End User Devices Security Effectiveness Report

Size: px
Start display at page:

Download "End User Devices Security Effectiveness Report"

Transcription

1 End User Devices Security Effectiveness Report PREPARED FOR: June 7, 0

2 End User Devices Security Effectiveness Report MOST EFFECTIVE POLICIES AND PROCESSES According to your team, these policies and processes are your most effective. Effectiveness scores reflect confidence in threat identification and prevention and the ability to minimize adverse impact on end user experience. OVERALL EFFECTIVENESS SCORE These scores reflect your team s view of End User Devices security effectiveness. The overall score gives a high level sense of where you re at in this area, while the policy and process and technology scores summarize your team s responses in these subcategories. MOST EFFECTIVE TECHNOLOGIES According to your team, these technologies are your most effective. Effectiveness scores reflect confidence in threat identification and prevention and the ability to minimize adverse impact on end user experience. Device standards defined Desktop/laptop standards defined Audit deployment practices 80 % Confidence: 78% Impact: 8% 79 % Confidence: 7% Impact: 8% % Confidence: % Impact: % 8% OVERALL POLICY AND PROCESS EFFECTIVENESS SCORE 0% OVERALL % OVERALL TECHNOLOGY EFFECTIVENESS SCORE Endpoint Encryption Patch Management Endpoint Anti- Malware 8 % Confidence: 8% Impact: 79% 79 % Confidence: 8% Impact: 7% 7 % Confidence: 7% Impact: 7% LEAST EFFECTIVE POLICIES AND PROCESSES According to your team, these End User Devices devices policies and processes are your least effective. Deployment/ decommissioning checklist Confidence: 9% Impact: 8% Audit deployed devices % % Confidence: 7% Impact: % 0 % BYOD policies Confidence: % Impact: 7% TEAM ALIGNMENT This section shows the areas in which your team is most closely aligned and most greatly divergent. Most Aligned Gap Patch/update risk analysis % BYOD policies % Device standards defined % Least Aligned Gap Application Whitelisting 7% Patch Management 7% Personal/Client Firewalls 7% LEAST EFFECTIVE TECHNOLOGIES According to your team, these End User Devices technologies are your least effective. Application Whitelisting Personal/Client Firewalls 0 % Confidence: % Impact: 8% 9 % Confidence: 7% Impact: 7%

3 Policy and Process Policy and Process 8% This score summarizes your team s opinions on End User Devices security policies and processes. It is a high level indicator of where you re at in this area. Confidence and impact are key indicators of security effectiveness. The overall effectiveness score is determined by the arithmetic mean of your team s policy and process confidence and impact responses. Security Confidence The degree of confidence expressed by relevant IT personnel that policies and processes in this area are preventing and identifying threats. Adverse Impact The level of adverse impact on end user experience that relevant IT personnel believe is caused by policies and processes in this area. Policy and Process Drivers of End User Devices Security Effectiveness Successful security depends on having effective policies and processes. Use this section to understand your team s perspective on which policies are working well and which aren t. Effectiveness Score 79% 80% % % 0% % % 7 Policy or Process Desktop/laptop standards defined Internal security standards defined for each desktop/ laptop platform. Device standards defined Internal security standards defined for each tablet or smartphone platform. Deployment/decommissioning checklist Complete a security checklist as part of deployment and decommissioning processes. Audit deployed devices Audit deployed devices to ensure they still meet requirements. Evaluation Criteria: Confidence Respondents by % and # % [] % [] 7% [] 7% [] % [] % [] % [] % [] % [] % [] % [] % [] 7% % % % 78% 8% 8% [] 78% % % % 78% 8% % [] 9% % 89% % 0% 8% % [8] 7% 7% 78% % % % % BYOD policies Determine acceptable use of employee-owned devices. % 78% % % % % % % 7% % [] [7] [] Patch/update risk analysis Perform a risk analysis prior to deploying patches/updates. % 78% % % % % 78% % 9% 0% Audit deployment practices Audit device deployment practices to ensure they are being followed. [] % [] [7] % [] [] % [] Reponse Average Previous Average Evaluation Criteria: Impact Respondents by % and # [7] [] [] % 0% % % % % % Response of or (low/bad) Response of or (medium/moderate) Response of or (high/good) [] [] [] [] [] [] [7] [] [7] [7] [0] [] [] [] [] Response Average Previous Average IMPACT INSECURE, EASY TO USE While these policies and processes don't adversely affect users impact, they do leave the organization vulnerable to security threats. Consider ways to increase security effectiveness, if possible without negatively impacting user experience.. Deployment/decommissioning checklist. Audit deployed devices INSECURE, HARD TO USE These policies and processes are an ineffectual nuisance and should be removed or, preferably, improved. CONFIDENCE SECURE, EASY TO USE These policies and processes keep the organization secure without inconveniencing users. Maintain this optimal state. SECURE, HARD TO USE These policies and processes make the organization secure, but can be an annoyance to users. Consider ways to improve the user experience without diminishing security effectiveness.. Desktop/laptop standards defined. Device standards defined. BYOD policies. Patch/update risk analysis. Audit deployment practices Policy and Process Execution Consistency - Team Alignment Policies and processes aren t fully effective unless they re documented, enforced, reviewed, and optimized. Use this section to ensure your team is on the same page in terms of your policies and process status. Question: "To what extent are the following policies in place and enforced?" Response of one or two (respondents believe policy or process has low maturity) Response of three or four (respondents believe policy or process has moderate maturity) Response of five or six (respondents believe policy or process has high maturity) Policy and Process Respondents by % and # Desktop/laptop standards defined Internal security standards defined for each desktop/laptop platform. Device standards defined Internal security standards defined for each tablet or smartphone platform. Deployment/decommissioning checklist Complete a security checklist as part of deployment and decommissioning processes. 7% [] % [] 0% [0] % [] % [] 7% [] 0% [0] % [] % [] Response Average Previous Average 7% 9% % % 70% 9% IT Staff Avg. CSO CIO IT Staff Avg. CSO CIO IT Staff Avg. CSO CIO Policy and Process Status - Team Alignment The ideal outcome for this section would be perfect consensus among respondents. If policy and process requirements aren t known, they can t be followed through on or effectively enforced. But simply being aware of a policy or process is not enough, ideally the entire team should have a stake in review and optimization. 7 Policy and Process Respondents by % and # Audit deployed devices Audit deployed devices to ensure they still meet requirements. % [] % [] % [] BYOD policies Determine acceptable use of employee-owned devices. % % % 7% 7% Patch/update risk analysis Perform a risk analysis prior to deploying patches/ updates. Audit deployment practices Audit device deployment practices to ensure they are being followed. [] % [] % [] [] % [] 7% [] [] % [] % [] Response Average Previous Average % 7% 78% 8% 7% 7% IT Staff Avg. CSO CIO IT Staff Avg. CSO CIO IT Staff Avg. CSO CIO IT Staff Avg. CSO CIO Policy and Process Status - Team Alignment

4 Policy and Process - Comments from the Team This section contains comments from your team on specific aspects of your End User Devices policies and processes. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. James Joyce James Joyce T.S. Eliot W.B. Yeats W.B. Yeats William Wordsworth William Wordsworth John Milton William Shakespeare

5 Policy and Process - Comments from the Team William Shakespeare Samuel Coleridge Virginia Woolf Charlotte Bronte

6 Technologies Technology Effectiveness Overview This score summarizes your teams's opinions on the effectiveness of your End User Devices security technologies. It is a high level indicator of where you're at in this area. Security Confidence The degree of confidence expressed by relevant IT personnel that technologies in this area are preventing and identifying threats. Respondents by Percentage and Number Confidence Score Adverse Impact Respondents by Percentage and Number The smount of adverse impact these % [] % [] technologies have on end users, according to % [] relevant IT personnel. % Response of or (low/bad) Response of or (low/bad) Confidence and impact are key indicators of security Response of or (medium/moderate) Response of or (medium/moderate) effectiveness. The overall effectiveness score expresses the Response of or (high/good) 9% Response of or (high/good) 78% [7] arithmetic mean of your team's technology confidence and % [] % impact responses. Impact Score Technology Drivers of End User Devices Security Effectiveness This section shows your team s views on the security technologies you currently have installed. Use this information to identify areas for improvement and to optimize your technology effectiveness. Effectiveness scores for each technology factor confidence scores (confidence and capabilities utilized) against impact scores (vendor support, ease of use, effort to maintain, and feature comprehensiveness). Technology is primarily dedicated to one function or to a small number of similar functions. Standalone Suite Co-Lo/MSP In-house Cloud Technology is capable of performing Technology is owned by Technology is hosted multiple different but related functions, Info-Tech Research by Info-Tech Research or bundled as part of a larger multifunctional Group, but hosted by Group. technology package. vendor. Technology is hosted by vendor. Response of or (low/bad) Response of or (medium/moderate) Response of or (high/good) Technology and Endpoint Anti-Malware 7 Endpoint Encryption 8 Personal/Client Firewalls 9 Application Whitelisting 0 Patch Management 79 Evaluation Criteria Respondents by Percentage and Number Response Avg. Previous Avg. Primary Vendor Evaluation Criteria Respondents by Percentage and Number Confidence 7% 0% Ease of Use 8% 7% % Capabilities Utilized 8% 7% McAfee Effort to Maintain 8% 7% % % Vendor Support 0% 0% Response Avg. Previous Avg. Feature Comprehensiveness 7% 7% 7% % Confidence 8% 7% Ease of Use 8% 7% % % % Capabilities Utilized 8% 7% McAfee Effort to Maintain 8% 7% % Vendor Support 7% 7% Feature Comprehensiveness 8% 7% % % % Confidence 7% 0% Ease of Use 7% 7% % % Capabilities Utilized 7% 7% McAfee Effort to Maintain 8% 7% Vendor Support 7% 0% Feature Comprehensiveness 7% 7% % % % Confidence 0% N/A Ease of Use % N/A Capabilities Utilized % N/A Bit9 Effort to Maintain % N/A Vendor Support 0% N/A % Feature Comprehensiveness % N/A % % % Confidence 8% 0% Ease of Use 7% 7% % Capabilities Utilized 8% 7% CA Technologies Effort to Maintain 7% 7% % Vendor Support 8% 0% % % % % % % % % % % % % 7% % % 7 78% % 7% 7% 7% % 7% 7% % % % % % % % % % % % % % % % % % % % 7% % 7 78% % Feature Comprehensiveness 8% 7% % % 7% 8 89% 8 89% 7 78% 7% 7% % % % % % % % Tech Details Suite In-house Suite In-house Suite In-house Standalone Cloud Standalone In-house

7 Technologies (continued) Technologies Currently Installed - Effectiveness and Team Alignment Technology Effectiveness This quadrant visualizes the effectiveness of your End User Devices security technologies according to the responses of relevant IT staff. Use the recommendations to help improve or maintain the effectiveness of these existing technologies. Team Alignment Overview Now that you've harnessed the wisdom of your team to understand the effectiveness of your technologies, it's time to get everyone on the same page. EFFECTIVENESS IMPACT LEVERAGE These technologies are easy to use, but not contributing enough toward security. Could additional capabilities be leveraged to get more security value?. Application Whitelisting RECONSIDER These technologies aren t contributing much to security and are difficult to use, so it might be time to reconsider their role. Can they be improved, or should they be retired? MAINTAIN These technologies are keeping you secure without causing headaches for your users. Maintain this optimal state. OPTIMIZE These technologies are handling security but creating friction in terms of user experience. Consider ways to optimize, such as providing training on advanced features or making better use of vendor support.. Endpoint Anti-Malware. Endpoint Encryption. Personal/Client Firewalls. Patch Management ALIGNMENT STANDARD DEVIATION RECONSIDER Your team is in consensus that these technologies aren t very effective. Reconsider their role in your security environment. Can they be improved, or should they be retired? OPTIMIZE Although these technologies have some supporters, most users don t consider them very effective. Can the technology be optimized to improve effectiveness and get the team onboard?. Application Whitelisting MAINTAIN Your team agrees that these technologies work well. Maintain this optimal state. LEVERAGE These technologies are generally seen as effective, but this opinion isn t shared by everyone. Leverage the insights and benefits identified by the majority to improve the experience of the minority.. Endpoint Anti-Malware. Endpoint Encryption. Personal/Client Firewalls. Patch Management CONFIDENCE AVERAGE To Buy or Not to Buy? Technologies Not Currently Installed Deciding whether or not you need a new technology can be difficult. Use the information in this section to understand what in the opinion of your team the technologies you don t currently have in place could do for the effectiveness of your End User Devices security. Response of or (low/bad) Response of or (medium/moderate) Response of or (high/good) Planned Purchase Priority List Purchasing decisions for security technology should be driven primarily by threat identification and prevention, but improving user experience can be an added bonus. Technology Level of need to help prevent or identify threats Level of need to improve user experience Web Content Filter Mobile Device Management.0%.0% 7.0% 7.0%.0%.0%.0%.0% %.0%.0% Technology Level of need to help prevent or identify threats Level of need to improve user experience SW License Management.0%.0%.0%.0% 7.0%.0%. Web Content Filter INSTALL. Mobile Device Management CONSIDER. SW License Management CONSIDER 7

8 Team Alignment - Endpoint Anti-Malware Primary Vendor: McAfee Overview Security functions best when IT personnel standardize their approach and benefit from each other's insights. Follow the three step approach outlined in this report to diagnose and remediate specific discrepancies in your team's use and opinions of your Endpoint Anti-Malware technology. Identify Areas for Attention and Discussion This section shows your team's alignment - their relative opinions and degree of consensus - on the various capability and usage characteristics that determine the technology's effectiveness. Use this information to identify which aspects of the technology are causing problems, which are being under-utilized, and which aren't seen the same way by all members of your team. James Joyce / T.S. Eliot / W.B. Yeats / John Milton / William Shakespeare / CONFIDENCE Virginia Woolf Charlotte Bronte William Wordsworth / CAPABILITIES UTILIZED William Wordsworth / Virginia Woolf Charlotte Bronte William Shakespeare / James Joyce / STANDARD DEVIATION RECONSIDER Your team is in consensus that this isn t very effective. Reconsider how it is being used and by whom. Can the situation be improved? Should the technology be retired? OPTIMIZE Although this aspect of the technology has some supporters, most users don t consider it very effective. Can this aspect of the technology be optimized to improve effectiveness and get the rest of the team onboard?. Vendor support MAINTAIN Your team agrees that this works well. Maintain this optimal state.. Ease of use. Effort to maintain LEVERAGE This aspect of the technology is generally seen as effective, but this opinion isn t shared by everyone. Leverage the insights and benefits identified by the majority to improve the experience of the minority.. Confidence. Capabilities utilized. Feature comprehensiveness EASE OF USE William Wordsworth / James Joyce John Milton Virginia Woolf William Shakespeare / James Joyce / T.S. Eliot / W.B. Yeats / William Shakespeare / John Milton / VENDOR SUPPORT Virginia Woolf Charlotte Bronte William Wordsworth / EFFORT TO MAINTAIN John Milton / James Joyce T.S. Eliot W.B. Yeats Virginia Woolf James Joyce / T.S. Eliot / W.B. Yeats / William Wordsworth / FEATURE COMPREHENSIVENESS Virginia Woolf Charlotte Bronte William Shakespeare / John Milton / AVERAGE Consider Comments from the Team This section contains comments from the team on specific aspects of your technology's effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. Conduct a Team Alignment Exercise The team alignment exercise is essentially just a conversation between team members about how to standardize approaches, address gaps and discrepancies, and optimize use of security technology. Keys to success Follow an agenda. Your team's time is valuable, so it's important to be organized, efficient, and on-task. Keeping to a pre-determined agenda will help make the best use of your time, and will ensure that high priority items get covered first. Designate a moderator. Someone needs to structure the discussion and keep things moving. The moderator should also ensure that everyone is involved and has a chance to contribute; use the individual team member scores and comments as a basis for discussion or as a way of inviting a contribution. Document the discussion. Be sure to record the key themes and insights of your discussion. Generate a list of next steps and follow-up items, and assign timelines and accountability for these immediately. Conduct follow up. Without follow up, the team alignment exercise is probably a waste of time. Implementing and enforcing the outcomes of your alignment exercise are critical to realizing actual improvement. 8

9 Comments from the Team - Endpoint Anti-Malware This section contains comments from your team on specific aspects of your Endpoint Anti-Malware technology s effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. W.B. Yeats W.B. Yeats William Wordsworth John Milton John Milton William Shakespeare Samuel Coleridge Samuel Coleridge Virginia Woolf 9

10 Comments from the Team - Endpoint Anti-Malware Charlotte Bronte Charlotte Bronte 0

11 Team Alignment - Endpoint Encryption Primary Vendor: McAfee Overview Security functions best when IT personnel standardize their approach and benefit from each other's insights. Follow the three step approach outlined in this report to diagnose and remediate specific discrepancies in your team's use and opinions of your Endpoint Encryption technology. Identify Areas for Attention and Discussion This section shows your team's alignment - their relative opinions and degree of consensus - on the various capability and usage characteristics that determine the technology's effectiveness. Use this information to identify which aspects of the technology are causing problems, which are being under-utilized, and which aren't seen the same way by all members of your team. CONFIDENCE T.S. Eliot / Samuel Coleridge James Joyce / Virginia Woolf Charlotte Bronte William Shakespeare / W.B. Yeats / CAPABILITIES UTILIZED W.B. Yeats / John Milton Virginia Woolf Charlotte Bronte William Shakespeare / STANDARD DEVIATION RECONSIDER Your team is in consensus that this isn t very effective. Reconsider how it is being used and by whom. Can the situation be improved? Should the technology be retired? OPTIMIZE Although this aspect of the technology has some supporters, most users don t consider it very effective. Can this aspect of the technology be optimized to improve effectiveness and get the rest of the team onboard? MAINTAIN Your team agrees that this works well. Maintain this optimal state. LEVERAGE This aspect of the technology is generally seen as effective, but this opinion isn t shared by everyone. Leverage the insights and benefits identified by the majority to improve the experience of the minority.. Confidence. Capabilities utilized. Ease of use. Effort to maintain. Vendor support. Feature comprehensiveness EASE OF USE Charlotte Bronte / James Joyce Virginia Woolf William Shakespeare / T.S. Eliot / VENDOR SUPPORT James Joyce / Samuel Coleridge T.S. Eliot / Virginia Woolf Charlotte Bronte William Shakespeare / W.B. Yeats / EFFORT TO MAINTAIN William Wordsworth / James Joyce T.S. Eliot Virginia Woolf Charlotte Bronte FEATURE COMPREHENSIVENESS W.B. Yeats / Samuel Coleridge T.S. Eliot / Virginia Woolf Charlotte Bronte William Shakespeare / John Milton / AVERAGE Consider Comments from the Team This section contains comments from the team on specific aspects of your technology's effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. Conduct a Team Alignment Exercise The team alignment exercise is essentially just a conversation between team members about how to standardize approaches, address gaps and discrepancies, and optimize use of security technology. Keys to success Follow an agenda. Your team's time is valuable, so it's important to be organized, efficient, and on-task. Keeping to a pre-determined agenda will help make the best use of your time, and will ensure that high priority items get covered first. Designate a moderator. Someone needs to structure the discussion and keep things moving. The moderator should also ensure that everyone is involved and has a chance to contribute; use the individual team member scores and comments as a basis for discussion or as a way of inviting a contribution. Document the discussion. Be sure to record the key themes and insights of your discussion. Generate a list of next steps and follow-up items, and assign timelines and accountability for these immediately. Conduct follow up. Without follow up, the team alignment exercise is probably a waste of time. Implementing and enforcing the outcomes of your alignment exercise are critical to realizing actual improvement.

12 Comments from the Team - Endpoint Encryption This section contains comments from your team on specific aspects of your Endpoint Encryption technology s effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. W.B. Yeats W.B. Yeats William Wordsworth John Milton William Shakespeare Samuel Coleridge Virginia Woolf Virginia Woolf Charlotte Bronte

13 Team Alignment - Personal/Client Firewalls Primary Vendor: McAfee Overview Security functions best when IT personnel standardize their approach and benefit from each other's insights. Follow the three step approach outlined in this report to diagnose and remediate specific discrepancies in your team's use and opinions of your Personal/Client Firewalls technology. Identify Areas for Attention and Discussion This section shows your team's alignment - their relative opinions and degree of consensus - on the various capability and usage characteristics that determine the technology's effectiveness. Use this information to identify which aspects of the technology are causing problems, which are being under-utilized, and which aren't seen the same way by all members of your team. William Wordsworth / T.S. Eliot / Virginia Woolf / CONFIDENCE James Joyce John Milton W.B. Yeats / William Shakespeare / W.B. Yeats / Charlotte Bronte / William Wordsworth / CAPABILITIES UTILIZED John Milton James Joyce / T.S. Eliot / Virginia Woolf / STANDARD DEVIATION RECONSIDER Your team is in consensus that this isn t very effective. Reconsider how it is being used and by whom. Can the situation be improved? Should the technology be retired? OPTIMIZE Although this aspect of the technology has some supporters, most users don t consider it very effective. Can this aspect of the technology be optimized to improve effectiveness and get the rest of the team onboard? MAINTAIN Your team agrees that this works well. Maintain this optimal state.. Ease of use. Effort to maintain LEVERAGE This aspect of the technology is generally seen as effective, but this opinion isn t shared by everyone. Leverage the insights and benefits identified by the majority to improve the experience of the minority.. Confidence. Capabilities utilized. Vendor support. Feature comprehensiveness EASE OF USE W.B. Yeats / John Milton James Joyce / William Shakespeare / T.S. Eliot / T.S. Eliot / William Wordsworth / Virginia Woolf / VENDOR SUPPORT John Milton James Joyce / Charlotte Bronte / William Shakespeare / EFFORT TO MAINTAIN T.S. Eliot / John Milton W.B. Yeats / Samuel Coleridge James Joyce / William Wordsworth / Virginia Woolf / FEATURE COMPREHENSIVENESS William Wordsworth / James Joyce Charlotte Bronte / W.B. Yeats John Milton William Shakespeare / AVERAGE Consider Comments from the Team This section contains comments from the team on specific aspects of your technology's effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. Conduct a Team Alignment Exercise The team alignment exercise is essentially just a conversation between team members about how to standardize approaches, address gaps and discrepancies, and optimize use of security technology. Keys to success Follow an agenda. Your team's time is valuable, so it's important to be organized, efficient, and on-task. Keeping to a pre-determined agenda will help make the best use of your time, and will ensure that high priority items get covered first. Designate a moderator. Someone needs to structure the discussion and keep things moving. The moderator should also ensure that everyone is involved and has a chance to contribute; use the individual team member scores and comments as a basis for discussion or as a way of inviting a contribution. Document the discussion. Be sure to record the key themes and insights of your discussion. Generate a list of next steps and follow-up items, and assign timelines and accountability for these immediately. Conduct follow up. Without follow up, the team alignment exercise is probably a waste of time. Implementing and enforcing the outcomes of your alignment exercise are critical to realizing actual improvement.

14 Comments from the Team - Personal/Client Firewalls This section contains comments from your team on specific aspects of your Personal/Client Firewalls technology s effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. T.S. Eliot William Wordsworth William Wordsworth William Shakespeare Samuel Coleridge Virginia Woolf Charlotte Bronte

15 Team Alignment - Application Whitelisting Primary Vendor: Bit9 Overview Security functions best when IT personnel standardize their approach and benefit from each other's insights. Follow the three step approach outlined in this report to diagnose and remediate specific discrepancies in your team's use and opinions of your Application Whitelisting technology. Identify Areas for Attention and Discussion This section shows your team's alignment - their relative opinions and degree of consensus - on the various capability and usage characteristics that determine the technology's effectiveness. Use this information to identify which aspects of the technology are causing problems, which are being under-utilized, and which aren't seen the same way by all members of your team. William Shakespeare / John Milton / Samuel Coleridge / Virginia Woolf / Charlotte Bronte / CONFIDENCE James Joyce / W.B. Yeats / T.S. Eliot / William Wordsworth / CAPABILITIES UTILIZED William Shakespeare / James Joyce John Milton / T.S. Eliot / Samuel Coleridge / Charlotte Bronte / William Wordsworth / STANDARD DEVIATION RECONSIDER Your team is in consensus that this isn t very effective. Reconsider how it is being used and by whom. Can the situation be improved? Should the technology be retired? OPTIMIZE Although this aspect of the technology has some supporters, most users don t consider it very effective. Can this aspect of the technology be optimized to improve effectiveness and get the rest of the team onboard?. Confidence. Capabilities utilized. Ease of use. Effort to maintain. Vendor support. Feature comprehensiveness MAINTAIN Your team agrees that this works well. Maintain this optimal state. LEVERAGE This aspect of the technology is generally seen as effective, but this opinion isn t shared by everyone. Leverage the insights and benefits identified by the majority to improve the experience of the minority. EASE OF USE William Shakespeare / James Joyce William Wordsworth / John Milton / Samuel Coleridge / Virginia Woolf / William Shakespeare / John Milton / Samuel Coleridge / Virginia Woolf / Charlotte Bronte / VENDOR SUPPORT W.B. Yeats James Joyce / William Wordsworth / EFFORT TO MAINTAIN William Shakespeare / James Joyce / W.B. Yeats / T.S. Eliot / John Milton / Samuel Coleridge / Virginia Woolf / FEATURE COMPREHENSIVENESS William Shakespeare / James Joyce John Milton / W.B. Yeats / Samuel Coleridge / Virginia Woolf / Charlotte Bronte / AVERAGE Consider Comments from the Team This section contains comments from the team on specific aspects of your technology's effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. Conduct a Team Alignment Exercise The team alignment exercise is essentially just a conversation between team members about how to standardize approaches, address gaps and discrepancies, and optimize use of security technology. Keys to success Follow an agenda. Your team's time is valuable, so it's important to be organized, efficient, and on-task. Keeping to a pre-determined agenda will help make the best use of your time, and will ensure that high priority items get covered first. Designate a moderator. Someone needs to structure the discussion and keep things moving. The moderator should also ensure that everyone is involved and has a chance to contribute; use the individual team member scores and comments as a basis for discussion or as a way of inviting a contribution. Document the discussion. Be sure to record the key themes and insights of your discussion. Generate a list of next steps and follow-up items, and assign timelines and accountability for these immediately. Conduct follow up. Without follow up, the team alignment exercise is probably a waste of time. Implementing and enforcing the outcomes of your alignment exercise are critical to realizing actual improvement.

16 Comments from the Team - Application Whitelisting This section contains comments from your team on specific aspects of your Application Whitelisting technology s effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. T.S. Eliot W.B. Yeats William Wordsworth William Wordsworth John Milton William Shakespeare Samuel Coleridge Virginia Woolf Virginia Woolf

17 Comments from the Team - Application Whitelisting Charlotte Bronte Charlotte Bronte 7

18 Team Alignment - Patch Management Primary Vendor: CA Technologies Overview Security functions best when IT personnel standardize their approach and benefit from each other's insights. Follow the three step approach outlined in this report to diagnose and remediate specific discrepancies in your team's use and opinions of your Patch Management technology. Identify Areas for Attention and Discussion This section shows your team's alignment - their relative opinions and degree of consensus - on the various capability and usage characteristics that determine the technology's effectiveness. Use this information to identify which aspects of the technology are causing problems, which are being under-utilized, and which aren't seen the same way by all members of your team. CONFIDENCE James Joyce / William Shakespeare Virginia Woolf Charlotte Bronte T.S. Eliot / James Joyce / T.S. Eliot / William Wordsworth / CAPABILITIES UTILIZED William Shakespeare John Milton Virginia Woolf Charlotte Bronte STANDARD DEVIATION RECONSIDER Your team is in consensus that this isn t very effective. Reconsider how it is being used and by whom. Can the situation be improved? Should the technology be retired? OPTIMIZE Although this aspect of the technology has some supporters, most users don t consider it very effective. Can this aspect of the technology be optimized to improve effectiveness and get the rest of the team onboard? MAINTAIN Your team agrees that this works well. Maintain this optimal state. LEVERAGE This aspect of the technology is generally seen as effective, but this opinion isn t shared by everyone. Leverage the insights and benefits identified by the majority to improve the experience of the minority.. Confidence. Capabilities utilized. Ease of use. Effort to maintain. Vendor support. Feature comprehensiveness James Joyce / T.S. Eliot / W.B. Yeats / William Wordsworth / EASE OF USE William Shakespeare John Milton Virginia Woolf Charlotte Bronte VENDOR SUPPORT James Joyce / William Shakespeare W.B. Yeats / T.S. Eliot Virginia Woolf Charlotte Bronte James Joyce / T.S. Eliot / William Wordsworth / W.B. Yeats / EFFORT TO MAINTAIN William Shakespeare John Milton Virginia Woolf Charlotte Bronte FEATURE COMPREHENSIVENESS James Joyce / William Shakespeare William Wordsworth / John Milton Virginia Woolf W.B. Yeats / AVERAGE Consider Comments from the Team This section contains comments from the team on specific aspects of your technology's effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. Conduct a Team Alignment Exercise The team alignment exercise is essentially just a conversation between team members about how to standardize approaches, address gaps and discrepancies, and optimize use of security technology. Keys to success Follow an agenda. Your team's time is valuable, so it's important to be organized, efficient, and on-task. Keeping to a pre-determined agenda will help make the best use of your time, and will ensure that high priority items get covered first. Designate a moderator. Someone needs to structure the discussion and keep things moving. The moderator should also ensure that everyone is involved and has a chance to contribute; use the individual team member scores and comments as a basis for discussion or as a way of inviting a contribution. Document the discussion. Be sure to record the key themes and insights of your discussion. Generate a list of next steps and follow-up items, and assign timelines and accountability for these immediately. Conduct follow up. Without follow up, the team alignment exercise is probably a waste of time. Implementing and enforcing the outcomes of your alignment exercise are critical to realizing actual improvement. 8

19 Comments from the Team - Patch Management This section contains comments from your team on specific aspects of your Patch Management technology s effectiveness. Leverage their insights and suggestions to drive discussion and knowledge transfer during your team alignment exercise. T.S. Eliot W.B. Yeats William Wordsworth William Wordsworth John Milton William Shakespeare William Shakespeare Samuel Coleridge Virginia Woolf 9

20 Comments from the Team - Patch Management Charlotte Bronte Charlotte Bronte 0

21 Methodology How Report Components are Calculated: Dashboard The overall effectiveness score expresses the arithmetic mean of all confidence and impact questions. The overall policy and process effectiveness score expresses the arithmetic mean of all policy and process confidence and impact questions. The overall technology effectiveness score expresses the arithmetic mean of all technology confidence and impact questions. Team alignment gaps are calculated using the coefficient of variation for all applicable policy and process scores. "Gap" scores are the coefficient of variation number. Technology effectiveness scores are calculated as follows:. Calculate the arithmetic mean of the relevant confidence and capabilities utilized questions to yield a confidence score.. Calculate the arithmetic mean of the relevant ease of use, effort to maintain, feature comprehensiveness, and vendor support questions to yield an impact score.. Calculate the arithmetic mean of the confidence and impact scores. Policy and Process Effectiveness Pages The overall policy and process effectiveness score expresses the arithmetic mean of confidence and impact responses for all policies. Individual policy and process effectiveness scores express the arithmetic mean of confidence and impact responses for the specific policy or process. The position of each policy and process on the effectiveness quadrant is determined using the impact score out of six (y axis) and confidence score out of six (x axis). Technology Effectiveness Pages The overall technology effectiveness score expresses the arithmetic mean of the high level confidence and impact questions. See "Dashboard" section above for calculation of specific technology effectiveness scores. The position of each technology on the effectiveness quadrant is determined using the confidence score (see above) on the x axis and impact score (see above) on the y axis. The position of each technology on the team alignment overview quadrant is determined using the arithmetic mean of the technology evaluation criteria scores on the x axis and the standard deviation of those scores on the y axis. The purchase priority list is determined using the following calculation:. Multiply "prevent or identify threats score" by five (weighting). If actual response is "not applicable," then purchase priority value is automatically "don't buy.". Multiply "improve user experience score" by five (weighting). If actual response is "not applicable," then use zero for calculation value.. Add the results of these calculations, then assign priority using the following scale: -0 = Buy -0 = Consider 0-0 = Don't Buy Team Alignment Detail Pages The position of each technology on the team alignment quadrant is determined using the arithmetic mean of technology evaluation criteria scores (x axis) and standard deviation of these scores (y axis).

Project Portfolio Management Assessment

Project Portfolio Management Assessment Management Assessment PREPARED FOR: Ross Little, IAG DIAGNOSTIC PROGRAM POWERED BY INFO-TECH RESEARCH GROUP January 13th, 2017 Powered by: Data is comprised of feedback from 2 respondents, including: James

More information

PPM Assessment. Analyze Your PPM Practices In-Depth for Systematic Improvement

PPM Assessment. Analyze Your PPM Practices In-Depth for Systematic Improvement Assessment Analyze Your Practices In-Depth for Systematic Improvement Your Journey Starts Here. Understand Your Strengths & Weaknesses Evaluate Performance and Required Next Steps by Area Build a Improvement

More information

PMO Scorecard. Assess Your Current PMO Practices and Build a Roadmap for Success

PMO Scorecard. Assess Your Current PMO Practices and Build a Roadmap for Success PMO card Assess Your Current PMO Practices and Build a Roadmap for Success Your Journey Starts Here. Understand Your PMO Strengths & Weaknesses Evaluate Performance and Required Next Steps by PMO Area

More information

Project Management Assessment. Apply an In-Depth Approach to Project Management to Achieve Systematic Success

Project Management Assessment. Apply an In-Depth Approach to Project Management to Achieve Systematic Success Management Assessment Apply an In-Depth Approach to Management to Achieve Systematic Success Your Journey Starts Here. Understand Your PM Strengths & Weaknesses Evaluate Performance and Required Next Steps

More information

Title: HP OpenView Configuration Management Overview Session #: 87 Speaker: Loic Avenel Company: HP

Title: HP OpenView Configuration Management Overview Session #: 87 Speaker: Loic Avenel Company: HP Title: HP OpenView Configuration Management Overview Session #: 87 Speaker: Loic Avenel Company: HP What we will cover in this session What is the HP OpenView configuration management solution for enterprises?

More information

VoIP Solution How to Make the Best Choice for Your Business

VoIP Solution How to Make the Best Choice for Your Business Choosing the Right VoIP Solution How to Make the Best Choice for Your Business Section Title - 1 TABLE OF CONTENTS Introduction 3 CH. 1 What is VoIP? Why Do I Need It? 4 CH. 2 What Type of VoIP Solutions

More information

The Power to Do More: Accelerating Results

The Power to Do More: Accelerating Results April 24, 2013 Hotel Monaco, San Francisco The Power to Do More: Accelerating Results Join the conversation. #DoMore AGENDA 1:30 2:30 The Power to Do More: Accelerating Results John Swainson, President

More information

How to Choose a Managed Services Provider

How to Choose a Managed Services Provider How to Choose a Managed Services Provider Finding Peace of Mind If you re outsourcing your IT services, you need to find a Managed Services Provider you can trust. A technology partner with the experience,

More information

SHIFTING TO THE CLOUD: UNDERSTANDING IT INVESTMENT MANAGEMENT BEYOND YOUR DATA CENTER WALLS

SHIFTING TO THE CLOUD: UNDERSTANDING IT INVESTMENT MANAGEMENT BEYOND YOUR DATA CENTER WALLS 1 SHIFTING TO THE CLOUD: UNDERSTANDING IT INVESTMENT MANAGEMENT BEYOND YOUR DATA CENTER WALLS KATHERINE FORE JENNIFER MCGILL CAROLINAS HEALTHCARE SYSTEM AHIA 35th Annual Conference September 11-14, 2016

More information

THINK YOU NEED A BYO STRATEGY? THINK AGAIN. Shift to a Digital Workspace Strategy in 5 Steps

THINK YOU NEED A BYO STRATEGY? THINK AGAIN. Shift to a Digital Workspace Strategy in 5 Steps THINK YOU NEED A BYO STRATEGY? THINK AGAIN. Shift to a Digital Workspace Strategy in 5 Steps Your BYO Strategy Isn t Necessary Anymore Bring Your Own Device (BYO) strategies have been common in IT organizations

More information

Automating the Defense: Really Taking Advantage of Automated Sharing

Automating the Defense: Really Taking Advantage of Automated Sharing Automating the Defense: Really Taking Advantage of Automated Sharing Michael Vermilye The Johns Hopkins University Applied Physics Laboratory 2017 by The Johns Hopkins Applied Physics Laboratory. Material

More information

Your Business Needs Managed Services. Find out when your business will truly benefit from a technology provider.

Your Business Needs Managed Services. Find out when your business will truly benefit from a technology provider. Your Business Needs Managed Services Find out when your business will truly benefit from a technology provider. Are managed services necessary for your business? Any company doing business today is tied

More information

Securing macos in the modern work era

Securing macos in the modern work era Securing macos in the modern work era Global enterprises have entered a new era of modern work, one where individuals need to make well-informed decisions on the fly, using the tools they know and love

More information

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider. 20 Signs That Your Business is Ready for Managed Services Find out when your business will truly benefit from a technology provider. Are managed services necessary for your business? Any company doing

More information

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider. 20 Signs That Your Business is Ready for Managed Services Find out when your business will truly benefit from a technology provider. Are managed services necessary for your business? Any company doing

More information

IT S TIME TO RETHINK VDI:

IT S TIME TO RETHINK VDI: IT S TIME TO RETHINK VDI: TOP 5 REASONS TO CONSIDER A SECURE REMOTE BROWSER The number of empty office desks is on the rise, as a growing number of employees work remotely and/or use their own devices.

More information

Mobility, Smart Devices, BYOD Do You Have a Solution & Strategy?

Mobility, Smart Devices, BYOD Do You Have a Solution & Strategy? Steven Scheurmann- Sales Leader, Asia Pacific & Japan, Endpoint & Mobility 스마트보안 Mobility, Smart Devices, BYOD Do You Have a Solution & Strategy? Mobile is an enterprise priority Growth in Internet Connected

More information

Project Portfolio Management Assessment

Project Portfolio Management Assessment Portfolio Management Assessment This report was prepared by Info-Tech Research Group for:, CIO March, 0 Por?olio Management Assessment Overall Score PPM Perceived Success These s express your percep-ons

More information

The KACE Endpoint Systems Management Advantage Axis Business Summit 9/22/16

The KACE Endpoint Systems Management Advantage Axis Business Summit 9/22/16 The KACE Endpoint Systems Management Advantage Axis Business Summit 9/22/16 John Bialas ESM Sales Account Mgr, Northeast Larry Desiano Sr ESM Solutions Engineer, Northeast Systems management remains difficult

More information

Breaking Out of the Security Metrics Matrix: Steps in the Right Direction

Breaking Out of the Security Metrics Matrix: Steps in the Right Direction SESSION ID: LAB2-W11 Breaking Out of the Security Metrics Matrix: Steps in the Right Direction Tim Crothers Vice President, Security Solutions Target @soinull James Stanger Chief Technology Evangelist

More information

ECONOMIC AND STRATEGIC BENEFITS

ECONOMIC AND STRATEGIC BENEFITS THE ECONOMIC AND STRATEGIC BENEFITS OF CLOUD COMPUTING Grab a seat and enjoy. Read Time: 12 minutes THE ECONOMIC AND STRATEGIC BENEFITS OF CLOUD COMPUTING Does SaaS save money? Traditional vendors of IT

More information

SysTrack Workspace Analytics

SysTrack Workspace Analytics SysTrack Workspace Analytics The Visibility IT Needs to Enable End-User Productivity Challenge IT executives are under constant pressure to cost-effectively manage complex IT systems. SysTrack enables

More information

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider.

20 Signs That Your Business is Ready for Managed Services. Find out when your business will truly benefit from a technology provider. 20 Signs That Your Business is Ready for Managed Services Find out when your business will truly benefit from a technology provider. Are managed services necessary for your business? Any company doing

More information

Key Benefits of Novell ZENworks 10 Configuration Management. Enterprise Edition

Key Benefits of Novell ZENworks 10 Configuration Management. Enterprise Edition Key Benefits of Novell ZENworks 10 Configuration Management Enterprise Edition ZENworks 10 Configuration Management Enterprise Edition Manage your endpoint devices: ZENworks Configuration Management supercedes

More information

ICT procurement trends in the Netherlands

ICT procurement trends in the Netherlands ICT procurement trends in the Netherlands Enterprise ICT investment plans to 2013 March 2013 TABLE OF CONTENTS 1 Enterprise ICT investment trends... 4 1.1 Introduction... 4 1.2 Survey demographics... 4

More information

SpECIal EdItORIal FEatuRE, In association WItH CIO. Service-based software powers ahead

SpECIal EdItORIal FEatuRE, In association WItH CIO. Service-based software powers ahead SpECIal EdItORIal FEatuRE, In association WItH CIO SaaS adoption SPONSORED FEATURE 1 Service-based software powers ahead the trend towards SaaS in organisations of all sizes is now irreversible, a survey

More information

The Three M s of Federal Communications: Millennialize, Mobilize and Modernize

The Three M s of Federal Communications: Millennialize, Mobilize and Modernize The Three M s of Federal Communications: Millennialize, Mobilize and Modernize Millennials matter more than ever. Millennials are the first generation to be born into a completely digital world. Their

More information

TOP 6 SECURITY USE CASES

TOP 6 SECURITY USE CASES Solution Brief: Top 6 Security Use Cases for Automated Asset Inventory page 1 SOLUTION BRIEF TOP 6 SECURITY USE CASES for Automated Asset Inventory Solution Brief: Top 6 Security Use Cases for Automated

More information

NEW SKILLS AND PARTNERSHIPS IN IT ASSET MANAGEMENT

NEW SKILLS AND PARTNERSHIPS IN IT ASSET MANAGEMENT NEW SKILLS AND PARTNERSHIPS IN IT ASSET MANAGEMENT TRENDS FROM MATURING LICENSE MANAGEMENT TEAMS The Oracle LMS Steering Group Oracle Open World India 2017 New Delhi The Oracle License Management Services

More information

Building an IT Roadmap. Planning for technology initiatives aid in successful and timely implementation of IT projects

Building an IT Roadmap. Planning for technology initiatives aid in successful and timely implementation of IT projects Building an IT Roadmap Planning for technology initiatives aid in successful and timely implementation of IT projects Table of Contents Guide: How to develop a 18-36 month IT roadmap...1 Why is it important

More information

Network Access Control (NAC) Market, Global, Forecast to 2022

Network Access Control (NAC) Market, Global, Forecast to 2022 NEXT STEPS Network Access Control (NAC) Market, Global, Forecast to 2022 NAC Evolving as Enterprise Networks Expand Beyond Secure Walls A Frost & Sullivan White Paper www.frost.com 50 Years of Growth,

More information

Moving to Mobility: The Data Collection Checklist

Moving to Mobility: The Data Collection Checklist Moving to Mobility: The Data Collection Checklist NAVIGATE THE MOVE TO MOBILE DATA COLLECTION BY USING MOBILE FORMS Mobile data collection, while comparable to its punch card and keyboard predecessors,

More information

Technology, Innovation and Future Priorities. CIO Survey Summary : Australia

Technology, Innovation and Future Priorities. CIO Survey Summary : Australia Technology, Innovation and Future Priorities CIO Survey Summary : Australia Tim Dillon Associate Vice President End User & Mobility Research IDC Asia Pacific July 2011 Copyright 2011 IDC. Reproduction

More information

White Paper. The Benefits of Desktop Virtualization

White Paper. The Benefits of Desktop Virtualization White Paper The Benefits of Desktop Virtualization The Benefits of Desktop Virtualization It is obvious that we are in the center of a universal technology shift. With that being said, cloud computing,

More information

Customer relationship management can sound intimidating to small- and mid-sized businesses. After all, if your company only has a handful of

Customer relationship management can sound intimidating to small- and mid-sized businesses. After all, if your company only has a handful of Customer relationship management can sound intimidating to small- and mid-sized businesses. After all, if your company only has a handful of customers, why do you need a dedicated process or system to

More information

Microsoft 365 Business Services

Microsoft 365 Business Services The Partner Financial Opportunity March 2018 Copyright information 2018 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document,

More information

Top. Reasons Enterprises Select kiteworks by Accellion

Top. Reasons Enterprises Select kiteworks by Accellion Top 10 Reasons Enterprises Select kiteworks by Accellion Accellion Enterprise Customers Include: Top 10 Reasons Enterprises Select kiteworks kiteworks by Accellion is the leading private cloud content

More information

THE EASIEST WAY TO THE CLOUD! V2 Cloud Based Virtual Desktop Solution For. Small and Medium-Sized Businesses V2 CLOUD

THE EASIEST WAY TO THE CLOUD! V2 Cloud Based Virtual Desktop Solution For. Small and Medium-Sized Businesses V2 CLOUD V2 Cloud Based Virtual Desktop Solution For Small and Medium-Sized Businesses OUR SOLUTION V2 Cloud WorkSpaces is a fully managed desktop as a service offering that enables you to securely access data,

More information

Selecting an Association Management System

Selecting an Association Management System Selecting an Association Management System 5 Step Guide to Selecting an AMS that Meets Your Organization s Needs WHITEPAPER 1 About Selecting an association management system (AMS) can be a daunting task

More information

WHITE PAPER HR Tech Implementation Checklist

WHITE PAPER HR Tech Implementation Checklist WHITE PAPER HR Tech Implementation Checklist 2 HR Tech Implementation Checklist WHITE PAPER Executive Summary HR software plays an integral part in how a business operates every employee in your organization,

More information

Transparent Development Program for ILMT.next IBM License Metric Tool Central Team Questions & Answers

Transparent Development Program for ILMT.next IBM License Metric Tool Central Team Questions & Answers ILMT Central Team Transparent Development Program for ILMT.next IBM License Metric Tool Central Team Questions & Answers 2013 IBM Corporation Disclaimer IBM s statements regarding its plans, directions,

More information

Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284

Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284 Automatically Find and Fix Insecure Database settings with Oracle Management Cloud PRO4284 David Wolf Snr Dir of Product Management - Oracle Oct 25, 2018 Session : PRO4284 Title: Automatically Find and

More information

Best Practice Requirements for Successful Metrics Initiatives

Best Practice Requirements for Successful Metrics Initiatives Best Practice Requirements for Successful Metrics Initiatives A sound enterprise security initiative requires integration of the right products, processes, policies, and practices throughout an organization.

More information

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det. GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,

More information

Smart About Smart Devices: An Introduction to MobileIron

Smart About Smart Devices: An Introduction to MobileIron Smart About Smart Devices: An Introduction to MobileIron Agenda: Smartphones in the enterprise What are the core challenges? How does MobileIron address them? How does MobileIron work? (demo) Q&A / next

More information

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE

THE CLOUD, RISKS AND INTERNAL CONTROLS. Presented By William Blend, CPA, CFE THE CLOUD, RISKS AND INTERNAL CONTROLS Presented By William Blend, CPA, CFE AGENDA Cloud Basics Risks Related Cloud Use GOA on Service Level Agreements COSO ERM Internal Control Model 2 CLOUD BASICS Evolution

More information

IT forecast: How to increase secure mobility and productivity for your workforce

IT forecast: How to increase secure mobility and productivity for your workforce IT forecast: How to increase secure mobility and productivity for your workforce 1 Manage security within the evolving workplace and enable your teams to work virtually anytime, anywhere New technology

More information

IT Management & Governance Tool Assess the importance and effectiveness of your core IT processes

IT Management & Governance Tool Assess the importance and effectiveness of your core IT processes IT & Governance Tool Assess the importance and effectiveness of your core IT processes STRATEGY& GOVERNANCE IT & Governance Framework APPS EDM01 ITRG04 DATA &BI ITRG06 IT Governance Application Portfolio

More information

AN EMM CHECKLIST FOR CIOs. Factors to Consider When Choosing an EMM Solution. Whitepaper

AN EMM CHECKLIST FOR CIOs. Factors to Consider When Choosing an EMM Solution. Whitepaper 1 AN EMM CHECKLIST FOR CIOs Factors to Consider When Choosing an EMM Solution Whitepaper 2 An EMM Checklist for CIOs As you decide on an Enterprise Mobility Management (EMM) solution, there are dozens,

More information

RELIABLEIT. How to Choose a Managed Services Provider. Finding Peace of Mind

RELIABLEIT. How to Choose a Managed Services Provider. Finding Peace of Mind IP PATHWAYS RELIABLEIT managed services TM How to Choose a Managed Services Provider Finding Peace of Mind If you re outsourcing your IT services, you need to find a Managed Services Provider you can trust.

More information

IT Managed Services. Agenda

IT Managed Services. Agenda IT Managed Services Agenda Introduction IT Challenges Problems with Traditional Approaches What is Managed Services The Benefits of Managed Services How it Works Q & A 517.323.7500 1 IT Challenges No Structured

More information

Strategic Plan

Strategic Plan Information Technology Strategic Plan 2019-2021 Presented by Darin King Vice Chancellor for Information Technology/CIO Strategic Plan 2019-2021 Contents Executive Summary... 3 Goals...4 GOAL ONE...4 GOAL

More information

Securely Enabling the Enterprise of Things

Securely Enabling the Enterprise of Things Securely Enabling the Enterprise of Things Trust in BlackBerry Almost every product in Blackberry s bag of tricks directly or by extension is addressing the challenges of managing a diverse set of IoT

More information

A Practical and Effective Approach to Risk Assessment

A Practical and Effective Approach to Risk Assessment A Practical and Effective Approach to Risk Assessment IT Risk Assessment Case Study Portions of this presentation are from a 2007 & 2008 FFIEC Technology Conference presentation to bank examiners. Special

More information

Tough Math for Desktop TCO

Tough Math for Desktop TCO Top 6 reasons to use a Remote Desktop and RemoteApps Tough Math for Desktop TCO In their fight to reduce IT budgets, small- and medium-sized businesses have to answer one tough question: how do we reduce

More information

Understanding the Current IT Landscape

Understanding the Current IT Landscape Understanding the Current IT Landscape Jon Brown Vice President, Market Intelligence #ROISummit www.techtarget.com/formarketers Today s Guest Brien Porter Director of Infrastructure Engineering First Republic

More information

Prince George s County

Prince George s County INDUSTRY Public sector ENVIRONMENT County-wide network serving approximately 20,000 endpoints, guests and IoT devices. Connected systems include desktops, laptops and mobile devices, along with printers,

More information

The Beginner s Guide to CRM

The Beginner s Guide to CRM The Beginner s Guide to CRM AGENCY LOGO Customer relationship management can sound intimidating to small- and mid-sized businesses. After all, if your company only has a handful of customers, why do you

More information

ECM Migration Without Disrupting Your Business:

ECM Migration Without Disrupting Your Business: ECM Migration Without Disrupting Your Business: Seven Steps to Effectively Move Your Documents Planning your enterprise content management (ECM) migration is just as important as selecting and implementing

More information

Future-proof your mobility strategy with Dell Enterprise Mobility Management

Future-proof your mobility strategy with Dell Enterprise Mobility Management Future-proof your mobility strategy with Dell Enterprise Mobility Management Change is the only constant in the mobile workforce landscape. Changes in mobile device technology are leading the way. Smartphone,

More information

IT Plan Instructions for FY18-FY19

IT Plan Instructions for FY18-FY19 IT Plan Instructions for FY18-FY19 Introduction and General Instructions The information technology plan for FY18-FY19 is web-enabled. You can navigate to the various sections of your agency s plan by

More information

Embracing the Digital Workplace with Desktop Management Solutions

Embracing the Digital Workplace with Desktop Management Solutions Embracing the Digital Workplace with Desktop Management Solutions 1 Contents + INTRODUCTION + MEETING TODAY S ELEVATED SELF-SERVICE EXPECTATIONS + THE FRAMEWORK OF THE MODERN, USER-FOCUSED WORKSPACE +

More information

AllTrafficSolutions.com THREE WAYS RADAR SPEED DISPLAYS HELP YOU MAXIMIZE RESOURCES AND BUDGET

AllTrafficSolutions.com THREE WAYS RADAR SPEED DISPLAYS HELP YOU MAXIMIZE RESOURCES AND BUDGET AllTrafficSolutions.com THREE WAYS RADAR SPEED DISPLAYS HELP YOU MAXIMIZE RESOURCES AND BUDGET 2 Help You Maximize Resources and Budget CONTENTS Introduction 3 Taking it to the Next Level with Web-enabled

More information

Why You Need An Enterprise-wide Cloud Strategy?

Why You Need An Enterprise-wide Cloud Strategy? Why You Need An Enterprise-wide Cloud Strategy? Adam Fore Director Cloud Computing & Virtualization Solutions, NetApp September 2011 Agenda What Are IT Leaders Saying? Benefits of Public and Private Clouds

More information

GO BEYOND MOBILE DEVICE MANAGEMENT WITH A DIGITAL WORKSPACE WHITE PAPER

GO BEYOND MOBILE DEVICE MANAGEMENT WITH A DIGITAL WORKSPACE WHITE PAPER GO BEYOND MOBILE DEVICE MANAGEMENT WITH A DIGITAL WORKSPACE WHITE PAPER Table of Contents On Its Own, Mobile Device Management Can t Deliver on Modern Demands 3 Two Challenges, Two Solutions 3 Mobile Device

More information

Delivering the Unified Workspace. Automate: Deliver: Manage. October 2017 Peter von Oven End User Computing SME

Delivering the Unified Workspace. Automate: Deliver: Manage. October 2017 Peter von Oven End User Computing SME October 2017 Peter von Oven End User Computing SME Table of contents Executive summary 3 Introduction 5 Delivering the Workspace of the Future 6 Applications: Launch, Connect, or Install 6 Accelerated

More information

Selling IT Automation to Your Organization

Selling IT Automation to Your Organization Selling IT Automation to Your Organization By Nick Cavalancia TABLE OF CONTENTS Introduction... 1 Making the IT Automation Pitch...2 Creating a Sense of Ownership... 7 Putting the Sold Sign on IT Automation...8

More information

DFS-Sphere eform Digital Form Process Solution for Business

DFS-Sphere eform Digital Form Process Solution for Business DFS-Sphere eform Digital Form Process Solution for Business Introduction Much time and effort is wasted today in handling and tracking paperwork of company forms and requests. DFS-Sphere eform allows you

More information

IT Strategic Plan Portland Community College 2017 Office of the CIO

IT Strategic Plan Portland Community College 2017 Office of the CIO IT Strategic Plan Portland Community College 2017 Office of the CIO 1 Our Vision Information Technology To be a nationally recognized standard for Higher Education Information Technology organizations

More information

BlackBerry and Qlik - Guiding the Future of Secure Mobile Business Intelligence

BlackBerry and Qlik - Guiding the Future of Secure Mobile Business Intelligence Partner Case Study BlackBerry and Qlik - Guiding the Future of Secure Mobile Business Intelligence At a Glance Customers of Partner 40,000 Location Radnor, PA Partner Product Qlik Sense www.qlik.com Founded

More information

Grow Your Business with Confidence. A Guide for Businesses Outgrowing Basic Accounting Software

Grow Your Business with Confidence. A Guide for Businesses Outgrowing Basic Accounting Software Grow Your Business with Confidence A Guide for Businesses Outgrowing Basic Accounting Software Contents Introduction 5 Signs You re Ready for a New Accounting Solution The Signs Are Clear. Now What? Questions

More information

Identity as a Critical Next Step in Security

Identity as a Critical Next Step in Security SESSION ID: SPO1-W05 A Identity as a Critical Next Step in Security Mike Byrnes Senior Manager Authentication & Fraud Current State of Security Infrastructure BUILDING THE PERIMETER Years of network security

More information

Cloud is about how you do computing, not where you do computing. - Paul Maritz, CEO of VMware

Cloud is about how you do computing, not where you do computing. - Paul Maritz, CEO of VMware Cloud is about how you do computing, not where you do computing. - Paul Maritz, CEO of VMware ABOUT OUR AUTHOR The Attivo Group Based in Irvine, CA and founded in 1992, The Attivo Group is a leading business

More information

VMWARE WORKSPACE ONE. Consumer Simple. Enterprise Secure. APPS AND IDENTITY DESKTOP MOBILE MANAGEMENT AND SECURITY.

VMWARE WORKSPACE ONE. Consumer Simple. Enterprise Secure. APPS AND IDENTITY DESKTOP MOBILE MANAGEMENT AND SECURITY. DATASHEET VMWARE WORKSPACE ONE Consumer Simple. Enterprise Secure. AT A GLANCE VMware Workspace ONE is the enterprise platform that enables IT to deliver a digital workspace that empowers the workforce

More information

AlienVault MSSP Partner Program

AlienVault MSSP Partner Program AlienVault MSSP Partner Program Table of Contents Welcome to the AlienVault MSSP Partner Program ---------------------------------------------------------- 3 Program Framework -------------------------------------------------------------------------------------------------

More information

IDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2017 Vendor Assessment

IDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2017 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2017 Vendor Assessment Robert Palmer Allison Correia THIS IDC MARKETSCAPE EXCERPT FEATURES: XEROX IDC MARKETSCAPE FIGURE

More information

Embracing the Digital Workplace with Unified Endpoint Management (UEM)

Embracing the Digital Workplace with Unified Endpoint Management (UEM) ZENworks Embracing the Digital Workplace with Unified Endpoint Management (UEM) Table of Contents page Embracing the Digital Workplace with Unified Endpoint Management (UEM)...2 Meet Today s Elevated Self-Service

More information

Questions to ask your vendor

Questions to ask your vendor CHOOSING A CONTENT SERVICES PLATFORM Questions to ask your vendor A guide to identifying not only what the product can do, but how it does it Congratulations on taking the first steps to make your organization

More information

Disclosure Management

Disclosure Management Disclosure Management Collaborative report production management combining numbers with narrative Overview Many companies have experienced growing pains in recent years with both internal and external

More information

The Leading IT Platform to Secure and Manage Mobile Devices, Desktops, Apps and Content

The Leading IT Platform to Secure and Manage Mobile Devices, Desktops, Apps and Content The Leading IT Platform to Secure and Manage Mobile Devices, Desktops, Apps and Content MobileIron Enterprise Mobility Management (EMM) 401 East Middlefield Road, Mountain View, CA 94043 www.mobileiron.com

More information

www. modo networks.com

www. modo networks.com www.modonetworks.com Make the Most of your I.T. with Modo Delivering a full range of I.T. support services, Modo specializes in helping small and medium sized businesses that want to get more from technology.

More information

AllTrafficSolutions.com THREE WAYS RADAR SPEED DISPLAYS HELP YOU MAXIMIZE RESOURCES AND BUDGET

AllTrafficSolutions.com THREE WAYS RADAR SPEED DISPLAYS HELP YOU MAXIMIZE RESOURCES AND BUDGET AllTrafficSolutions.com THREE WAYS RADAR SPEED DISPLAYS HELP YOU MAXIMIZE RESOURCES AND BUDGET 2 Help You Maximize Resources and Budget CONTENTS Introduction 3 Taking it to the Next Level with Web-enabled

More information

Hosted VoIP Buyer s Guide

Hosted VoIP Buyer s Guide Hosted VoIP Buyer s Guide Before you buy a business phone system Your enterprise needs a phone system that not only matches your current business requirements it should also grow alongside your ambitions.

More information

multi-device car shopping study

multi-device car shopping study BR-MDCSS MULTI-DEVICE CAR SHOPPING STUDY HOW CONSUMERS SHOP FOR CARS Methodology In partnership with Ipsos, the AutoTrader.com Multi-Device Car Shopping Study is a three-phase research study among in-market

More information

UNB s Mobility Strategy (Approved Feb. 23, 2016)

UNB s Mobility Strategy (Approved Feb. 23, 2016) UNB s Mobility Strategy 2016-2017 (Approved Feb. 23, 2016) The vision for enhancing UNB through creative use of mobile technology: We will help grow and strengthen UNB by continuing to deploy innovative

More information

15 KEYS FOR ENSURING A SUCCESSFUL WINDOWS 10 MIGRATION WITH END USER EXPERIENCE MONITORING

15 KEYS FOR ENSURING A SUCCESSFUL WINDOWS 10 MIGRATION WITH END USER EXPERIENCE MONITORING GUIDE 15 KEYS FOR ENSURING A SUCCESSFUL WINDOWS 10 MIGRATION WITH END USER EXPERIENCE MONITORING Plan, Do, Check, Act: A Guide for IT to Manage Change Initiatives 020 7791 6000 info@uk.cdw.com uk.cdw.com

More information

BIGFIX. Maintaining Continuous Compliance with BigFix. Executive Summary

BIGFIX. Maintaining Continuous Compliance with BigFix. Executive Summary Maintaining Continuous Compliance with BigFix Executive Summary Meeting regulatory and internal compliance guidelines is a de facto standard practice for IT operations and IT security teams in public and

More information

ONLINE OR ON PREMISE?

ONLINE OR ON PREMISE? ONLINE OR ON PREMISE? A series of mini webinars by Chris Vandersluis President, HMS Software Email: chris.vandersluis@gmail.com LinkedIn: www.linkedin.com/in/cvandersluis Web: www.timecontrol.com Webinar

More information

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions BUYER S GUIDE: MFA BUYER S GUIDE Evaluating and getting started with modern MFA solutions NEW CAPABILITIES One-size-fits-all authentication is a relic of the past, and the days of hard tokens as the default

More information

Plotting Your Path to Smarter HCM in the Cloud. A step-by-step guide for HR leaders and teams.

Plotting Your Path to Smarter HCM in the Cloud. A step-by-step guide for HR leaders and teams. Plotting Your Path to Smarter HCM in the Cloud A step-by-step guide for HR leaders and teams. 2 Navigating Your Way to the Digital Future of HR With demand for convenient digital services growing amongst

More information

Achieving Application Readiness Maturity The key to accelerated service delivery and faster adoption of new application technologies

Achieving Application Readiness Maturity The key to accelerated service delivery and faster adoption of new application technologies WHITE PAPER Achieving Application Readiness Maturity The key to accelerated service delivery and faster adoption of new application technologies Achieving Application Readiness Maturity Executive Summary

More information

A Lakeside Software White Paper. Planning for Desktop Virtualization

A Lakeside Software White Paper. Planning for Desktop Virtualization A Lakeside Software White Paper Planning for Desktop Virtualization 2 Planning for Desktop Virtualization Table of Contents Introduction... 3 Innovation... 3 Functionality... 4 Performance... 4 Ease of

More information

The Roadmap to a Digital Enterprise through Mobility

The Roadmap to a Digital Enterprise through Mobility The Roadmap to a Digital Enterprise through Mobility How to craft a mobility strategy to maximize employee productivity, streamline operations, and build an efficient business. Executive Summary As mobile

More information

Power Management. White Paper. Americas +1 (603) EMEA +49 (0) APAC

Power Management. White Paper. Americas +1 (603) EMEA +49 (0) APAC Power Management White Paper Americas +1 (603)-598-9575 EMEA +49 (0) 8158 905933 APAC +91 98310 44782 Copyright 2014 SyAM Software, Inc. All rights reserved. Other brands and names are the property of

More information

This report was prepared by McLean & Company for ACME Incorporated on Data is comprised of 8 responses. Prepared for ACME Incorporated

This report was prepared by McLean & Company for ACME Incorporated on Data is comprised of 8 responses. Prepared for ACME Incorporated This report was prepared by McLean & Company for ACME Incorporated on 2015-06-18. Data is comprised of 8 responses. Prepared for ACME Incorporated HR & Governance Diagnostic Program 1. Understand Results

More information

Cyber Security. & GRC Metrics That Tell a Story! Presented by: Swarnika Mehta Manager, KPMG Cyber Security Services

Cyber Security. & GRC Metrics That Tell a Story! Presented by: Swarnika Mehta Manager, KPMG Cyber Security Services Cyber Security & GRC Metrics That Tell a Story! Presented by: Swarnika Mehta Manager, KPMG Cyber Security Services Eva Benn Senior Associate, KPMG Cyber Security Services Contents 2 Introduction In the

More information

FGFOA Workday HR/FM ERP in the Cloud. Brian Battles Deputy CFO, City of Orlando. February 23, 2017

FGFOA Workday HR/FM ERP in the Cloud. Brian Battles Deputy CFO, City of Orlando. February 23, 2017 FGFOA Workday HR/FM ERP in the Cloud Brian Battles Deputy CFO, City of Orlando February 23, 2017 Agenda What Does Cloud Mean? Orlando IT Strategy and System Needs Workday ERP Selection and Implementation

More information

INTEGRATING HORIZON AND CITRIX APPS IN A DIGITAL WORKSPACE

INTEGRATING HORIZON AND CITRIX APPS IN A DIGITAL WORKSPACE INTEGRATING HORIZON AND CITRIX APPS IN A DIGITAL WORKSPACE Aligning Your Windows-Based Infrastructure for a Digital Workspace In today s enterprise, applications come in many different shapes and sizes.

More information

QlikView vs. QlikSense

QlikView vs. QlikSense Understanding the difference Contents Qlik... 1 QlikView... 1 QlikSense... 2 Face to Face... 3 Conclusions... 5 Annex Gartner s Magic Quadrant for Business Intelligence... 8 Qlik Qlik (NASDAQ: QLIK) is

More information

White Paper. Shadow IT: The Great IT Opportunity

White Paper. Shadow IT: The Great IT Opportunity White Paper Shadow IT: The Great IT Opportunity Table of Contents Introduction.... 3 The Rise of Shadow IT... 3 Business Risk.... 4 IT Investment.... 4 One Size Does Not Fit All... 4 High Security Environments...

More information