Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Enterprise Desktop Management

Explanation of strategic decision to implement enterprise desktop management.

Mona Isaacs

on 3 August 2011

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Enterprise Desktop Management

Enterprise Desktop Management Why would we want to do something like this? IT just wants to take over the world! NOT REALLY... Here's the scoop... Let's take a look at a brief history of PC security. 10 years ago, a computer virus was usually the product of a smart mind in search of recognition.
Impress your friends
Win the heart of your lady
Get your name in the paper
Take down a few thousand computers and show off your talents Today, The problems are so pervasive, we have a whole new word for this malicious software. Malware Virus
Key logger
Trojan Now malware is perpetrated by crime syndicates, all over the world. Criminals, who want to go undetected while they search for information they can use to make money.
Social security numbers
Credit card numbers
Anything that will help them steal your money or your identity. How does this impact all of us? In 2010, IT had 350 virus-related housecalls. In addition, 20-30 laptops were dropped off every week. Most of these were faculty laptops. Every virus infestation takes 1 to 2 days to clean up. This relates to 2000 days of lost productivity per year. In addition to lost faculty and staff time, 70% of all desktop support workload is directly related to malware. PLUS...The university spends $43,000 a year for virus protection software. But there is no slowdown in sight. Time for a new strategy. We usually get infected via the Internet.
Hidden code on web pages
Innocent looking links in emails
Bits of code imbedded in places where we least expect them If we are logged in to the local computer with administrative rights, the malware gets loaded and we are none the wiser... Remember their goal is to be undetected. Without administrator rights, most malware can't be loaded to your computer. Stopping the infection before it gets started. It shouldn't be IT's job to tell you what software you can install to do your job. But it should be our responsibility to make sure the software you install is clean. The Overall Goal is: A proactive model for desktop support:

Keep PC's running as smoothly as possible
Protect users
Protect data
Reduce computer down time
Reduce resources necessary to combat malware At least until the computer is so infested it begins to show performance problems. What is this? Today, IT interacts with and supports over 4000 computers... ONE AT A TIME If one breaks, we fix it... If one gets a virus, we fix it... If 500 computers need an updated printer driver, we update 500 printer drivers... Enterprise Desktop Management is a proactive strategy for managing a large fleet of computers. In general, it is a holistic way to distribute software and updates and keep PC’s running smoothly. Today, as a user, it is your responsibility to keep your software up to date. If Adobe tells you there is an update... You download it and update it....OR NOT A security patch comes out for Windows... Anti-virus updates... The new version of Microsoft Office... These decisions take place every day; and every decision impacts the performance of your computer, for good, or bad. These decisions also impact the security of your computer, the data on your computer, and your identity.
Full transcript