Simplify IT Administration
As a business grows, managing the IT environment can become increasingly expensive and time consuming, especially using manual processes and one-at-a-time computer administration
- Regain control over your IT environment
- Reduce the time, cost and effort involved in lifecycle management
- Simplify administration of security management, asset management and software distribution
- Security management: Director gives you a comprehensive security solution that relieves the pressure on your IT staff and lets them focus on supporting a growing business.
- Asset management: Director gives you complete management of hardware assets (server, desktop, storage, switch, etc.), software license assets and asset contracts.
- Software distribution: Director makes software distribution and provisioning as fast, easy and efficient as possible.
Try IT Operations Director for Free
Features
Security Management: Policies
- Lets you define policies based on user group, organization, location and network segment
- Allows users to create policies that trigger mass software distribution
- Generates a variety of security focused reports, including “top offender” reports that prioritize security actions
- Microsoft Windows update control, which manages and distributes Windows Update patches to help protect computers
- Includes useful policies for:
- Software that is mandatory
- Software that is not allowed or authorized
- Patch levels
- Operating system security settings such as password restriction and firewall settings
- Antivirus software status
- Access services (remote desktop, shared folders, etc.)
- Printers
- External media access (USB devices, SD memory cards, etc.)
Security Management: User Operation Logs
- Logs the following user operations:
- Program execution or termination
- Email attachments
- Web and FTP access
- File access (create, delete, open, copy, rename, move, print)
- Operating system operation (boot, shutdown, logon, logoff)
- External media attach and detach
- Raises an event based on the defined log condition
- Reduces volume of data by only logging information that violates security policies
- Traces the user activity on an individual file
- Improved, more flexible information
- Allows operations log export
Security Management with Network Access Control
- Provides control over your network
- Enables computer block and quarantine
- Ensures unauthorized computers are kept off the network
- Denies network access to machines not managed by IT Operations Director
Asset Management
- Manages and stores contracts (type, start and end date, etc.) with related hardware and software
- Gives you the control you need to manage your assets in less time
- Helps you ensure compliance and reduce the ongoing headaches and worries so often attached to asset management
- Manages the following:
- Hardware assets (servers, desktops, storage, switch, etc.)
- Software license assets
- Asset contracts
- Registers assets in 4 ways:
- Discovery method
- Import by comma separated values (CSV) file
- Manual registration
- Integration with Hitachi IT Operations Analyzer
- Provides a simple process to import information about assets that are not connected to the network
- Manages and stores the contract information (type, start and end date, etc.) for each asset
- Provides a customizable asset form
- Updates assets status manually, by CSV import or by user report
- Tracks software licenses
- Aggregates total costs associated with asset purchase, lease, rental, support, etc., in quarterly, bi-annual or other increments
- Displays in a single screen:
- The number of licenses allowed per the current license agreement
- The number of licenses currently assigned
- Any surplus or overallocated licenses
Software Distribution
- Distributes software packages, including executables (MSI, EXE), compressed packages (ZIP) and scripts (BAT)
- Manages and distributes Windows patches with Windows Update control
- Installs software to multiple computers in one simple task
- Controls the distribution and installation of software from a central location
- Deploys software on client systems during specified times and for scheduled maintenance
- Ensures that software is deployed with consistency and end users have the latest software updates
Inventory Management
- Quickly inventories and lists all monitored computers
- Shows details for each computer: raised events, system information, hardware information and installed software
- Categorizes computers by type, network segment and more
- Powers on and off particular computers and supports sustainable IT policies
- Collects installed software information for each PC and server automatically
- NEW: Allows view of detailed printer status with printer monitoring
Remote Control
- Provides remote access control to computers
- Allows administrator to view exact same screen as client computer end user for more effective troubleshooting
- Enables remote repair without requiring desk-side visits
- Via active management technology (AMT) enables keyboard-video-mouse (KVM) for remote troubleshooting even when machine’s operating system is not running
Benefits
- Minimizes the risk of information disclosure by monitoring all computers automatically
- Speeds distribution of any software application, update or file, including antivirus software
- Proactively identifies risks by generating a wide array of reports and alerts
- Integrates easily with Active Directory to discover PCs
- Quickly discovers and tracks all assets, storing and organizing hardware and software details with related contracts
- Supports budget planning by aggregating total costs associated with asset purchase, lease, rental, support, etc., in quarterly, bi-annual or other increments
- Helps ensure compliance with software licenses, displaying license details in a single screen
- Reduces the time and resources required to discover, record and maintain IT asset inventories
- Saves time by efficiently managing software distribution and provisioning from a central location
- Saves time and money by allowing administrators to remotely troubleshoot and repair problems
- Protects the network from unauthorized and noncompliant computers