SAM and Security Matt Ward Softcat Head of ITAM Example Presentation Name
by user
Comments
Transcript
SAM and Security Matt Ward Softcat Head of ITAM Example Presentation Name
Example Presentation Name SAM and Security Matt Ward Softcat Head of ITAM Presentation Date Traditional barriers are moving • You need to know what you own otherwise how can you secure it. • Anti Virus • Firewalls • VPN/Tokens • Patch management • Software requests • People have done the basics/ maturity is improving in some regions • Security basics are a commodity Typical lifecycle for SAM Request Retire Approve People Process Product Upgrade Manage Purchase Deploy The new breed of SAM should Include Shadow IT • Multiple devices • Roaming profiles • VDI • Streaming • Smart phone • User based licensing • Cloud models So how do manage Shadow IT?….. Security • EDM • Open source code –vulnerabilities/ code audit • Cloud Monitoring- Content awareness • Commercially graded applications • Penetration testing The future • Security and compliance will merge more • Cloud and managed services will accelerate the need to secure and manage above the traditional SAM • User based model (1 user 50 devices) will see the need to control devices more if you are to stay in compliance. • SAM can improve security tools. • The two teams should work closely together.