際際滷

際際滷Share a Scribd company logo
     The technology........
AppSense Management Suite
AppSense Management SuitePolicy and Personalization ManagementApplication EntitlementResource Entitlement
Personalization and Policy Management Provide the best user experience across all delivery mechanisms
Ensure the fastest user logon and desktop set up times
Eliminate profile corruption and support calls
Reduce time spent maintaining the user environment Personalization StreamingReduce logon times by streaming user personalization settings throughout their session on demand.Application-Level Personalization Personalization settings are managed and streamed on a per application basis.  Applications can now be upgraded or swapped out with no impact to the user.OS and Application Feature LockdownUsing an intuitive spytool feature, items such as menus, application features and network access can be disabled or removed within minutes without the need for intensive scripting or registry hacking.  User Profile MigrationEnable rapid desktop migrations by moving users to new delivery mechanisms without having to recreate personalization settings.
Personalization AnalysisInteractive reports and graphs provide visibility into personalization activity across the enterprise.  Personalization analysis identifies trends, showing how often applications are personalized.Personalization RollbackReduce support costs, time to repair damaged profiles and preserve user personalization settings by rolling back to a previous known good profile on a per application or user basis.  Offline ModePersonalization data is stored in a virtual cache within the users desktop and remains available to disconnected users. The user now has a fully portable, follow-me personality, which is re-synchronized with the latest, centralized settings when the user comes back online.
Rules and ActionsDefine events that are used to implement business policies. Rule examples include when user X logs on to the desktop with an IP address of Y, when a user opens an application named Y or for complete flexible control, any combination of multiple conditions.  Actions resulting from these rules include file, folder, registry, ADM, drive and printer mappings.油Self HealingAutomatically self heal files, folders, registry keys, services and processes, application and system components in real time to prevent user introduced changes or actions from compromising system integrity. AppSense Configuration TemplatesAppSense Environment Manager is able to import an unlimited number of configuration files and use these policies in combination.  A selection of Configuration Templates, such as default Outlook Profile, MS Office feature lockdown and XP Control Panel Item Removal are available from www.myappsense.com.  This Template Library is maintained and updated frequently.
Application EntitlementProtect the environment from unauthorised applications and code
Reduce the need to maintain, re-build or re-image
Eliminate time consuming lists and scripts
Ensure compliance with Microsoft licensingTrusted Ownership 	Protect the system without complex lists and constant management. Only code installed and owned by trusted owners is allowed to execute.  The trusted owners list can be extended to suit any environment or content directory infrastructure.油End Point Analysis 	Identify all executable files on a target device and quickly group the files into authorized and unauthorized.  Configurations can be deployed to a user, group of users, machine, group of machines.油	Application Network Access Control	Control network access without complex controls such as routers, switches and firewalls. Connections include access to UNC paths (including all files & folders on that drive), servers, IP addresses, URLs, devices & FTP locations.   Policy can be tailored to dynamically change based on user or device properties.
Passive Monitoring	Monitor application usage without preventing users from running applications. Passive monitoring can be managed on a per user, device or group basis, providing an extremely useful tool to accurately track user behavior prior to implementation or to understand application usage for software license management.Digital Signatures	Assign SHA-1 digital signatures to applications and files to ensure application integrity.  Modified or spoofed applications are prevented from executing.  White & Black List Configurations	Lists can be used in conjunction with Trusted Ownership to control known applications which pass the NTFS owner check such as administrator owned tools like cmd or ftp.  Or, create white lists to guarantee only known and trusted applications can execute on a system.
Self Authorizing UsersUsers can authorize their own applications without relying on IT.  An audit details information such as application name, time and date of execution and device.  A copy of the application can be taken and stored centrally for examination.Application Limits & Time Restrictions	Control the number of application instances and at what times it can be run.  Also enforce licensing models by controlling application access on a per device basis.Extensive File Support	In addition to controlling .exe files, scripts, batch and registry files are also controlled.  Digital signatures can also be applied to scripts to ensure content remains unaltered.油AppSense Configuration TemplatesTake full advantage of pre-built corporate policy best practice by importing AppSense Configuration Templates.油 AppSense Application Manager is able to import an unlimited number of configuration files and use these in combination.油 A selection of templates such as common prohibited items or End Point Analysis is available from www.myappsense.com.油 This Template Library is maintained and updated frequently.
System Resource Entitlement Ensure a optimal and consistentquality of service
Application response times are optimized according to business policy
Dramatically increase server capacity, number of users and applications
Significantly reduce per user TCO	Disk I/O Resource Management	Prevent I/O Request Packet (IRP) bottlenecks from impacting critical applications by dynamically prioritizing IRPs. Named applications have priority disk access, preventing them being held in a queue behind less important application IRPs.CPU Smart SchedulerAllocate CPU resource  to applications by assigning a relative share to the user or application. For instance, an application assigned a share factor higher than another application will receive higher priority access to the CPU when there is contention.	Thread ThrottlingCPU thread throttling policies will automatically trigger when the system is heavily loaded and apply gradual throttling to any runaway threads within each process.Physical Memory ControlAutomatically trim physical memory consumption based on application events and states, such as application startup, idle, minimized and in the background.  Releasing RAM back to the operating system enables a significant increase in user density or application instances.
	Virtual Memory OptimizationOptimizing the way Dynamic Link Libraries (DLLs) are loaded reduces virtual memory overheads and system paging is significantly reduced. Optimized DLLs are stored in a separate cache and loaded dynamically, leaving the original applications intact.	Virtual Memory LimitsUser memory limits restrict the amount of virtual memory utilized. Users can be warned, or prevented from launching additional applications. Application memory limits can also be applied to individual applications giving greater control over virtual memory consumption.	CPU Application Limits	Define hard processor limits to control an applications access to the CPU. For example, an application limit of 70% ensures it cannot use more than 70% of the CPU.	CPU Reservations	Ensure applications are guaranteed CPU resource.  For example, an application allocated 20% of CPU will get priority access to the CPU while it is using 20% or less of the CPU.
Processor Affinity Assignment	On multiprocessor systems policies can bind specific users and applications to processors allowing mission critical applications to run exclusively on a dedicated CPU.Statistical Analysis and Reporting	Report on CPU, Memory and Disk usage at the process level on a per user or application basis. Tabular reports and graphs are used to report on defined events to show resource consumption and optimization. AppSense Configuration Templates 	Take full advantage of pre-built corporate policy best practice by importing AppSense Configuration Templates.  AppSense Performance Manager is able to import an unlimited number of resource policy configuration policies and use these policies in combination. A selection of Policy Templates, such as BoostOffice to prioritize resources to the MS Office application set, is available from www.myappsense.com.  This Template Library is maintained and updated frequently.
	Managing The User EnvironmentProven enterprise scalabilityCentralized management of user environmentProvides visibility in the user environmentEnsure continuous communication and fail over  capabilities

More Related Content

What's hot (20)

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Jeff Fisher
Maximizing Virtualization ROI
Maximizing Virtualization ROIMaximizing Virtualization ROI
Maximizing Virtualization ROI
stanyarbrough
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
C/D/H Technology Consultants
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
ebuc
Installation
InstallationInstallation
Installation
Chuan Ha Quang
SWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaSSWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaS
webhostingguy
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
Tech_MX
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
none
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
fannaq786
SCCM 2007 Presentation
SCCM 2007 PresentationSCCM 2007 Presentation
SCCM 2007 Presentation
Faisal Alvi [MCTS]
Virtualization 360 - Westcoast
Virtualization 360 - WestcoastVirtualization 360 - Westcoast
Virtualization 360 - Westcoast
butest
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
solarisyourep
Client Server Computing 際際滷s by Puja Dhar
Client Server Computing 際際滷s by Puja DharClient Server Computing 際際滷s by Puja Dhar
Client Server Computing 際際滷s by Puja Dhar
puja_dhar
FlexNet Operations
FlexNet OperationsFlexNet Operations
FlexNet Operations
Flexera
VersaFleet SaaS 際際滷s
VersaFleet SaaS 際際滷sVersaFleet SaaS 際際滷s
VersaFleet SaaS 際際滷s
Sypher Labs
HP OM
HP OMHP OM
HP OM
iWare Logic Technologies Pvt. Ltd.
V Mware Desktop Virtualization
V Mware   Desktop VirtualizationV Mware   Desktop Virtualization
V Mware Desktop Virtualization
hypknight
Unified Recovery Management
Unified Recovery ManagementUnified Recovery Management
Unified Recovery Management
IBM
Managing FlexCast Delivery with the RES Dynamic Desktop Studio
Managing FlexCast Delivery with the RES Dynamic Desktop StudioManaging FlexCast Delivery with the RES Dynamic Desktop Studio
Managing FlexCast Delivery with the RES Dynamic Desktop Studio
Jeff Fisher
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Unifying Windows Client and Microsoft Desktop Virtualization Deployments with...
Jeff Fisher
Maximizing Virtualization ROI
Maximizing Virtualization ROIMaximizing Virtualization ROI
Maximizing Virtualization ROI
stanyarbrough
System Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device ManagementSystem Center Configuration Manager and Mobile Device Management
System Center Configuration Manager and Mobile Device Management
C/D/H Technology Consultants
Sccm 2012
Sccm 2012Sccm 2012
Sccm 2012
ebuc
SWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaSSWsoft Hosting Solutions for SaaS
SWsoft Hosting Solutions for SaaS
webhostingguy
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
Tech_MX
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
none
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
fannaq786
Virtualization 360 - Westcoast
Virtualization 360 - WestcoastVirtualization 360 - Westcoast
Virtualization 360 - Westcoast
butest
V mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentationV mware thin app 4.5 customer presentation
V mware thin app 4.5 customer presentation
solarisyourep
Client Server Computing 際際滷s by Puja Dhar
Client Server Computing 際際滷s by Puja DharClient Server Computing 際際滷s by Puja Dhar
Client Server Computing 際際滷s by Puja Dhar
puja_dhar
FlexNet Operations
FlexNet OperationsFlexNet Operations
FlexNet Operations
Flexera
VersaFleet SaaS 際際滷s
VersaFleet SaaS 際際滷sVersaFleet SaaS 際際滷s
VersaFleet SaaS 際際滷s
Sypher Labs
V Mware Desktop Virtualization
V Mware   Desktop VirtualizationV Mware   Desktop Virtualization
V Mware Desktop Virtualization
hypknight
Unified Recovery Management
Unified Recovery ManagementUnified Recovery Management
Unified Recovery Management
IBM
Managing FlexCast Delivery with the RES Dynamic Desktop Studio
Managing FlexCast Delivery with the RES Dynamic Desktop StudioManaging FlexCast Delivery with the RES Dynamic Desktop Studio
Managing FlexCast Delivery with the RES Dynamic Desktop Studio
Jeff Fisher

Similar to AppSense Product Deck (20)

Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
NCS Computech Ltd.
What features should your Automation Change Management software have?
What features should your Automation Change Management software have?What features should your Automation Change Management software have?
What features should your Automation Change Management software have?
MDT Software
Workflow Manager Datasheet
Workflow Manager DatasheetWorkflow Manager Datasheet
Workflow Manager Datasheet
Flexera
Emerging IT Trends and Innovation Concepts.pptx
Emerging IT Trends and Innovation Concepts.pptxEmerging IT Trends and Innovation Concepts.pptx
Emerging IT Trends and Innovation Concepts.pptx
Roshni814224
Best Out of the Box LIMS for Your LAB
Best Out of the Box LIMS for Your LABBest Out of the Box LIMS for Your LAB
Best Out of the Box LIMS for Your LAB
Agaram Technologies
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
Agaram Technologies
Flexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera Software App Portal Datasheet
Flexera Software App Portal Datasheet
Flexera
Introduction to DevOps
Introduction to DevOpsIntroduction to DevOps
Introduction to DevOps
Abhishek Srivastava
InfrastructureDevOps.pptx it is most sui
InfrastructureDevOps.pptx it is most suiInfrastructureDevOps.pptx it is most sui
InfrastructureDevOps.pptx it is most sui
pmishra37
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or Sale
Mike Taylor
JEE Technology Concepts in Details for web development.pptx
JEE Technology Concepts in Details for web development.pptxJEE Technology Concepts in Details for web development.pptx
JEE Technology Concepts in Details for web development.pptx
Mithun DSouza
(2011 10) rug - san ramon - autonomics and modernization
(2011 10) rug - san ramon - autonomics and modernization(2011 10) rug - san ramon - autonomics and modernization
(2011 10) rug - san ramon - autonomics and modernization
evgeni77
Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server Computing
Haseeb Rehman
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
Flexera
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
vivek shah
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based Workflow
Larry Suarez
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
Trihedral
Feasibility Study Template for Electronic Software Distribution
Feasibility Study Template for Electronic Software DistributionFeasibility Study Template for Electronic Software Distribution
Feasibility Study Template for Electronic Software Distribution
Flevy.com Best Practices
TEM Glossary
TEM GlossaryTEM Glossary
TEM Glossary
Valentine Wats
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
NCS Computech Ltd.
What features should your Automation Change Management software have?
What features should your Automation Change Management software have?What features should your Automation Change Management software have?
What features should your Automation Change Management software have?
MDT Software
Workflow Manager Datasheet
Workflow Manager DatasheetWorkflow Manager Datasheet
Workflow Manager Datasheet
Flexera
Emerging IT Trends and Innovation Concepts.pptx
Emerging IT Trends and Innovation Concepts.pptxEmerging IT Trends and Innovation Concepts.pptx
Emerging IT Trends and Innovation Concepts.pptx
Roshni814224
Best Out of the Box LIMS for Your LAB
Best Out of the Box LIMS for Your LABBest Out of the Box LIMS for Your LAB
Best Out of the Box LIMS for Your LAB
Agaram Technologies
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdfHOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
HOW-CLOUD-IMPLEMENTATION-CAN-ENSURE-MAXIMUM-ROI.pdf
Agaram Technologies
Flexera Software App Portal Datasheet
Flexera Software App Portal DatasheetFlexera Software App Portal Datasheet
Flexera Software App Portal Datasheet
Flexera
InfrastructureDevOps.pptx it is most sui
InfrastructureDevOps.pptx it is most suiInfrastructureDevOps.pptx it is most sui
InfrastructureDevOps.pptx it is most sui
pmishra37
Web Based Application for Rent or Sale
Web Based Application for Rent or SaleWeb Based Application for Rent or Sale
Web Based Application for Rent or Sale
Mike Taylor
JEE Technology Concepts in Details for web development.pptx
JEE Technology Concepts in Details for web development.pptxJEE Technology Concepts in Details for web development.pptx
JEE Technology Concepts in Details for web development.pptx
Mithun DSouza
(2011 10) rug - san ramon - autonomics and modernization
(2011 10) rug - san ramon - autonomics and modernization(2011 10) rug - san ramon - autonomics and modernization
(2011 10) rug - san ramon - autonomics and modernization
evgeni77
Distributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server ComputingDistributed Software Engineering with Client-Server Computing
Distributed Software Engineering with Client-Server Computing
Haseeb Rehman
FlexNet Manager Suite Cloud
FlexNet Manager Suite CloudFlexNet Manager Suite Cloud
FlexNet Manager Suite Cloud
Flexera
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
vivek shah
Agent-Based Workflow
Agent-Based WorkflowAgent-Based Workflow
Agent-Based Workflow
Larry Suarez
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
Trihedral
Feasibility Study Template for Electronic Software Distribution
Feasibility Study Template for Electronic Software DistributionFeasibility Study Template for Electronic Software Distribution
Feasibility Study Template for Electronic Software Distribution
Flevy.com Best Practices

AppSense Product Deck

  • 1. The technology........
  • 3. AppSense Management SuitePolicy and Personalization ManagementApplication EntitlementResource Entitlement
  • 4. Personalization and Policy Management Provide the best user experience across all delivery mechanisms
  • 5. Ensure the fastest user logon and desktop set up times
  • 6. Eliminate profile corruption and support calls
  • 7. Reduce time spent maintaining the user environment Personalization StreamingReduce logon times by streaming user personalization settings throughout their session on demand.Application-Level Personalization Personalization settings are managed and streamed on a per application basis. Applications can now be upgraded or swapped out with no impact to the user.OS and Application Feature LockdownUsing an intuitive spytool feature, items such as menus, application features and network access can be disabled or removed within minutes without the need for intensive scripting or registry hacking. User Profile MigrationEnable rapid desktop migrations by moving users to new delivery mechanisms without having to recreate personalization settings.
  • 8. Personalization AnalysisInteractive reports and graphs provide visibility into personalization activity across the enterprise. Personalization analysis identifies trends, showing how often applications are personalized.Personalization RollbackReduce support costs, time to repair damaged profiles and preserve user personalization settings by rolling back to a previous known good profile on a per application or user basis. Offline ModePersonalization data is stored in a virtual cache within the users desktop and remains available to disconnected users. The user now has a fully portable, follow-me personality, which is re-synchronized with the latest, centralized settings when the user comes back online.
  • 9. Rules and ActionsDefine events that are used to implement business policies. Rule examples include when user X logs on to the desktop with an IP address of Y, when a user opens an application named Y or for complete flexible control, any combination of multiple conditions. Actions resulting from these rules include file, folder, registry, ADM, drive and printer mappings.油Self HealingAutomatically self heal files, folders, registry keys, services and processes, application and system components in real time to prevent user introduced changes or actions from compromising system integrity. AppSense Configuration TemplatesAppSense Environment Manager is able to import an unlimited number of configuration files and use these policies in combination. A selection of Configuration Templates, such as default Outlook Profile, MS Office feature lockdown and XP Control Panel Item Removal are available from www.myappsense.com. This Template Library is maintained and updated frequently.
  • 10. Application EntitlementProtect the environment from unauthorised applications and code
  • 11. Reduce the need to maintain, re-build or re-image
  • 12. Eliminate time consuming lists and scripts
  • 13. Ensure compliance with Microsoft licensingTrusted Ownership Protect the system without complex lists and constant management. Only code installed and owned by trusted owners is allowed to execute. The trusted owners list can be extended to suit any environment or content directory infrastructure.油End Point Analysis Identify all executable files on a target device and quickly group the files into authorized and unauthorized. Configurations can be deployed to a user, group of users, machine, group of machines.油 Application Network Access Control Control network access without complex controls such as routers, switches and firewalls. Connections include access to UNC paths (including all files & folders on that drive), servers, IP addresses, URLs, devices & FTP locations. Policy can be tailored to dynamically change based on user or device properties.
  • 14. Passive Monitoring Monitor application usage without preventing users from running applications. Passive monitoring can be managed on a per user, device or group basis, providing an extremely useful tool to accurately track user behavior prior to implementation or to understand application usage for software license management.Digital Signatures Assign SHA-1 digital signatures to applications and files to ensure application integrity. Modified or spoofed applications are prevented from executing. White & Black List Configurations Lists can be used in conjunction with Trusted Ownership to control known applications which pass the NTFS owner check such as administrator owned tools like cmd or ftp. Or, create white lists to guarantee only known and trusted applications can execute on a system.
  • 15. Self Authorizing UsersUsers can authorize their own applications without relying on IT. An audit details information such as application name, time and date of execution and device. A copy of the application can be taken and stored centrally for examination.Application Limits & Time Restrictions Control the number of application instances and at what times it can be run. Also enforce licensing models by controlling application access on a per device basis.Extensive File Support In addition to controlling .exe files, scripts, batch and registry files are also controlled. Digital signatures can also be applied to scripts to ensure content remains unaltered.油AppSense Configuration TemplatesTake full advantage of pre-built corporate policy best practice by importing AppSense Configuration Templates.油 AppSense Application Manager is able to import an unlimited number of configuration files and use these in combination.油 A selection of templates such as common prohibited items or End Point Analysis is available from www.myappsense.com.油 This Template Library is maintained and updated frequently.
  • 16. System Resource Entitlement Ensure a optimal and consistentquality of service
  • 17. Application response times are optimized according to business policy
  • 18. Dramatically increase server capacity, number of users and applications
  • 19. Significantly reduce per user TCO Disk I/O Resource Management Prevent I/O Request Packet (IRP) bottlenecks from impacting critical applications by dynamically prioritizing IRPs. Named applications have priority disk access, preventing them being held in a queue behind less important application IRPs.CPU Smart SchedulerAllocate CPU resource to applications by assigning a relative share to the user or application. For instance, an application assigned a share factor higher than another application will receive higher priority access to the CPU when there is contention. Thread ThrottlingCPU thread throttling policies will automatically trigger when the system is heavily loaded and apply gradual throttling to any runaway threads within each process.Physical Memory ControlAutomatically trim physical memory consumption based on application events and states, such as application startup, idle, minimized and in the background. Releasing RAM back to the operating system enables a significant increase in user density or application instances.
  • 20. Virtual Memory OptimizationOptimizing the way Dynamic Link Libraries (DLLs) are loaded reduces virtual memory overheads and system paging is significantly reduced. Optimized DLLs are stored in a separate cache and loaded dynamically, leaving the original applications intact. Virtual Memory LimitsUser memory limits restrict the amount of virtual memory utilized. Users can be warned, or prevented from launching additional applications. Application memory limits can also be applied to individual applications giving greater control over virtual memory consumption. CPU Application Limits Define hard processor limits to control an applications access to the CPU. For example, an application limit of 70% ensures it cannot use more than 70% of the CPU. CPU Reservations Ensure applications are guaranteed CPU resource. For example, an application allocated 20% of CPU will get priority access to the CPU while it is using 20% or less of the CPU.
  • 21. Processor Affinity Assignment On multiprocessor systems policies can bind specific users and applications to processors allowing mission critical applications to run exclusively on a dedicated CPU.Statistical Analysis and Reporting Report on CPU, Memory and Disk usage at the process level on a per user or application basis. Tabular reports and graphs are used to report on defined events to show resource consumption and optimization. AppSense Configuration Templates Take full advantage of pre-built corporate policy best practice by importing AppSense Configuration Templates. AppSense Performance Manager is able to import an unlimited number of resource policy configuration policies and use these policies in combination. A selection of Policy Templates, such as BoostOffice to prioritize resources to the MS Office application set, is available from www.myappsense.com. This Template Library is maintained and updated frequently.
  • 22. Managing The User EnvironmentProven enterprise scalabilityCentralized management of user environmentProvides visibility in the user environmentEnsure continuous communication and fail over capabilities
  • 23. Active Directory Authentication Tight integration with existing Microsoft Active Directory ensures all managed devices are authenticated before communications are established.油Client Communications Agent (CCA) The CCA securely handles all communications between device and Management Server, adding the device to the correct deployment group, managing package installations and collecting and transferring audit data. Automatic Client Registration New devices automatically registers itself with the Management Server via the CCA. The properties of the device are used to automatically add it to the correct deployment group and automatically deploy the correct policy.油 Reporting An interactive set of reports are used monitor and audit user environment actions. Flexible options enable customization to show specific information, enabling forward planning and a move away from a reactive management approach.
  • 24. Role-based Access Control Granular control of access rights on all objects such as deployment groups, packages, reports and alerts. Management Server Administrative users can be granted different access rights to each object on a per user or group basis. Secure Web-based Communications Built on WinHTTP, BITS and IIS technologies, data transfer and communications between the Management Server and device are securely managed across HTTPS or HTTP protocols.Watchdog Agent Should an AppSense agent stop unexpectedly or become unstable, the Watchdog will automatically audit the detected error and if configured, raise and alert and take corrective actions to restart the agent.
  • 25. Configuration Check-out Process Support multiple administrators simultaneously opening or editing configurations. Once an administrator is granted access (via role based access control), already open configurations can be opened as read only. Metadata tags can be added as a description to a configuration.Management Server Configuration The Management Server installation provides the configuration of the Microsoft IIS and SQL Server. If configuration conflict arises during configuration, repair functions are presented. Support reports can be generated for AppSense Technical Services to initiate your case.Failover Support The CCA supports multiple Management Server URLs. Should the link to the current Management Server fail, the CCA will re-connect to a different server allowing for full failover support and continue communications between the end point and the Management Center.
  • 26. User environment management SolutionAppSense Management SuiteAppSense user environment managementPolicy and PersonalizationManagementConsistent and contextual user environmentProtected user environmentApplication EntitlementResource EntitlementResponsive user environment
  • 27. Potential Cost Reduction in Your Citrix EnvironmentPersonalization and Policy ManagementFaster user logon timesReduce profile corruption & support call remediationCut time spent maintaining the environmentApplication Entitlement
  • 28. Eliminate need to re-image and re-build
  • 29. Replace costly, time consuming lists and scripts
  • 30. Reduce Microsoft application licence requirements
  • 32. More users per server / server consolidation
  • 33. Improved quality of service / prevent server lockups
  • 34. Extend hardware lifecycleContact Info:Jason McGeoughRegional ManagerJason.McGeough@appsense.com

Editor's Notes

  • #22: During good times, cost reduction is not always top of mind for many organizations. However, during economic downturn or recessions, we hear the request to do more with less from management way more frequently. Many Citrix customers are not aware of the optional cost savings that you have within your environments today. Cost savings will vary from organization to organization, but I can safely assume that many of you in the audience have opportunity to save your company money through infrastructure cost savings, improved automation and management, user productivity savings, and IT staff efficiencies. Here are just a few cost savings associated with user environment management. Faster logon times Reduce profile corruption Fewer gold images to manage Avoid unused licenses Increase the number of Citrix users per server Avoid support and end user impact for server lockup issues(70-90 seconds)