise • Founded in 2000 • Patented Technologies • 10 Solutions covering: • Desktop Lifecycle Management  Active Directory Management • Server Management  Vulnerability Management • Application Management • Customer Coverage • 17,000+ SMB and Fortune 500 customers spanning 10 industry verticals • Over 4 Million desktops and servers • Corporate Headquarters in Boca Raton, Florida • Development offices in Orlando, Boca Raton and New Zealand • Sales Offices through the U.S. with international sales offices in the U.K., Australia and Japan

  4. ScriptLogic Today • Market Positioning • A leader in lifecycle management solutions for Windows administration • Target Audience • Network and security administrators up to C-Level • International Expansion • UK, Australia, Japan, New Zealand • 2006 Awards • ScriptLogic has won 18 awards in the past 12 months • Windows IT Pro Readers’ Choice Awards, six awards • Network Computing Editor’s Choice Award winner, Desktop Authority • Best Network Automation and Batch Processing Tool (Redmond) • Best Third-Party Group Policy Manager (Redmond Magazine) • Network Computing Well-Connected Award winner, Desktop Authority

  5. Awards 2004 2002 2003 2004 2005 2006 Ranked #15 • Best Software • Best Scripting Tool • Best Registry Management Tool • Best OS Migration Tool

  6. Customers

  7. Things I Like About ScriptLogic & DA • Flexibility • Granularity of assignment • Growing Options • 7.5 – GP Refresh (not just for log in anymore) • Tech Support • Hours could be better, but knowledge is very good • Refinements and Features added • They listen to customer feedback

  8. MEA Uses of DA • Map printers and drives to user based on machine, user, and subnet • GREAT for mobile users visiting other offices • Map ‘My Documents’ to Network Drive • Inactivity (Power/Security) • Remote Control • Java Interface assignable port • Remote Troubleshooting • Helpdesk Chat

  9. Map Resources

  10. Remote

  11. Remote

  12. Remote • Notification to the user (selectable) once Remote Control initiated (k/b mouse) • Deniable if wanted (Admin override)

  13. MEA Uses of DA continued • Replacements for other options • Remote Control VNC, Altiris • Reg Edits • Group policy refresh • Printer Mappings for multi office users

  14. Cool Tricks • Reset LOCAL Admin password on all machines • Assign Printers and Drives based on location, user, AND machine • Registry Edit • Vs Regedit (Connect to Network Reg) • All keys available • Monitoring • Email notification

  15. What we are looking at • Role Based Administration • Let users help each other? • Event Log / System Monitoring • Group Policy replacement (Centralized Console) • Patching Suite • Compared to WSUS? • 3rd Party Apps supported • Quicker? • Imaging Suite • Upcoming offering (looks like Acronis) • How does it compare to Altiris?

  16. Pricing • Retail pricing but often have special promos • Desktop Authority $38 per seat • USB Lockdown $10 per seat • Imaging Center $10 per seat • 30 day demos fully functional • Contact James Gorson @ Scriptlogic jgorson@scriptlogic.com

  17. Screenshots General Options Includes Local Admin Password set

  18. Group Policy Refresh

  19. Reports Desktop Hardware Inventory - Detailed by Component Troubleshooting Log

  20. Questions • Other Options? • What are you using?

  21. More information on other ScriptLogic Applications Jason Judge, CEO & Nick Cavalancia, VP of Product Marketing Management

  22. Compliance • Regulatory • HIPAA, SOX, GLBA, and more • Best Practice • ITIL, COBIT, ISO 17799, and more • Standardization • Enforcement of Security & Configurations • Security • Complete Coverage • Desktop • Server • Active Directory • Full Lifecycle • Assessment • Assignment • Auditing Tackling IT Challenges Productivity • IT – By achieving security and compliance goals without sacrificing productivity • Administrators – by simplifying and automating tasks • Users – by creating consistent, secure and functional working environments

  23. RIP Desktop Lifecycle Mgmt. Migrate Settings (1 hour) Image OS (1-2 hours) Deploy Apps (1-2 hours) Manage Configuration (2 years, 11 months, 30 days, 3 hours) 3 Years Other Solutions Other Solutions Other Solutions Desktop Authority Best of Breed Imaging Sol’n Operating Environment” “Standard “Managed

  24. Security Lifecycle Map • Assess, Assign, and Audit is a continual process • Availability, Accountability and Assurance • Underlying Characteristics of Security • Not always appropriate for every area of security Assess Assign Audit Availability Accountability Assurance ScriptLogic Solutions

  25. ScriptLogic Solutions

  26. AD Security Management • Active Templates • Group Policy Management • Offline Repository • GPO History with Rollback • RSoP (with Offline GPOs) • AD Availability • AD Security Backup / Restore • AD Object Backup/Restore

  27. Security • Establish and enforce levels of administrative ability within AD • Make AD available through the restore of objects and security • Audit AD management usage • Compliance • Comply with controls requiring defining levels of access, availability of systems, process change management, and auditing • Productivity • Simplify advanced AD tasks with one simple solution

  28. Enterprise Patch Management • Covers Servers and Desktops • Full Lifecycle • Scanning, Patching & Reporting • Patches OS and applications from Microsoft and select 3rd-party vendors

  29. Subscription-Based Options • Desktop Focus • Centralized Management and Reporting • Patches OS and applications from Microsoft and select 3rd-party vendors • Protects against known Spyware

  30. Security • Proactively protect against known holes in and threats to OS and application security • Compliance • Comply with controls requiring protection against all known vulnerabilities and threats • Productivity • Centralize and automate the protection of desktops and servers through Patching and/or Anti-Spyware

  31. Complete Desktop Configuration • Patented Validation Logic • Hardware/Software Inventory • Role Based Administration • Turnkey and Custom Reporting • Remote Desktop Management • Integrated Patch Deployment with Reporting • Integrated Anti-Spyware with Reporting

  32. Security • Lock down desktop settings to establish a secure working environment • Compliance • Comply with controls requiring availability of IT systems (desktop); protection against all known vulnerabilities and threats • Productivity • Provide users with “anytime, any desktop” access to a consistent, secure, functional working environment; administrators with centralized desktop management, reporting, security and support

  33. Application Packaging (MSIs) • Focused on the Admin • Comprehensive MSI Mgmt • Creates • Edits • Troubleshoots

  34. Security • Ensure packaged applications include the latest security patches • Compliance/Standardization • Create consistently configured applications for deployment ensuring deployed apps comply with IT standards • Productivity • Centralize and simplify the MSI creation process for administrators • Create “silent” installs requiring no user intervention

  35. Collects data on all aspects of security stored on SQL Server • Turnkey and custom reporting • Active Directory • File Systems, Shares • Printers, Services, Registry • And more…

  36. Security • Assess and audit the existing security configuration for breaches • Validates the strength of security controls • Compliance • Comply with controls requiring assessments, reviews and reporting on security measures • Productivity • Administrators automate the collection of and reporting on all Windows security

  37. Centrally assess and assign Windows server security • NTFS, Registry, Share, Printer • Provides availability of security through backup and restore of NTFS and Registry security

  38. Security • Assess and assign server security enterprise-wide • Make security highly available through restores • Compliance • Comply with controls requiring assessment of existing security measures • Productivity • Centralize and simplify security configuration tasks

  39. Centrally manage services and tasks enterprise-wide • Detailed search capabilities based on service and task parameters • Modify multiple services and tasks as easily as one

  40. Security • Protect against unauthorized use of service accounts via period password changes • Compliance • Comply with controls requiring password and/or services management • Productivity • Perform service management (start, stop, restart, password changes) on numerous servers centrally as a single task

  41. Comprehensive Data migration • Data • NTFS Permissions • Shares and permissions • Attributes • Local Users and Groups • Incremental copies

  42. Security • All aspects of file security (NTFS, Share, Local Groups) are migrated with data making security available on target server • Compliance • Security measures put in place to meet compliance controls will continue to be enforced on the target environment. • Productivity • Comprehensive copying of data and related security sets is automated.

  43. Hides folders and files users do not have access to • Works both for local access andfrom across the network • Hides entire volumes • Useful in Terminal Services/Citrix environments to protect data

  44. Security • Users do not see files/folders they do not have access to, protecting sensitive data from prying eyes • Compliance • By obfuscating inaccessible data, file system auditing will have zero read access false positives • Productivity • Users are limited to seeing file/folders they can access; this focuses the user making them more productive

  45. Audits File System Activity • Intelligent Auditing ensures a single entry per event • Centrally stores in SQL Server or MSDE • Reports can be scheduled and emailed or run in real-time

  46. Security • Validate the strength of implemented controls • Compliance • Comply with controls requiring recording of activity with a secure audit trail • Productivity • Enhance security and compliance initiatives with a secure, centralized and automated auditing solution

More Related