Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


older | 1 | .... | 139 | 140 | (Page 141) | 142 | 143 | .... | 254 | newer

    0 0

    Con el apoyo de Symantec y otros socios de la industria, la Europol incautó gran parte de la infraestructura de esta banda

    続きを読む

    0 0

    Join our Partner Community Webcast
    Twitter カードのスタイル: 
    summary

    We believe it’s essential to continue to communicate to partners' about our future strategy, update partners’ on our execution plan, and inform them of Symantec’s continuing programs, campaigns and assets that they can leverage to drive demand.

    Join Mark Nutt with members of the EMEA senior leadership team for both Symantec and Veritas, on Thursday 19th March 2015, at 1pm GMT for the next Symantec Partner Community Webcast.

    During the Partner Community webcast, you’ll hear about:

    • Symantec and Veritas Strategy and Structure update
    • Partner Program progress and transition timescales
    • How we are helping to Enable our Partners

    Symantec's Partner Community Webcast

    Date: 19th March
    Time: 1pm GMT

    Register NOW

    Ask a question NOW

    その他の投稿者: 

    0 0

    シマンテックや他の業界パートナーの協力のもと、欧州刑事警察機構によって犯罪グループのインフラが大量に押収されました。

    続きを読む

    0 0

     

    SSID1.png

    As the Internet and technology has become increasingly more accessible and interconnected, online safety concurrently has become more essential, especially for our children and young people. Safer Internet Day (SID) is a global campaign that started twelve years ago by the European Commission to promote a more responsible and safer online environment for young people. It is now celebrated globally in over 100 countries.

    Each year hundreds of events are organized around the world to raise awareness on different topics relating to online safety, such as cyberbulling and social networking. This year, the campaign focuses on creating a ‘better internet together.’ We are all responsible – whether we are students, parents, educators, industry leaders, or lawmakers – to contributing to a better online environment. Safer Internet Day’s aim is “foster the positive and eliminate the negative online.”

    On February 10th, this year’s Safer Internet Day, eleven Symantec volunteers joined together to deliver online safety workshops to students at two local Secondary Schools in England, the Piggottt School and the Highdown School. The combined efforts of the eleven volunteers equaled to 66 hours of volunteer time!

    The students learned about a variety of online safety issues, such as password security, cyberbullying, social networking, and how people and companies can use your information. One of the students said, “I really enjoyed learning about possible situations and how to solve them.” The real life situations that the volunteers presented had a big impact on the students. Many of them cited these real life examples as the most informative aspect of the workshop. A survey revealed that most of the students learned something new, whether it was about online bullying or “the ten worst passwords,” they were all able to take something new away.

    SSID2.png

    For one of the Symantec volunteers, the most rewarding part of the experience was “the immediate change in behaviour of the children we interacted with. [It] immediately raised awareness and confidence in the children we presented to [and there was] immediate action from the children. Children were reporting incidences to school staff before we had finished our presentations.”

    SSID3.png

    Another volunteer said it was rewarding to see “the connection between Symantec’s mission, products and services and the positive impact to the community, especially with teenagers.”

    SSID4.png

    The experience proved to be very rewarding and the volunteer time invested was well worth the sense of achievement. The Symantec volunteers felt that they benefited the local community by improving the confidence of the pupils. Both Symantec employees and the students learned from the experience.

    Let’s create a better Internet together!

    Louise Hanlon is Symantec's Corporate Responsibility Manager - EMEA


    0 0
  • 02/26/15--11:29: RSA VIP Luncheon
  • VP level and above are invited to attend
    Twitter カードのスタイル: 
    summary

    Symantec ISE Luminary Luncheon at RSA 2015

    We would like to invite you to join our distinguished ISE® Alumni Hosts and our program sponsor Symantec for an exclusive luncheon to discuss the many exciting changes ahead as Symantec continues to evolve as a global security leader. This is an excellent opportunity to hear directly from Symantec’s top executives on the recent company separation, corporate strategy and future roadmap plans.

    This exclusive eventwill take place during RSA® Conference 2015 from 12:00 p.m.-2:00 p.m. on Tuesday, April 21, at the Park Central Hotel San Francisco (formerly the Westin Market Street), conveniently located within walking distance of Moscone. Pose your questions to the Symantec leadership team, while taking advantage of the opportunity to network with your industry peers. Earn up to 2 CPE for event participation.

    RSVP:  Please note that this event is invitation only and due to the location of our program, availability is limited.  If you plan on joining us, you can register via the T.E.N. Online Registration Center. If you are unavailable, simply reply "I decline" and we will remove you from future outreach regarding this event. If any colleagues or members of your team may be interested in attending, please let us know, as we would be happy to extend the invite pending availability.

    We look forward to seeing you at the event!

    Best regards,

    The Symantec Team

    Tuesday, April 21, 2015
    12:00 – 2:00 P.M.
    Park Central Hotel San Francisco
    (Formerly Westin Market Street)
    50 3rd St.
    San Francisco, CA 94103

    Registration and more information:
    www.ten-inc.com/RSA2015.asp#tue

    Symantec Executive Speakers
    Mike Brown, President & CEO
    Balaji Yelamanchili EVP & GM, Enterprise Security Products
    Jeff Scheel, Sr. VP Corporate Development, Alliances and Strategies

    ISE® Alumni Hosts
    Geoffrey Aranoff, Chief Information Security Officer, Broadcom Corporation
    Tim Callahan, Chief Information Security Officer, Aflac Incorporated
    David Cass, SVP & Chief Information Security Officer, Elsevier
    Lee Parrish, Executive Director Information Security & Compliance, Bridgestone
    Myrna Soto, SVP & Chief Information Security & Infrastructure Officer, Comcast
    Yabing Wang, Chief Security Architect, Enterprise Technology & Architecture Services, Allstate Insurance Company


    0 0
  • 02/26/15--11:32: What is OCSP?
  • Twitter カードのスタイル: 
    summary

    The OCSP (Online Certificate Status Protocol) is one of the two ways for obtaining the revocation status of X.509 digital certificate (e.g. SSL & code-signing certificates) and hence maintains the security of a server or other network resource. The other older mechanism, which OCSP has superseded, is known as “CRL (Certificate Revocation List).”

    OCSP overcomes the chief limitation of CRL: the fact that updates must be frequently downloaded to keep the list current at the client end. When a user attempts to access a server, the OCSP sends a request for certificate status information. The server sends back a response of "Success", “Unauthorized”, "Malformed Request” or "Try Later". The protocol specifies the syntax for communication between the server (which contains the certificate status) and the client application (which is informed of that status. OCSP responses contain less information than a CRL so it puts less burden on the network and the calling resources.

    An OCSP request is a signed message.  It consists mainly of two components: a request body, and an optional signature block.  The request body contains one or multiple certificate status requests.  The body consists of the following fields:
     
    Version – OCSP Request version number.  It is default to v1.
    Requestor name – optional field
    One or more requests – web server only include one certificate status request per OCSP request message.
    Extensions – This optional field to include extra information which may be communicated between the client and the OCSP server, such as the expected OCSP response message type from the client, nonce, or archive cutoff date, etc. 
     
    Of all these components, the most important component is the certificate status request structure.  It consists of the following:
     
    HashAlgorithm – this field specifies the digest algorithm, which is used to digest the CA, subject DN or CA key.
    IssuerNameHash – digest of the EE’s CA subject DN
    IssuerKeyHash – digest of the EE’s CA public key or a unique key identifier
    SerialNumber – EE certificate serial number
    The combination of the SerialNumber and the IssuerNameHash or the SerialNumber and the IssuerKeyHash uniquely identifier the EE certificate signed by the CA.

    How did Symantec improve OCSP Performance?

    Origin Server:  Symantec built a highly efficient and responsive OCSP infrastructure.

    CDN: Symantec worked with a CDN to make their EdgeServer OCSP aware and able to read the ASN.1 request and response package.

    • Handle the OCSP traffic intelligently:
      • Use the nextUpdate timestamp to determine the expiration time in cache
      • Use the CertID sequence from the OCSP Request to determine the cache key.  Specifically issueNameHash + issueKeyHash + serialNumber.
      • Check for the presence of the nonce extension (id-pkix-ocsp-nonce) and handle appropriately.
      • Provide the ability to invalidate the CDN cache based on the OCSP URI and OCSP Key for revoke case.
      • Provide reporting on overall traffic and request plus the top 50 requested URIs.
      • Provide the ability to limit the size of the edge for ACLs.
      • Provide the ability to handle OCSP requests without HTTP Host headers.

    If the response for a requested cert is found in CDN cache, it'll be returned from the cache.

    If a response can't be found in cache, a request will be sent to origin server (Symantec OCSP responder) to retrieve the response and stored in cache for later lookup.

    Symantec built an OCSP responder to handle any cache miss requests.

    What is the Net Result?

    The result of our work is that we have become the fastest within the industry. When one adds together the average speeds of our competitors you can see how fast Symantec really is.  The other thing to note is not only is there a massive difference in speed but also a difference in regularity.  Certain days will have more or less demand on the OCSP infrastructure than others, but ultimately, Symantec’s speed is far more consistent that the wild ups and downs of other CAs trying to keep pace with the demands of a modern internet.

    OCSP_Performance_Chart_Jan2015_r2_1.jpg

    Do you want to go faster?

    If speed is important to your organization then why not consider using ECC SSL certificates?  The majority of SSL certificates used today are based on RSA, an aging algorithm.  ECC is the next generation; it uses tighter math and therefore runs more efficiently than RSA.  This allows a server to run more sessions with one company reporting a 46% drop in CPU utilization and a 7% improvement in server response times.  

    Please let us know what you think or if you have any questions.  You can reach out on Twitter or follow us on Facebook.


    0 0

    One of the most attractive and important aspects of the merger of NitroDesk and Symantec in May last year was the combining of our joint expertise to bring enterprise customers a powerful set of offerings that leverage key aspects of mobility and security from a vast array of components readily available within the Symantec portfolio. These include mobile application management, identity and access management, data loss prevention, encryption, threat protection and more.

    Since the acquisition, Symantec has been working continuously behind the scenes to make significant updates to NitroDesk TouchDown and the enterprise version, Symantec Work Mail. As a first step, greatly improving the user experience as well as adding advanced features for our enterprise customers, such as streamlining and automating enrollment for employees, has been at the top of our list.

    Now, I’m pleased to report, we are making some significant progress. Serious thought has been put into the overall Symantec Mobility Solutions path forward: where to make the investments, which aspects of the products to improve and the timeframes for those improvements. Our immediate focus is on the iOS platform and Android platform for TouchDown and Work Mail. Our development efforts started first on the iOS platform, which was severely lacking in enhancements, and will be followed by user experience updates to the flagship Android platform. We released maintenance updates for both TouchDown for iOS and Work Mail for iOS in Fall 2014. In the last month we released maintenance updates for the Android apps, and rolled out the redesign of the iOS Work Mail app. The redesign is planned for release on Android later this year.

    Blog: Secure Email is getting a new look

    Symantec Work Mail will continue to work hand-in-hand with Symantec Mobility: Suite to provide enterprises with a total mobility solution. Work Mail offers businesses extra controls and protection that can be managed and pre-configured through a central management console. Future enhancements to Work Mail will center on adding enterprise capabilities, such as integrations with other Symantec security products including Data Loss Prevention and Encryption. Work Mail works seamlessly with other Symantec productivity apps, offered now as Symantec Mobility: Workforce Apps, just released this week, to create a secure workflow for employees. With Workforce Apps, companies can manage secure email, web browser, and file management tools from a central application management console and delivered through an enterprise app store, to protect corporate information at the app and data level – regardless of whether the device is corporate owned or personally owned – so employees can be productive anytime, anywhere.

    Additionally, Symantec has streamlined the purchasing routes for NitroDesk customers and partners. Customers can purchase TouchDown directly through Symantec, with new service and maintenance options, or they can purchase Work Mail as part of the Symantec Mobility products through Symantec or a Symantec Partner. TouchDown will continue to be available for individual licenses through the Apple app store and Google Play store.

    Symantec continues to support TouchDown customers and welcomes organizations to explore Symantec’s offerings that connect secure email to our other secure productivity tools for the mobile worker and create a seamless virtual workspace. In the past six months, Symantec Mobility products have evolved and integrated into a single, comprehensive EMM solution that gives companies the freedom and flexibility to customize deployments to their needs. Incorporating this essential email app and enhancing on its enterprise capabilities has been an important step in progressing towards our product vision to be the leader in protecting corporate data on mobile devices.


    0 0

    Security researcher Hector Marco has discovered how to crash the Android stock email app by sending an email with a malformed header to the target. What’s worse, restarting the app only causes it to crash again as it attempts to download the malicious email. The vulnerability (CVE-2015-1574)—essentially a denial of service attack—prevents employees from accessing their email, a potential nightmare for the enterprise.

    It is enterprise IT’s job to ensure employees are not affected by such a bug. Allowing end users to use unapproved apps puts corporate information and users at risk. To solve the problem, IT must give users a secure alternative to the consumer apps they use to store and share content and files, while simultaneously ensuring that mobile users are productive and satisfied with the user experience.

    By wrapping 3rd-party productivity apps with a layer of enterprise-grade security that includes encryption, data loss prevention, and secure proxies for the safe transit of data from the corporate network to the apps, IT can ensure security. And because there are no changes to the source code, productivity and native app user experience remain untouched. Essentially, the apps become the foundation for a secure, protected workspace that provides a native app experience for end users.

    As a wrapped app, Symantec Work Mail* sidesteps the Android Native Email problem described above. In addition, it enhances productivity and user experience, with

    • Email/Contacts/Calendar in a single app, consistent across supported device platforms
    • Email will sync and receive push notifications when running in the background
    • Enable copy/paste of data and attachments into authorized apps

    Symantec™ Work Mail is included in the upcoming release of Symantec Mobility: Workforce Apps, a new offering that enables employees with secure apps for email, web, and content, without introducing security holes.  Workforce Apps offers a comprehensive set of policies for each app and can be managed from a central Mobility Manager console, giving IT a single pane of glass across apps and devices. 

    Workforce Apps.png

    0 0

    EMEA NetBackup Appliance Promotion Bundle

    To help our EMEA Channel Partners promoting the NetBackup appliances in non-NetBackup and competitve accounts, we announced early November of last year the EMEA NetBackup Appliance Promotion Bundle.

    This promotion bundle combines the NetBackup 7.6 software and the Appliance in a single SKU. Two appliance configurations are offered; 4TB and 14TB.

    The promotion remains valid until 6th July, 2015 and is only available through our EMEA Channel Parnters. Please make sure you take avantage of this promotion!

    For more information please download the promotion one-pager. Find it attached to this post.

    Ajan van Proosdij

    @arjanvp


    0 0

    Check out what's trending in the community

    続きを読む

    0 0

    New architectures for infrastructure transformation

    Customers report a turning point where infrastructure investment ROI is beginning to slow. More than half of typical budgets are consumed by infrastructure spending while headcounts are flat. And yet: data is growing, platforms are fragmenting and uptime expectations are off the charts. So what’s the answer?

    We believe it’s the information that matters most. We are indeed at a pivotal point in the industry, where architectures are shifting focus from infrastructure to information. And the NetBackup Appliance is an ideal example of how expertly rethinking traditional backup architecture yields completely new results. Veritas (the planned spinout of Symantec’s Information Management business) will enable organizations to harness the power of their information. Let’s look at how integrated appliances ultimately make information more available through simplicity.

    symantec_netbackup_3up_left[4]_0.jpeg

    NetBackup integrated appliances are designed from the ground up to protect and manage information, and carry the embedded intelligence of the world’s leading data protection software. This combination of intelligence and storage simplifies everything.

    -A single point of management for both storage and protection policies

    -Seamless use cases across multiple sites, servers or platforms

    -Scale up (to 229TB of usable capacity)

    -Embedded industry-leading Veritas Storage Foundation resiliency technologies

    -Strong performance both now and into the future.  An independent third party study reports that integrated NetBackup appliance architecture handily beats the legacy or small-scale offerings from Avamar, CommVault and Veeam1.

    Industry analysts are following this new converged backup architecture with great interest. Integrated appliances are the fastest growing appliance market segment and NetBackup leads that growth, with thousands deployed in the last year and well over ten thousand deployed overall. Customers are enthusiastically adopting this integrated approach because traditional stand-alone point products are iterations of the past. IT investment is shifting to modern approaches that minimize complexity and accommodate the future.

    For more technical discussions of the NetBackup 5330’s key capabilities, several recently published blog posts provide more details (here, here and here).

    1.Symantec NetBackup 7.6 Benchmark Comparison:  Data Protection in a Large-Scale Virtual Environment (Part 1), July 2014, A Principled Technologies Test Report. 


    0 0

    While the number of financial Trojan detections decreased in 2014, the threat was still considerable, as attackers moved to bypass newer security measures.

    続きを読む

    0 0

    Migrating and Upgrading to IT Management Suite 7.6

    Migration: A migration is when you install the latest version of the IT Management Suite solutions on a new server, and then migrate the data from the earlier ITMS solutions to the latest version of the application.

    Upgrade: An upgrade is when you install the latest version of ITMS on the same hardware, server operating system, and database.

    You must migrate the Notification Server 6.x or 7.0 data to either Notification Server 7.1 SP2 or Notification Server 7.5.

    After migrating the data, you must first upgrade to either ITMS 7.1 SP2 MP1.1 or ITMS 7.5 SP1 HF5 depending on the path you choose and then upgrade to ITMS 7.6.

    The following diagram gives an overview of the migration and upgrade process:

    MigrationInfoG_7.6.png

    You can use the following reference documents:

    Document ITMS Version Document ID
    Migration Guide NS 6.x to

    7.1 SP2

    7.5

    DOC4742

    DOC5668

    Migration Guide 7.0 to

    7.1 SP2

    7.5

    DOC4743

    DOC5669

    All product documents 7.1 SP2 7.1 SP2 Documents
    All product documents 7.5 DOC5131
    All product documents 7.5 SP1 DOC7440
    All product documents 7.6 DOC8146

    0 0
  • 03/03/15--04:07: Information Security News
  • Cybercrime costs @$455bn pa, fingerprint sensors at #MWC2015 & #GCHQ cyber summer school
    Todays #IS_News includes: Cybercrime costs @$455bn pa, fingerprint sensors at #MWC2015 & #GCHQ cyber summer school http://bit.ly/1BQU7en 
     
    Top IS tweet: “Cybercriminals phish iCloud credentials from victims of iPhone, iPad theft” – get the latest here: http://bit.ly/1DNJeYe #SymcSecurity
     
    Global News: Arab News examined the importance of technical training in improving the performance and productivity of employees and referenced Symantec technical training. 
     
    Security News:

    Misco Euro crime agency takes down banking botnet Ramnit. The European police agency's Cybercrime Centre, coordinating the operation, worked with investigators from the UK, Germany, Italy and the Netherlands, as well as technology companies Microsoft, Symantec and AnubisNetworks.

    Financial Times Obama seeks reboot of China cyber laws. US President Barack Obama has lashed out at new Chinese cyber security regulations, elevating the increasingly contentious issue to the top of the two countries’ bilateral agenda.

    Computer Weekly GCHQ opens applications for cyber security summer school. UK intelligence agency GCHQ is inviting applications to a 10-week cyber security summer school in an initiative to keep the UK safe and identify prospective recruits. According to the Cisco 2014 Annual Security Report, more than one million positions for information security professionals remain unfilled around the world.

    Computer Weekly Cyber crime: what every business needs to know. Ask anyone involved in fighting cyber crime on a daily basis about what businesses should know, and the first thing they will say is that no organisation is immune. The second most frequently raised point is that no business can afford to ignore cyber crime, which is estimated to cost the global economy around $445bn a year.

    Moblie News:

    Total Telecom Telco CEOs see urgent need for privacy, data security. Chief executives from some of Europe's biggest operators opened Mobile World Congress on Monday with an urgent call for policy makers to safeguard citizens' data privacy and digital security.

    BBC News Fingerprint sensor revealed by Qualcomm at MWC
    The Snapdragon Sense ID 3D Fingerprint Technology is the latest product from US chipmaker Qualcomm. The firm says its ultrasonic sound wave-based solution can scan through sweat, hand lotion and condensation. Experts say it has the potential to outclass Apple's Touch ID.

    Brought to you by the Information Security Channel Community. Join the community to join the conversation

    ISCCbanner_0.png


    0 0
  • 03/03/15--04:25: Information Management News
  • Todays #IM_News includes: Saving the Environment, Grocer investigates breach & barriers to ‘government cloud’

    Todays #IM_News includes: Saving the Environment, Grocer investigates breach & barriers to ‘government cloud’ http://bit.ly/1F4A4Gl

    Top IM tweet: @symantec NetBackup 5330: Designed for Resilience While Saving the Environment http://symc.ly/1zCHWKB  

    Data News

    Computer Weekly US retailer Natural Grocers investigates data breach. Natural Grocers is the latest US retailer to announce that is investigating a possible data breach involving customer payment cards. The seller of natural and organic food, which has 93 stores in 15 US states, said it is investigating a possible data breach involving an “unauthorised intrusion targeting limited customer payment data”.

    The Register ICANN switches off dot-word admin portal amid security leak scare. Confidential data on companies vying for new dot-word domains may have been snooped on by rivals logged into ICANN's catch-all portal – meaning commercially sensitive information as well as important technical details on the internet's expansion were at risk. The org has since taken the vulnerable web apps offline.

    Cloud News

    Out-Law  ‘Security and privacy’ issues main barrier to ‘government cloud’ deployment in EU. The European Union Agency for Network and Information Security (ENISA) said concerns about how sensitive data is protected in a cloud computing environment have not been resolved. It said data security and privacy issues were the main reasons that "deployment of governmental cloud computing is in general at a very early stage" in the EU.

    Brought to you by the Information Management Channel Community.  Join the community to join the conversation.

    IMCCbanner.png
     

    0 0

    Coming Soon...

    Get READY to Empower your people to solve bigger customer problems and Accelerate your market share...

    Screen Shot 2015-03-03 at 13.24.53.png


    0 0

    Slide1.jpg

    Wearables have once again stolen the show at Mobile World Congress this year, with refined functionality and vastly improving design.  Broader uptake and increased everyday usage will likely follow over the upcoming year.

    The increase in the number of wearable tech users and more significantly the number of manufacturers is creating a fresh BYOD security challenge that many enterprises are entirely unprepared for.

    Symantec's Frank Bunn spoke today on these risks, highlighting:

    • 52% of wearable tech does not have any privacy policy
    • 20% of login credentials are sent in clear text
    • Data from wearables apps contacts an average of 14 domains
    • 485 million wearable computing devices are expected to ship in 2018

    Click here to view the presentation.

    If you’re at Mobile World Congress in Barcelona this week, you can speak to Frank or another of our mobility experts at the Symantec booth in hall 5 D31.


    0 0

    The latest upgrade for 50x0 Appliances is here!

    I'm very pleased to announce that the next Release Updates for Deduplication Appliances is now available!

    NetBackup 5000/5020/5030 Deduplication Appliances 1.4.5 is the latest patch release and can be applied on top of 1.4.3.1 or 1.4.4.

    This cumulative release contains almost 900 fixes!

    It also includes the following new features:

    • Optimized Deduplication from PDDO to MSDP
    • Configurable Fibre Channel buffer size for replication
    • Agent Proliferations
    • 3rd Party Component Upgrades
    • Unique Message ID Support

    More information on this release can be found at the following links:

    NetBackup Deduplication Appliance 1.4.5 Patch (for NetBackup 5000, 5020, and 5030)
     http://symantec.com/docs/TECH224577

    NetBackup Deduplication Appliance version 1.4.5 Release Notes (for NetBackup 5000, 5020 and 5030)

     http://symantec.com/docs/DOC7661

    Documentation for NetBackup 5000/5020/5030 Deduplication Appliance version 1.4.5
     http://symantec.com/docs/DOC7662

    The latest information on all NetBackup Appliances can be found in the Late Breaking News document and on our Appliances landing page - have you bookmarked them yet?

    NetBackup 5xxx appliance series Late Breaking News
     http://symantec.com/docs/TECH145136
     Short link: http://bit.ly/APPLBN

    NetBackup Appliance Technical Support
     http://go.symantec.com/nba/

    connectsig14.png
    bit.ly/761LBN | APPLBN | 76LBN


    0 0

    When ITMS is upgraded to version 7.6, the pcAnywhere Solution management components will be removed. New installations of ITMS version 7.6 will not include pcAnywhere. As an alternative, Symantec has partnered with Bomgar to provide an enterprise class remote access solution with integration into the console. Symantec has decided to make this change to better align our technology with customer expectations by offering more robust remote access that supports the latest platforms and features such as support for Internet-roaming devices.

    Please see the attached FAQ for more details.


    0 0

    Feedback sur le Live launch webcast du 3 Mars 2015

    ITMS 7.6 (CMS 7.6, AMS 7.6, SMS 7.6)

    Nouveautés principales

    La nouvelle version 7.6 (nom de code Snowbird) intégre les nouvelles fonctionnalités suivantes:

    • CEM: Cloud Enablement Management pour les Macintosh (Gérer les macs over Internet/https)
    • CEM: Support de certificats externes, et du "load-balancer" F5
    • PXE: Support de multiples versions de PXE, cela peut être utile et nous éviter des refontes de preboot et le portage de systèmes mal supportés.

    Et remplacera la fonctionnalité suivante:

    • PC Anywhere, qui sera remplacée par la solution Bomgar. Mais il n'est pas clairement établi si cela est avec, ou sans coûts additionnels, qui sont très probables. Ceci ajoute toutefois des fonctionnalités intéressantes comme le contrôle de mobiles et "over Internet".

    Les améliorations d'interface incluent :

    • Agent health: Des meilleurs rapports pour gérer les agents "qui ne répondent plus", avec un bouton pour lancer un ping, individuellement... Dommage, on pouvait s'attendre à intégrer en standard un "ping" automatique pour distinguer automatiquement les machines avec agent "down", des machines "down". Cela reste possible via une requête "network inventory" et quelques configurations supplémentaires, avec quelques rapports adaptés. Me contacter au besoin.
    • Custom filters: On peut créer des filtres avec des colonnes configurables, exporter et "Oh extase", copier/coller la liste ! Enfin, retour de cette fonction 6.0, perdue depuis la 7.0 ! Mais j'ai peur que ce soit le seul endroit de la console qui tolère le copier/coller. Les autres éléments du "resource manager", les filtres, les rapports, "targets" et autres "web parts" restent probablement hermétiques au moindre Ctrl-C...
    • Target folders: On peut organiser les "cibles" dans des dossiers... C'est pour lister des nouveautés, sinon, cela ferait un peu pauvre !
    • ITA: une extension de IT analytic pour mieux rapporter sur les clients autres que Windows... no comment !

    Les extensions de packaging:

    • Application Streaming from file: La Suite Client Management inclus l'agent "Workspace streaming", et la distribution d'applications en mode "streaming" depuis un "file share". Ce qui étend la possibilité de "distribuer" une application "à la demande". Note: Le mode streaming permet de démarrer une application virtualisée sans attendre la fin de son téléchargement. Condition: re-packager les applications avec "Workspace virtualization".

    Les extensions des éléments supportés:

      Quelques écrans: http://bit.ly/SYMANTEC-ALTIRIS76

      Capture+plein+écran+03.03.2015+172714.bmp[1].jpg

      Conclusions

      A moins d'avoir à intégrer des Macs, aucun intérêt de se jeter sur cette version décevante à plus d'un titre. Mais dans un contexte où VERITAS quitte à nouveau Symantec, il est déjà heureux que la plate-forme Altiris ne se retrouve pas à plonger dans la faille au milieu de la scission, et que des mises à jour se poursuivent. Cela rassure. Altiris reste dans le giron sécurité de Symantec "IS".

      GHOST, le retour de la DS 6.9

      Enfin du très positif: La récupération de notre bonne vieille console DS 6.9 express, pour faire la nouvelle mouture codée GSS 3.0. Pour tous les utilisateurs de Ghost Solution Suite 2.5 et précédentes, vous pouvez y aller les yeux fermés, c'est du solide. On peut venir vous aider quand même un peu pour la phase d'apprivoisement. Nous sommes très nombreux à bien connaître cette console DS 6.x, quasi inchangée depuis plus de 10 ans. Quant à Ghost, c'est le même depuis plus de 20 ans (où je déployais des Windows For Workgroup 3.11... Bon passons, cela ne nous rajeunie pas :). Bien sûr, il a été mis à jour pour supporter les derniers OS et matériels.

      Capture+plein+écran+03.03.2015+171544.bmp[1].jpg

      Du nouveau pour les utilisateurs de GSS 2.5

      • PXE avec des "preboot" customisables, et un menu "initial deployment" (optionnel)
      • Une console enrichie, avec un support de multiples OS clients, une structure de dossiers pour organiser la console,
      • Des meilleures possibilités d'automatisations.

      Du nouveau pour les utilisateurs de DS 6.9 (Deployment Solution)

      • Ghost recovery Kit et Ghostcast server: ce ne sont pas vraiment des nouveautés, car disponibles sur la DS 6.9, mais en ligne de commande. Je suppose que cela est désormais intégré, et permettrait de supporter "enfin", le "multicasting" nativement via Ghost. Car il nous fallait utiliser Rdeploy pour cela, l'ancien outil d'imagerie de disques systèmes, avant le rachat par Symantec et l'intégration de Ghost. Heureusement, Symantec a eu l'intelligence de conserver Rdeploy en parallèle, pour une compatibilité ascendante; merci pour cela. A suivre, j'ai demandé l'accès à la beta disponible depuis ce jour ;-)
      • Dynamic Machine Groups: Cette option risque de faire basculer des (petits) clients CMS vers GSS. Car elle permet de faire exécuter un job à une "nouvelle" machine qui répond aux critères d'un "filtre" dynamique. Avec DS 6.9, nous étions obligé de scripter un "flag" pour éviter la répétition d'un job déjà réalisé, et de "scheduler" un job un à plusieurs fois par jour pour assurer un déploiement "pseudo dynamique". Car la DS 6.9 est orientée exécution, mais pas "policy" (politique). C'est justement le point fort de CMS sur DS 6.9, de pouvoir établir des polices de déploiement. La version CMS7.6 restera toutefois largement plus adaptée pour mettre en place des politiques (policies) de déploiement avec détection et optimisation des opérations de déploiement en masse. Si vous avez plusieurs milliers de poste à maintenir, CMS 7.6 est la bonne solution, DS6.9/GSS 3.0 n'y suffira pas. A suivre aussi sur la beta, et voir comment elle gère les machines "hors ligne" et remise en circuit "tardivement"...
      • no-cost database: Bonne nouvelle, l'installation inclura la mise en place d'un SQL express 2014, ce qui vous évitera de rater son installation initiale, faute d'avoir installé un serveur SQL avant... Attention d'activer la case à cocher "install MS SQL server 2014 Express" quand même ;-)

      Pour mémoire, cette solution restait supportée en parallèle de la version DS 7.5, car plus légère et simple à déployer, et à utiliser. Largement défendue par ses utilisateurs, ils ont rejetés massivement les versions "web" proposées depuis la DS 7.0, puis la DS 7.1, enfin la DS 7.5. Reste à savoir si nous allons pouvoir facilement conserver la possibilité d'installer un GSS 3.0 en lieu et place d'un DS 7.6, quand nous sommes possesseurs de la suite CMS 7.6 (Client Management). J'avais recommandé pour plusieurs clients en Suisse romande d'exploiter cette possibilité offerte avec bienveillance et intelligence par Symantec, de conserver la DS 6.9 avec CMS 7.x. Pour les possesseurs de la solution DS 7.x, c'était rédhibitoire, car d'utiliser la solution DS 6.9 permettait d'avoir le "remote control" et des inventaires basiques, qui étaient perdus en utilisant la version 7 "recommandée" par Symantec. Ces derniers ont permis l'intégration de PCanywhere dans DS 7.1 pour compenser la perte du "remote control", mais les "inventaires" restaient inexistants. Serrez les rangs, ce n'est pas gagné d'avance, et j'espère que Symantec ne fera pas la bêtise d'obliger les clients à "dégrader" leur CMS pour convertir en GSS, ou pire, demander le prix de nouvelles licences... A suivre, si vous avez un souci à ce sujet, me contacter SVP, le GUASF peut faire une action collective.

      Extension du support de:

      • MS SQL 2014
      • Extension des "hardware" UEFI 32 et 64 bits.
      • Serveurs Microsoft Windows 2012 R2,
      • Windows 8.1,
      • Mac OS X 10.10
      • WinPE et LinPE mis à jour (? mais avec laquelle)

      Quelques liens:

      Quelques espoirs

      Il faudra toutefois attendre 2016, pour voir apparaître le support multi-PXE pour GSS 3.0. A moins de faire appel à nos services, car en collaboration avec DMI-FR, nous avons déjà eu l'occasion d'intégrer chez plusieurs clients, des PXE multiples dans les bases installées DS 6.9. Il faut ensuite juste un script qui renomme 2 dossiers, pour chaque version de PXE à supporter. Et dire qu'il faudra encore un an à Symantec pour l'intégrer...

      Quelques craintes

      Pour le contrôle d'écran à distance, je ne sais pas comment cela va évoluer

      QUAND ?

      Capture+plein+écran+03.03.2015+175447.bmp[1].jpg

      Feedback ou question, me contacter SVP: Pascal.KOTTE@ICT-a.ch +41 79 309 28 86

      Conseiller numérique éthique indépendant: ITSM & Cloud computing, SaaS... Pour défendre les intérêts des acheteurs et usagers numériques: Keep It Smart, Simple, & Human centric. Envie de partager des points de vues, en français sur le "Cloud" ? Nous rejoindre sur CloudReady.ch.


    older | 1 | .... | 139 | 140 | (Page 141) | 142 | 143 | .... | 254 | newer