Title: Altiris Overview
1Altiris Overview
- for Channel Sales Professionals February 1st,
2007
2Who is Altiris
Altiris is a leading provider of service-oriented
management software that delivers a scalable and
future-proof approach to managing information
technology. Modular solutions from Altiris align
IT service management with business objectives.
Altiris solutions deliver audit-ready security
and automated management of client, server,
mobile and network devices.
- History
- Founded 1998
- Altiris IPO 2002 - NASDAQ ATRS
- Valuation - 700 million
- Value Proposition
- IT Service Management made practical
- Based on industry standards and best practices
- Heterogeneous, cross-platform
- QoS capability down to the client
- Future proof
- Delivering the best total cost of management
(TCM) advantage
Altiris Corporate Headquarters Lindon, Utah
3The Value of Altiris
- Altiris is the only vendor that is endorsed and
recommended by HP, Dell, Fujitsu Siemens
Computers and IBM - Altiris is the most complete solution that is
also complementary to and extends the Microsoft
solutions - Altiris is the best partner to work withÂ
4Systems Management Evolution
500M
Lifecycle Management
190M
Management Suites
166M
99M
Point Products
63M
10M
.6M
5Service-Oriented Management Solutions
Business and IT Alignment
Extensible Management Architecture based on SOA
principles
- Modular, open and future-proof approach
- For diverse and widely distributed IT
infrastructure - Reduce total cost of management by up to 60
6Target Markets Issues
7Whats on the CEOs Radar
- Governance and Compliance
- Sarbanes-Oxley, HIPPA, GLBA
- FISMA, BASEL II
- Security
- International Pressures
- Distributed Environment
- Outsourcing/Off Shoring
- Competition
- Business Performance
- Monitoring Performance
- Alignment and Mapping
- Sales Productivity
- Customer Care
- Customer Service
- Product Innovation
- Barriers to Entry
- Competitive Advantage
- Consolidation
- Convergence
- Mergers and Acquisitions
- Financial Performance
- Building Shareholder Value
- Overall Growth in Top Line Revenue
- Operational Performance and Execution
- Business Complexity
- Tax codes
- Increasingly Complex Infrastructure
- Information Technology Responsiveness
8CIO Priorities Aligning Business and IT
TYPICAL company
Source Forrester Research, Inc. 2005
9IT Realities
Heterogeneity Lets see 4 hardware vendors, 9
operating systems, over 2,000 applications
Governance Pressures SOX, GLBA, HIPAA, FISMA,
BASEL II, license compliance Whats next?!
Emerging Technologies Blades, Itanium, Virtual
Machines, Thin Clients, SOAWhats next?
Security Pressures Am I doing all I can to
increase my companys security posture?
Pressure To Support The Business Business needs
are driving technology needs
Consolidation As companies come together do
their technologies work together ?
Flat IT Spend Do more with Less.
10Typical IT Budget and Spend
Company getting GOOD VALUE
Company getting POOR VALUE
TYPICAL company
New IT initiatives
Ongoing IT operations maintenance
Source Forrester Research, Inc. 2005
11Too Many Tools, Redundant Processes
Altiris Service-Oriented Management
Managed Devices / Configuration Items
High costs, inflexible operations, vulnerabilities
Repeatable. Predictable. Invisible gt IT
12Automation Leads to Supporting Business Needs
Extensible Management Architecture based on SOA
Principles
13Why Altiris Succeeds
- Solving todays problems laying the foundation
for tomorrow's challenges
14Altiris Solution Maturity Model
- Metrics to measure value
- Service levels to meet business and IT goals
- Mature, seamless integration with strategic
business systems
Service
- Proactive management
- Processes implemented
- Implementation of a CMDB
Predictive
- Basic deployment
- Multiple point solutions
- Migration needs
- Beginning consolidation
- Discovery
Stable
15Altiris Solutions Product Overview
- Key Points
- Functions
- Solutions
- Value Propositions
- Business Objectives Achieved by Customers
- Leading Sales Questions
- Product Groups
- Client Mobile Management
- Asset CMDB Management
- Security Compliance Management
- Server Infrastructure Management
16Altiris Service-Oriented Management IT Fabric
17Client Mobile Management
18Client Mobile Management
- Functions
- IT lifecycle management
- Desktop management
- Business continuity
- Solutions
- Comprehensive hardware and software inventory
- OS imaging, deployment and configuration
- PC personality and OS migration
- Policy-based mobile software delivery
- Automated patch management
- Real-time diagnosis and remediation
- Security vulnerability assessment
- Software packaging and quality assurance
- Software virtualization
- Network-wide backup and disaster recovery
19Client Mobile Management
- Value Propositions
- Standardize and consolidate hardware, software,
management systems and resources - Reduce IT costs through automation, efficiency
and standardization - Increase visibility into and control over IT
resources - Business Objectives Achieved by Customers
- INCREASED ROI, LOWERED COSTS AND DEVELOPED
ACCURATE BUDGETS - Reduced total cost of owning corporate IT assets
- 86 percent reduction in management costs versus
manual efforts - AUTOMATED MANUAL PROCESSES
- Eliminated time-consuming and inefficient manual
processes or need to visit desktops - REDUCED IMAGING, DEPLOYMENT AND MIGRATION TIME
- Reduced migration and image deployment time by
85 percent - Upgraded primary business applications in one day
versus seven - Improved software delivery success rate of 60
percent to 90 percent - GAINED VISIBILITY OF INSTALLED HARDWARE AND
SOFTWARE - Gained a real-time, complete list of all the
hardware and software on the network - Reduced inventory time from one month to minutes
20Client Mobile Management
- Leading Sales Questions
- How many total client computers do you currently
have? - How are you currently managing client computers
within your organization? - How are you currently delivering software to
client computers? How much time and effort are
involved? Are end users typically disrupted
during the software distribution and installation
process? - Do you know what software is installed in your
environment? Are you in compliance with software
license agreements? Are you spending money for
software licenses that arent used? - How do you currently manage software patches? Are
your client computers protected in the event a
virus or worm enters your environment? - How are you currently packaging applications for
deployment? Are applications installed in a
standardized way? What percentage of software
distributions fail? - How do you currently deploy new systems? What
type of effort is necessary to deploy a new
system? Are new client machines standardized? - Are you currently able to recover from hardware
failures? What costs are involved when a failure
occurs, including lost productivity, lost data
and IT resources? - How secure are your client computers? Do you know
if you would pass a security audit?
21Asset CMDB Management
22Asset CMDB Management
- Functions
- Asset tracking and application metering
- Asset repository
- Incident, change and problem management
- Automated workflow
- CMDB
- Solutions
- Comprehensive hardware and software inventory
- ITIL Service Support
- Application usage and denial of use
- Unified asset repository and CMDB
- Contract management and service level agreement
reporting - Financial systems integration
- Bar code and asset tagging
- Total cost of ownership reporting
23Asset CMDB Management
- Value Propositions
- Discover, manage and support IT assets throughout
their lifecycle - Leverage a single, unified CMDB and asset
repository - Eliminate overbuying and under-buying by
presenting relevant information to justify
decisions - Align software usage with license agreements to
ensure compliance, capitalize on reallocation
opportunities and reduce maintenance costs - Provide the evidence of proper controls to meet
regulatory requirements - Automate help desk processes and align with ITIL
- Reduce number of incidents to the help desk by
empowering end users through self-help - Provide management with key performance
indicators demonstrating the value of IT - Business Objectives Achieved by Customers
- Reduced ticket resolution time from hours or days
to minutes - Raised first-call resolution rate to 80 percent
- Automated common requests and approvals
- 1,000 percent ROI in 45 days
- Gained full regulatory and license compliance
24Asset CMDB Management
- Leading Sales Questions
- Do you know what you have, where it is, and how
much its costing you? - Are you concerned about managing and supporting
multiple integration points between inventory
tools, asset repository and the service desk? - Are you concerned about asset repository or CMDB
accuracy? - How much does a phone call to IT cost? What are
you doing to reduce these costs? - Do your service desk technicians currently have
access to asset data to help resolve incidents,
detect potential problems and reduce the risk
associated with change? - Are you paying maintenance on unused software
licenses? - Have you actively engaged in ensuring software
license compliance? - Are you able to detect missing assets?
- How often does solving a problem require a walk
across the campus or to another floor?
25Security Compliance Management
26Security Compliance Management
- Functions
- Security configuration policy compliance
- Vulnerability detection and remediation
- Endpoint security enforcement
- Network access control
- Solutions
- Location-aware system protection
- Automated patch discovery and distribution
- Centralized management of local group members and
passwords - CMDB-driven endpoint assurance
27Security Compliance Management
- Value Propositions
- Overcome compliance challenges by defining and
managing system security policies with proactive
auditing across all managed systems - Evaluate risks, understand trends and prioritize
responses with enterprise-wide status reports - Improve availability and operational efficiency
through rapid assessment and remediation of
common security vulnerabilities - Maintain information integrity by identifying and
blocking common access avenues to corporate and
client records - Accelerate application and software patch release
cycles without compromising stability or security - Isolate unsecured systems before they wreak havoc
on the network - Business Objectives Achieved by Customers
- Reduced PC desktop total cost of ownership by
nearly 14 percent by adding best-practice
processes to manage security and security
software - Saved more than 75 percent by switching from
manual to automated application of security
configurations - Reduced daily patch activities from 80 percent to
15 percent - Eliminated common avenues of security threats
28Security Compliance Management
- Leading Sales Questions
- How secure are the computers in your environment?
Do you know if you would pass a security audit? - Has your organization had a security breach or
failed audit? - Do you have requirements to protect corporate and
client records such as Social Security numbers or
personal health care records, and other such
proprietary corporate or personal information? - Would you like to reduce system downtime by
assessing and deploying remediation of security
vulnerabilities? - Would you like to eliminate security risks such
as viruses, worms and Trojan horses? - Do local administrative accounts in your
environment consist of a single password that
works on all instances of that account throughout
your environment? - Do you have a method that easily and remotely
detects the existence of unauthorized accounts in
your environment? - Can you control removable storage devices,
including USB, iPods, CD/DVD drives, etc.? - Can you secure Wi-Fi access and infrastructure or
enforce VPN usage by user?
29Server Infrastructure Management
30Server Infrastructure Management
- Functions
- Virtual and physical provisioning
- Proactive fault and performance monitoring
- Configuration management
- Heterogeneous platform support (Windows, UNIX and
Linux) - Solutions
- Comprehensive hardware, software and
configuration inventory - Bare-metal imaging, deployment and configuration
- Virtual machine management
- Policy-based software patch management
- Automated vulnerability assessment
- Proactively monitor for system faults or
performance problems - Real-time diagnostics and remediation
- Patented system snapshot and recovery
31Server Infrastructure Management
- Value Propositions
- Improve reliability of deployed systems and
applications - Assist in new technology adoptions such as blade
and virtual servers - Prepare for server consolidation and migration
efforts - Minimize risks by proactively monitoring system
configurations - Ensure tasks occur consistently across managed
systems - Detect and resolve problems before they affect
business functions - Leverage management tools to enforce standard
procedures - Enforce data integrity and accuracy across the
organization - Snap in, modular design solves immediate problems
while building a roadmap for the future - Business Objectives Achieved by Customers
- Reduced server build time from 46 hours to 10
minutes - Fast, automated management of enterprise servers,
including rapid backup and recovery - Provisioned 4,000 new PCs in a fraction of the
time compared to manual provisioning
32Server Infrastructure Management
- Leading Sales Questions
- Do you have established, enforceable
configurations? - Can you ensure that tasks occur consistently
across managed systems? - Can you tell whether servers are within an
acceptable level of patch compliance? - Do you know in real time what hardware and
software assets are in your environment? - Do you have regulations that affect your change
management processes? - Can you grow your infrastructure with existing
headcount? - Are you planning any consolidation or migration
efforts? - Have you implemented virtual machines?
- Can you identify usage thresholds and patterns?
- How long does it take you to diagnose and correct
a problem? - Do you have means to track non-compliant events?
- Have you built parallel management teams for
Windows, Linux and UNIX? - Do you have overlapping tools across the teams?
- How do you manage different hardware types (rack
mount, blades, virtual machines, etc.)?
33Conclusion
-
- Altiris software manages and secures technology
through automation, which reduces the cost and
complexity of IT ownership and aligns business
and IT.