Sunteți pe pagina 1din 40

NERCOMP EVENT OSX and Mac Evolution

Protecting the Enterprise with Deep Freeze October 25, 2006

Jim Panopoulos
Director of Information Systems and Technology Bristol-Plymouth Regional Technical School District 940 County St. Taunton, MA. 02780

jpanopoulos@bptech.org 508.823.5151 x124


1

What we are talking about!


A unique method of disk protection to preserve the exact original standard system configuration while allowing the users flexibility to do their work. No matter what changes a user makes to a workstation, simply restart to eradicate all changes and reset the computer to its original state right down to the last byte. The result is consistent trouble-free computing and a dramatic increase in computer uptime

Managing Public Access and Corporate Workstations


Typically, there are two common approaches to managing public access and workplace workstations:

The lock-down approach


The reactionary approach.

Lock Down Approach

IT administrators commonly respond to technological issues with a restrictive defense:

Locking down computers prevents user mischief and defends against malware. Can place severe restrictions on the users technological environment. Does not maintain uniform configurations across labs or multi-user networks.

Reactionary Approach
If labs are not locked down, the IT staff is most likely using a reactionary approach to maintain security.

Dealing with computers on an individual basis Using re-imaging or rebuilding as a method of keeping computers uniform and protected. The problems with this approach are many, given the amount of time it takes for the rebuilding process, and the correlating downtime of the machine. This approach only deals with temporary symptoms of a problem, rather than addressing the cause.
5

IT issues? What IT issues


In education, a typical ratio of IT support staff to computers is often 1:500 As a result, IT staff would prefer to lock down the machines to prevent users from damaging the machines so they dont have to spend all their time rebuilding them. This means the IT staff can have more control over classroom policy than teachers do, because the IT staff does not want or does not have time to be constantly rebuilding workstations.
6

More issues

IT staff spend the majority of their time re-imaging and rebuilding machines to keep them up and running often on a daily or weekly basis. No time to make improvements to labs or work to troubleshoot and fix real issues. This results in technological demand outpacing support and help desk calls escalate beyond control. Did you ever think? Where will the next generation of programmers, IT staff, and computer scientists come from if current students are all locked out of various functions?

Typical IT Dept. day

Techs

Users

Network Engineers

IT Managers
8

Complaints & suggested solutions..(from users)

I had no problems until you guys fixed it Since you removed my AIM client. internet is really slow !

What do you mean I cant have a virtual fish tank ?


I never installed this program.. If I was fixing it. My cousin, knows everything on this stuff and he said.
9

Some think this is the answer

10

Another concept !

11

Non-Restrictive Technology Benefits .


Despite the endless variety of public access or corporate computer environments that exist, nonrestrictive technology is applicable to all of them. Students and employees always have the freedom to use workstations as they desire Fully protected against blended threats, but downtime and technical support costs are eliminated. Teachers and students are happy because they both see what they expect to see when they turn on a computer in the lab

12

(More)

Non-Restrictive Technology Benefits

Eliminates obstacles to initiate technology in learning Enhances computer performance by eliminating the need for most routine hard drive maintenance Ensures consistent configurations across an enterprise Users are given full access to computers without time consuming management restrictions Significantly lowers Total Cost of Ownership for technology assets because of a vast reduction in time and cost spent maintaining and rebuilding machines.

13

My weapon

Deep Freeze
14

Deep Freeze Benefits

Libraries and are among the most difficult public access environments to manage, and Deep Freeze allows IT professionals and reference staff to easily protect and preserve their workstations. Users enjoy an unrestricted environment to work in, while avoiding the frustration of downtime due to software conflicts, registry and operating system corruption, and lost network and Internet connections. Operating systems will not fragment or corrupt over time, as they would with policy based tools designed to restrict functionality.

15

More

Deep Freeze Benefits

Guarantees that expensive computer assets are kept running at 100%. It ensures uptime and productivity while drastically reducing support costs. There is no need to run cleaning tools to rid systems of viruses or spyware Deletes all malware on restart. Provides a complete security solution for multiple environments. It offers business resiliency because workstations are back up and running with a quick restart; even enterprise back-up systems dont offer that kind of resiliency in the face of malicious attack or system volume corruption.
16

More

Deep Freeze Benefits

Fewer support calls means increased productivity Fewer system problems and less downtime System stability means fewer IT support staff are required. Deep Freeze is a 100% effective security tool that removes any spyware, adware, keyloggers, or other information theft software from systems after each reboot. Fully compatible with your existing systems (applications, network utilities, etc.) Intel-Mac friendly and works with Apples Boot Camp

17

Who is running the show?

If you want to allow individual users to make permanent changes to a computer, you can create a Thawed partition. You can setup profiles to be saved locally on the Thawed partition. If you want roaming profiles, the profile data can be retained both on the server and on the Thawed partition. Make changes to your computers when you want to, not when you have to. You, not your users, make the choice when to apply system changes.

18

Deep Freeze flavors

Windows

Mac

19

The Basics of Deep Freeze


1-2-3: - set up your ideal operating environment - install Deep Freeze - maintain the ideal environment. Full reboot to restore - all changes eradicated on every reboot. Kernel-level driver loads when you start up the machine. No time delay or user-intervention required Not an imaging solution.

20

Why Deep Freeze on a Mac?

A simple solution to avoid OS corruption or unwanted changes. Open or controlled system - you decide. - Deep Freeze will protect either. Workstation-based - no excessive use of network bandwidth (as with re-imaging or server-based solutions.) No accidental or intentional admin-level tweaking without proper privileges.

21

Deep Freeze Mac 3.1

LANDesk Integration Enhanced ThawSpace capability Update Check feature Maintenance Scheduling Universal application Compatible with Mac OS X 10.3 and above Fully integrated with Apple Remote Desktop (ARD)

22

Deep Freeze Mac Assistant

The Deep Freeze Assistant can create unique installer packages.


All aspects of your Deep Freeze Mac deployment are able to be pre-configured before you install. Ideal for lab or classroom environments where different configurations are required.

Remember to set the boot state of your installation to Boot Thawed if you are working with ThawSpaces.
23

Deep Freeze Remote Installation

Deploy your unique installer packages via ARD or any other software deployment solution.
Schedule your deployment to occur at the ideal time.

24

Deep Freeze Manual Installation

Deploy your unique installer packages via disk or removable media.


Double-click on the installer package and follow the instructions. Reboot the machine.

25

Where Does the Deep Freeze Icon Appear?


The Deep Freeze bear icon is found on the Menu Bar (if configured.) Allows Log in as a Deep Freeze user to make changes to your configuration A blue icon means the computer is Frozen A red icon means the computer is Thawed
26

Boot Control

Deep Freeze Mac can control the boot condition of your workstations Choose from multiple options to reflect software behaviors (badge the Frozen partitions and show or hide program icon in the menu) Automatically restart on log out option
27

Frozen Drives

Choose which local drives/volumes you want Frozen and which you want Thawed.

28

Configure ThawSpaces
The common question: How do users save their work on a Frozen Mac?

ThawSpace allows data to be saved permanently across reboots on a Frozen system. ThawSpace can be user-based or global (accessible to all users.) ThawSpace size can be customized to your needs. Home folders cannot be mapped to a ThawSpace.

29

How Do ThawSpaces Appear?

ThawSpaces appear as removable media on screen.


Unmounted ThawSpaces will reappear upon log out or restart of the Mac (contents will be retained.)

30

Maintenance Scheduling

Deep Freeze Mac can specify the maintenance period to suit your needs. Automatically perform Apple Software Updates. Customizable warning for users. Disable keyboard and mouse during maintenance period to avoid user interference. Energy-saving Shutdown After Maintenance feature

31

Password Protection

Designate up to four Deep Freeze users, each with their own password. Add, edit or delete them either locally or through ARD tasks.

32

Uninstall Options

Uninstall must be done when the machine is Thawed.


Option to retain or delete any existing ThawSpaces. Retained ThawSpaces will reappear upon re-install of Deep Freeze Mac.

33

Management via Apple Remote Desktop

Use installed Deep Freeze-specific tasks to control Deep Freeze Mac remotely. All aspects of Deep Freeze Mac can be managed remotely. Choose the task, select a computer or group of computers and send it. Schedule tasks for ideal times. Tasks are usable in other desktop management solutions as well.
34

35

Bulletproof protection

Nobody has hacked my systems since I started using Deep Freeze Eliminated all issues with unsupervised computers and kids that would purposely trash the operating systems I would not purchase Antivirus software before I stopped my Deep Freeze maintenance contract Tech Support like I was their only customer. These guys come from the IT trenches with excellent documentation, technical white papers, and the development of free configuration tools.
36

My new title

Students are now

calling me
The computer Nazi

37

All this for how much?


http://faronics.com/html/calculator.asp?currency=USD&version=education

38

Retail cost

39

Sample CD & Contact info


I have asked Faronics for a sample CD for all in attendance today and they were happy to provide it.

Product Manager: Phone: E-mail:

David Anderson 1-800-943-6422 x4010 danderson@faronics.com

40

S-ar putea să vă placă și