Vous êtes sur la page 1sur 19

IT System Management & Automation

Asep Suandi SKom., MMSi.


PT . Global Asia Sinergi
Complexity of IT Operational

Multi form factors & OS


Complexity of IT Operational

Distributed Locations
IT Supporting The Business

Wall of Activities, Support & Issues

Kaseya is a software designed for Enterprise-class


Management Solution of IT System through Integrated
Automation in a single pane of glass view
Flow of Kaseya

MONITORING ALERTS PROCEDURES AUTOMATE

Doing More with Less – There is no denying the pressure to reduce


costs and headcount at the same time responsibilities are growing.
Why Automate?
My Commitments :
1. I will not SICK
2. I will not RESIGN
3. I will work 24 Hrs a day
4. I will work 365 days a year

• COST SAVING : Replace Human Operators in tasks


that involve physical and monotonous work

• SUPER HUMAN : Performing tasks that are beyond


human capabilities

• PRODUCTIVITY : Save money by increasing uptime

• UPSKILLING : Provides higher level jobs of IT team


Example of Automation

Monitoring Activity……..

AlertDetected
Alert Detected: :
Unauthorized
Missing
policy violations  playing
/ Stoleninstallation
Devices / execution
Online
Angry Bird

Procedures :
Procedures
Who
illegaluse it, :raise/ No
software an alarm,  Uninstall
licenselock it down
Need a Prove: 
Not allowed from where,
Torrents, game  when, what
Block!
Done!
Write to log  Report
Execute the procedure automatically :
Execute
Execute the procedure
the silently
procedure automatically ::
Uninstalled afterautomatically
installation completed
Grab image
Capture even from
Desktop webcam
Silently
Blocked running from USB
Lockdown,
it thrucopy file/wipe
email or Email it
Send to Dashboard
Ready to execute commands

> join domain roll-out


> Silent push installation software
> change wallpaper
> blocking usb
> broadcast message
> mass reset local admin password
> scan-destroy : #mp3#mp4#mkv
> build : #ITSelfService
> collect data asset : #h/w #s/w #userLogin
Kaseya Technical Overview





IT MANAGEMENT
REPORTING

TRADITIONAL PROCESS KASEYA REPORTS


Reports are produced manually. Real-time reports can be generated
with Kaseya.
THE PROBLEM:
 Limited and delayed information Types of reports:
 Many man hours are used to  Asset Information from Hardware and
prepare reports Software availability
 Lack of accuracy  Asset Lifecycle
 Multiple resources to compile  IT System Performance and Status
 Resource Utilisation and Staff
Performance
 Application and Performance Issues
 Service Performance and Resolution
 Information Breach Reporting
 Business Process
Service Desk – IT Service Management

Service Desk Definition – is a Primary IT Service that


intended to provide Single Point of Contact (SPOC) to
meet the communication needs between both Users and
IT Employees

Benefits of Service Desk to the Business:


• Provides more broad and user-centered approach, seeking to provide the user
with an informed single point of contacts for all IT requirements
• Facilitates the integration of business processes into the service management
infrastructure
• Actively monitoring and owning Incidents and user questions, and providing the
communications channel for other service management disciplines with the
user community
• Provides an interface for other activities such as customer change requests,
third parties (e.g. maintenance contracts), and software licensing
ITIL Foundation

The Information Technology Infrastructure Library (ITIL), is a set of good


practices for IT Service Management (ITSM) that focuses on aligning IT
services with the needs of business

ITIL Functions:
1. Service Desk
2. Application Management
3. IT Operations Management
4. Technical Management

KASEYA SERVICE DESK is an ITIL READY


With BEST PRACTICES BUILT-IN
Security Compliance

Works behind firewalls and even NAT


Does not need any inbound ports opened on client machines. This lets the agent do its job in any network
configuration without introducing susceptibility to inbound port probes or new network attacks.

256-bit RC4 Encryption


Kaseya protects against man-in-the-middle attacks by encrypting all communications
between the agent and server with 256-bit RC4 encryption using a key that rolls every
time the server tasks the agent (typically at least once per day).

SSL Supported Web Access


Administrators access the Kaseya IT Center server through a SSL supported web interface.
The system never sends passwords over the network and never stores them in the
database.

Passed FIPS and Common Criteria


Passed Federal Information Processing Standard and Common Criteria, 2 of the highest Security
Standards in the world today.
Summary – Kaseya Solution

Highly-repeatable,
best practice IT management
in a highly-integrated, single pane of glass
interface

IT TASKS ARE NOW HANDLED ONLY EXCEPTIONS ARE MANUALLY


BY A VIRTUAL ADMINISTRATOR. PERFORMED.
Professional Edition – On Premise

VSA Single Production Server Agent Procedures


Agents: Windows, Mac, Linux and Mobile OS

Audit and Inventory Info Center (Reporting)


PROFESSIONAL EDITION

Discovery Monitor

Patch Management Policy Management

Ticketing Remote Access

Directory Services (unlimited domains) Remote Control

Time Tracking IT Delivery Kit

Desktop Policy Management Desktop Migration

Kaseya Network Monitor


Additional Service Options

Kaseya Service Desk (Unlimited Desks & Technician)


Enterprise Mobility Management
SECURITY
Antivirus for Workstations or Servers – powered by Kaspersky Lab

Antimalware – powered by MalwareBytes

Endpoint Security – powered by AVG Enterprise

BACKUP & DISASTER RECOVERY


Data Backup – Online Backup Solution

Backup – powered by ACRONIS

Imaging and Deployment Solution


System Backup and Restore – powered by Storagecraft (ShadowProtect)

SYSTEMS UTILITIES
Software Deployment and Update – powered by Ninite
About Kaseya
 Founded 2000
 Headquartered in Boston - Massachusetts
 450+ employees
 15,000+ customers
 10+ Million Devices Managed
 20 Countries - 32 Offices – 14 Languages
Clients References
Feels free contact us…
if you need any assistance on IT Automation

Our Automation. Your Liberation.

Vous aimerez peut-être aussi