SlideShare une entreprise Scribd logo
1  sur  35
Making Operational IT Strategic: Special Edition for Education CIOs
Introductions Javier EsteveIT Service Management LeaderKaseya Anthony JulianoCTO & General PartnerLandmark Ventures
Agenda Strategy within Educational IT Operational IT: Shifting the balance Best Practices: Gaining strategic influence using Kaseya
Strategy in Education IT IT in the business ties to the “product” That doesn’t map to Education IT Operations are all that’s left
How IT becomes strategic in “Business” Better IT means faster time to market for product development  Flexible architecture More responsive processes & streamlined systems IT fosters product innovation Out innovate the competition Latest and greatest internet Web 2.0, mobile, social, etc IT is responsible for ‘brand’ protection + enhancement Governance / compliance automation Uptime/Reliability of service IT’s operational metrics tie to business metrics i.e. Website traffic as it relates to customer experience Or Cost of a trade transaction going through the system faster IT enables end user and sales force productivity An enterprise app that makes end-users do their job faster Enabling mobile means sales can close more deals
Business ≠ Education Administrators want CIOs to keep computers running Time to Market isn’t measurable  Budget is driven by politics and always is constrained Multiple stakeholders: too many cooks in the kitchen Product is a ‘well rounded student’ – much harder to measure than $$$ Generated
So how do you apply “Business IT” to “Education IT”? Goal #1:  Improve Time to Market & Innovate Your Product i.e. Don’t let IT Service be a bottleneck Support your teachers’ paths to innovation – new devices, new learning software packages, etc Create initiatives that foster additional ways to reach students (online learning, ubiquitous computing, etc) Engage students in IT Service/Support to teach them the trade
So how do you apply “Business IT” to “Education IT”? Goal #2:  Protect your brand by tying operational metrics to business metrics Don’t show up in the newspaper (keep operational budgets low, prevent visible outages, protect students from ‘big bad internet’ Establish baselines of metrics on operational costs and publish how you’re driving them down Keep constant control of the environment across every endpoint and use those metrics to understand the impact on education
So how do you apply “Business IT” to “Education IT”? Goal #3:  Improve End User and Sales Productivity “Hug” your end-users – make them happy by improving service levels Have them help you sell what you’re doing! Make the Invisible become Visible (and vice versa) Become ‘Proactive’ to Shift the Balance
Operational IT: shifting the balance
Operational IT works along 2 lines Preventative vs. Responsive Visible vs. Invisible
Preventative vs. Responsive Preventative Patch management Password changes Diagnostics Asset lifecycle management Datacenter moves Domain changes  Responsive Disk space Broken applications Malware Connectivity Widespread viruses Natural disasters
Visible vs. Invisible Invisible Patch management Password changes Diagnostics Asset lifecycle management Datacenter moves Visible Installing software Upgrades New devices/printers/machines Connectivity Performance Domain changes  Disk space Broken applications Malware
The IT Balancing Act Viruses Broken apps visible Mal-ware Natural disaster New devices Out-ages PW change New soft-ware Disk space Up-grades Domain change preventative responsive Asset mgmt DC move Diag-nostics Patch Mgmt invisible
The IT Balancing Act 1% Virus Broken apps Natural disaster visible Mal-ware New device 24% New software Out-ages PW change Disk space Up-grades Asset mgmt Domain changes preventative responsive DC move Patch Mgmt 75% Diagnostics invisible
The IT Balancing Act Broken apps Virus Natural disaster visible Mal-ware New software PW change New device Out-ages Asset mgmt Up-grades Patch Mgmt Domain changes Disk space DC move preventative responsive Diagnostics invisible
Demonstrate value   Preventative Make it more visible WITHOUT being painful Automate to reduce costs Do it right the first time & let your users feel the advantages   Responsive Automate to become proactive Empower your end user Minimize low-quality interactions Have a plan B Exercise complete control
Best practices:  Gaining strategic influence using Kaseya
Set aggressive targets (and hit them) 1 Create a strong baseline Invest in automation K12 SDK Agent Procedures Agent procedures can be scheduled or run on demand.  Automate regular tasks or provide End User Self Service.
Publically reduce your operational budget 2 Use reporting data to show financial cost reductions & communicate your value Spend extra budget on strategic initiatives K12 SDK Report Templates Reports can be scheduled or run on demand.  Detailed inventory of your hardware, software and licenses with accurate up-to-date data.
Cut costs, NOT quality of service 3 Don’t outsource, automate Kaseya Console
Anticipate needs & plan ahead 4 Gain visibility ITRP initiatives K12 SDK Organizational Templates Organize District systems and assets down to the classroom level
Be proactive when managing reactive support 5 Call when the problem happens instead of fixing it when they call you Kaseya Live Connect
Engage the community (it takes a village…) 6 5,000 MSPs, universities, 1,000 school customers Universities and K-12 Schools
Say yes to ideas without bloating budget 7 iPads, laptops, etc. Spend your $$ to buy more, instead of pouring it into support ,[object Object]
Use technology to control technology
Reduce ongoing cost of new machines and initiatives
Gain time, flexibility and breathing room to focus on innovation,[object Object]
Empower the end user 9 Self service Individualized installations and images Empower the end user but keep central control K12 SDK User Roles Predefined User Roles restrict access to Kaseya functions based on job responsibilities, such as Inventory Management.
Have a Plan B 10 Immediate lockdown Increased responsiveness Emergency planning
More on Kaseya
Central Standardization &Automation of IT Services PatchManagement Computer Audit and Discovery PC Remote Control/RemoteSupport RemoteDesktopManagement LAN and  Systems Monitoring Software Deployment & SystemsManagement Service Desk and Trouble Ticketing Backup andDisasterRecovery NetworkPolicyManagement Cross Platform Support  Security, Vulnerability Assessment Power Management (User State) Machine"Personality“Management
What’s Kaseya? Coordinated management distribution technology IT Service & Support Automation Framework Proactive - call end-users when or before problems happen, instead of vice-versa Let the Machines Heal Themselves Automate 80% of typical support requests If machines break, they fix themselves
Kaseya Base Components  Ability to manage any system, anywhere Browser based console Comprehensive software and hardware inventory of Windows and Mac Systems Track assets like monitors and printers without an agent System Monitoring , Alerting and Resolution Automation of routine procedures (defrags, disk clean etc) Microsoft Patch Management  Software Deployment and 3rd Party Updates Remote Management with Kaseya Live Connect End User Self Service Ticketing Reporting
Agent Network Topology Distributed  Kaseya Agents Deployed as a service to client systems 001011100101 0010101001011 001011100101 VSA VSA 0010101001011 Agent Loads as local System Service Establish the connection OUTBOUND Port 5721 Asks server, “Any Instructions?” on 30 Second Intervals Performs the Tasks Encrypted Communication 2003 + Server MS SQL IIS , DOT Net,  ASP, ASPX Dynamic Content Behind firewall

Contenu connexe

Tendances

Vistacom in the Facilities Management Journal (September-October 2015)
Vistacom in the Facilities Management Journal (September-October 2015)Vistacom in the Facilities Management Journal (September-October 2015)
Vistacom in the Facilities Management Journal (September-October 2015)Destiny Heimbecker
 
How to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief ArchitectHow to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief ArchitectAxios Systems
 
Integrated Service Management (IBM Tivoli)
Integrated Service Management (IBM Tivoli)Integrated Service Management (IBM Tivoli)
Integrated Service Management (IBM Tivoli)IBM Danmark
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch_Services
 
7 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 20157 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 2015Continuum
 
A Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed ServicesA Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed Servicessangerarayal
 
Inside The Buyers Head Tim Clark May 4
Inside The Buyers Head   Tim Clark May 4Inside The Buyers Head   Tim Clark May 4
Inside The Buyers Head Tim Clark May 4SIIA12
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - ExplainedGhassan Chahine
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overviewlynotts
 
ITIL Service Desk
ITIL Service DeskITIL Service Desk
ITIL Service Deskjmansur1
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Info-Tech Research Group
 
Infographic | Software Facilitates Smart(er) Manufacturing
Infographic | Software Facilitates Smart(er) ManufacturingInfographic | Software Facilitates Smart(er) Manufacturing
Infographic | Software Facilitates Smart(er) ManufacturingInsight
 
It department meeting presentation slides
It department meeting presentation slidesIt department meeting presentation slides
It department meeting presentation slidesunhit
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a ProductVMware Tanzu
 
Efficient IT infrastructure management to go beyond business as usual
Efficient IT infrastructure management to go beyond business as usualEfficient IT infrastructure management to go beyond business as usual
Efficient IT infrastructure management to go beyond business as usualMindtree Ltd.
 
Technology for People in Healthcare
Technology for People in HealthcareTechnology for People in Healthcare
Technology for People in HealthcareRES
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User ComputingJames Charter
 

Tendances (20)

Vistacom in the Facilities Management Journal (September-October 2015)
Vistacom in the Facilities Management Journal (September-October 2015)Vistacom in the Facilities Management Journal (September-October 2015)
Vistacom in the Facilities Management Journal (September-October 2015)
 
How to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief ArchitectHow to select an ITSM Tool from the ITIL® Chief Architect
How to select an ITSM Tool from the ITIL® Chief Architect
 
Integrated Service Management (IBM Tivoli)
Integrated Service Management (IBM Tivoli)Integrated Service Management (IBM Tivoli)
Integrated Service Management (IBM Tivoli)
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographic
 
Computer Management Short Version Ppt
Computer Management Short Version PptComputer Management Short Version Ppt
Computer Management Short Version Ppt
 
7 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 20157 Must-Have Managed IT Services Offerings for 2015
7 Must-Have Managed IT Services Offerings for 2015
 
CloudMitchells
CloudMitchellsCloudMitchells
CloudMitchells
 
A Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed ServicesA Comprehensive Guide to Managed Services
A Comprehensive Guide to Managed Services
 
MOTADATA ITSM VERSI BAHASA INDONESIA
MOTADATA ITSM VERSI BAHASA INDONESIAMOTADATA ITSM VERSI BAHASA INDONESIA
MOTADATA ITSM VERSI BAHASA INDONESIA
 
Inside The Buyers Head Tim Clark May 4
Inside The Buyers Head   Tim Clark May 4Inside The Buyers Head   Tim Clark May 4
Inside The Buyers Head Tim Clark May 4
 
Managed Services - Explained
Managed Services - ExplainedManaged Services - Explained
Managed Services - Explained
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
ITIL Service Desk
ITIL Service DeskITIL Service Desk
ITIL Service Desk
 
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
 
Infographic | Software Facilitates Smart(er) Manufacturing
Infographic | Software Facilitates Smart(er) ManufacturingInfographic | Software Facilitates Smart(er) Manufacturing
Infographic | Software Facilitates Smart(er) Manufacturing
 
It department meeting presentation slides
It department meeting presentation slidesIt department meeting presentation slides
It department meeting presentation slides
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 
Efficient IT infrastructure management to go beyond business as usual
Efficient IT infrastructure management to go beyond business as usualEfficient IT infrastructure management to go beyond business as usual
Efficient IT infrastructure management to go beyond business as usual
 
Technology for People in Healthcare
Technology for People in HealthcareTechnology for People in Healthcare
Technology for People in Healthcare
 
Notes from the field - End User Computing
Notes from the field - End User ComputingNotes from the field - End User Computing
Notes from the field - End User Computing
 

Similaire à Kaseya: Making Operational IT Strategic: Special Edition for Education CIOs

Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya
 
Ppt Template
Ppt TemplatePpt Template
Ppt Templatepapdev
 
How To Build Mature SM - final
How To Build Mature SM - finalHow To Build Mature SM - final
How To Build Mature SM - finalDanijel Božić
 
Introducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for GovernmentIntroducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for GovernmentAmazon Web Services
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthIBM Danmark
 
Chp14 Tactical Execution
Chp14 Tactical ExecutionChp14 Tactical Execution
Chp14 Tactical ExecutionChuong Nguyen
 
Predictive Maintenance Solution for Industries - Cyient
Predictive Maintenance Solution for Industries - CyientPredictive Maintenance Solution for Industries - Cyient
Predictive Maintenance Solution for Industries - CyientPercy-Mitchell
 
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdf
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdfTechnology Challenges Encountered by Small & Mid-Sized Business (1).pdf
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdfSmartinfologiks
 
Analance Product Overview
Analance Product OverviewAnalance Product Overview
Analance Product OverviewDucenIT
 
Pmac It Project Management 2010
Pmac It Project Management 2010Pmac It Project Management 2010
Pmac It Project Management 2010nseiersen
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Omega Peripherals
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Jim Mason
 
Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)dansimms
 
Quest Software - Dan Falconer
Quest Software - Dan FalconerQuest Software - Dan Falconer
Quest Software - Dan FalconerIDG Romania
 
Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Upbaselsss
 

Similaire à Kaseya: Making Operational IT Strategic: Special Edition for Education CIOs (20)

Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT DirectorsKaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
How To Build Mature SM - final
How To Build Mature SM - finalHow To Build Mature SM - final
How To Build Mature SM - final
 
Introducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for GovernmentIntroducing Smartsheet Gov: The Trusted Work Execution Platform for Government
Introducing Smartsheet Gov: The Trusted Work Execution Platform for Government
 
The Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and GrowthThe Power of Business Agility for Innovation, Transformation and Growth
The Power of Business Agility for Innovation, Transformation and Growth
 
Chp14 Tactical Execution
Chp14 Tactical ExecutionChp14 Tactical Execution
Chp14 Tactical Execution
 
Predictive Maintenance Solution for Industries - Cyient
Predictive Maintenance Solution for Industries - CyientPredictive Maintenance Solution for Industries - Cyient
Predictive Maintenance Solution for Industries - Cyient
 
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdf
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdfTechnology Challenges Encountered by Small & Mid-Sized Business (1).pdf
Technology Challenges Encountered by Small & Mid-Sized Business (1).pdf
 
Analance Product Overview
Analance Product OverviewAnalance Product Overview
Analance Product Overview
 
Pmac It Project Management 2010
Pmac It Project Management 2010Pmac It Project Management 2010
Pmac It Project Management 2010
 
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
Presentación Dell, Omega Peripherals e Intel: El centro de datos eficiente (1...
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
 
ds-itsm.pdf
ds-itsm.pdfds-itsm.pdf
ds-itsm.pdf
 
Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)Building your IT strategy (Housing Technology Conference 2014)
Building your IT strategy (Housing Technology Conference 2014)
 
Quest Software - Dan Falconer
Quest Software - Dan FalconerQuest Software - Dan Falconer
Quest Software - Dan Falconer
 
MTW03011USEN.PDF
MTW03011USEN.PDFMTW03011USEN.PDF
MTW03011USEN.PDF
 
Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27Calvin Wee Resume 2015 Apr 27
Calvin Wee Resume 2015 Apr 27
 
Kaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT DirectorsKaseya: 5 Strategies for Banking IT Directors
Kaseya: 5 Strategies for Banking IT Directors
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
IO Journey All Up
IO Journey All UpIO Journey All Up
IO Journey All Up
 

Plus de Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 

Plus de Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Kaseya: Making Operational IT Strategic: Special Edition for Education CIOs

  • 1. Making Operational IT Strategic: Special Edition for Education CIOs
  • 2. Introductions Javier EsteveIT Service Management LeaderKaseya Anthony JulianoCTO & General PartnerLandmark Ventures
  • 3. Agenda Strategy within Educational IT Operational IT: Shifting the balance Best Practices: Gaining strategic influence using Kaseya
  • 4. Strategy in Education IT IT in the business ties to the “product” That doesn’t map to Education IT Operations are all that’s left
  • 5. How IT becomes strategic in “Business” Better IT means faster time to market for product development Flexible architecture More responsive processes & streamlined systems IT fosters product innovation Out innovate the competition Latest and greatest internet Web 2.0, mobile, social, etc IT is responsible for ‘brand’ protection + enhancement Governance / compliance automation Uptime/Reliability of service IT’s operational metrics tie to business metrics i.e. Website traffic as it relates to customer experience Or Cost of a trade transaction going through the system faster IT enables end user and sales force productivity An enterprise app that makes end-users do their job faster Enabling mobile means sales can close more deals
  • 6. Business ≠ Education Administrators want CIOs to keep computers running Time to Market isn’t measurable Budget is driven by politics and always is constrained Multiple stakeholders: too many cooks in the kitchen Product is a ‘well rounded student’ – much harder to measure than $$$ Generated
  • 7. So how do you apply “Business IT” to “Education IT”? Goal #1: Improve Time to Market & Innovate Your Product i.e. Don’t let IT Service be a bottleneck Support your teachers’ paths to innovation – new devices, new learning software packages, etc Create initiatives that foster additional ways to reach students (online learning, ubiquitous computing, etc) Engage students in IT Service/Support to teach them the trade
  • 8. So how do you apply “Business IT” to “Education IT”? Goal #2: Protect your brand by tying operational metrics to business metrics Don’t show up in the newspaper (keep operational budgets low, prevent visible outages, protect students from ‘big bad internet’ Establish baselines of metrics on operational costs and publish how you’re driving them down Keep constant control of the environment across every endpoint and use those metrics to understand the impact on education
  • 9. So how do you apply “Business IT” to “Education IT”? Goal #3: Improve End User and Sales Productivity “Hug” your end-users – make them happy by improving service levels Have them help you sell what you’re doing! Make the Invisible become Visible (and vice versa) Become ‘Proactive’ to Shift the Balance
  • 11. Operational IT works along 2 lines Preventative vs. Responsive Visible vs. Invisible
  • 12. Preventative vs. Responsive Preventative Patch management Password changes Diagnostics Asset lifecycle management Datacenter moves Domain changes Responsive Disk space Broken applications Malware Connectivity Widespread viruses Natural disasters
  • 13. Visible vs. Invisible Invisible Patch management Password changes Diagnostics Asset lifecycle management Datacenter moves Visible Installing software Upgrades New devices/printers/machines Connectivity Performance Domain changes Disk space Broken applications Malware
  • 14. The IT Balancing Act Viruses Broken apps visible Mal-ware Natural disaster New devices Out-ages PW change New soft-ware Disk space Up-grades Domain change preventative responsive Asset mgmt DC move Diag-nostics Patch Mgmt invisible
  • 15. The IT Balancing Act 1% Virus Broken apps Natural disaster visible Mal-ware New device 24% New software Out-ages PW change Disk space Up-grades Asset mgmt Domain changes preventative responsive DC move Patch Mgmt 75% Diagnostics invisible
  • 16. The IT Balancing Act Broken apps Virus Natural disaster visible Mal-ware New software PW change New device Out-ages Asset mgmt Up-grades Patch Mgmt Domain changes Disk space DC move preventative responsive Diagnostics invisible
  • 17. Demonstrate value Preventative Make it more visible WITHOUT being painful Automate to reduce costs Do it right the first time & let your users feel the advantages Responsive Automate to become proactive Empower your end user Minimize low-quality interactions Have a plan B Exercise complete control
  • 18. Best practices: Gaining strategic influence using Kaseya
  • 19. Set aggressive targets (and hit them) 1 Create a strong baseline Invest in automation K12 SDK Agent Procedures Agent procedures can be scheduled or run on demand. Automate regular tasks or provide End User Self Service.
  • 20. Publically reduce your operational budget 2 Use reporting data to show financial cost reductions & communicate your value Spend extra budget on strategic initiatives K12 SDK Report Templates Reports can be scheduled or run on demand. Detailed inventory of your hardware, software and licenses with accurate up-to-date data.
  • 21. Cut costs, NOT quality of service 3 Don’t outsource, automate Kaseya Console
  • 22. Anticipate needs & plan ahead 4 Gain visibility ITRP initiatives K12 SDK Organizational Templates Organize District systems and assets down to the classroom level
  • 23. Be proactive when managing reactive support 5 Call when the problem happens instead of fixing it when they call you Kaseya Live Connect
  • 24. Engage the community (it takes a village…) 6 5,000 MSPs, universities, 1,000 school customers Universities and K-12 Schools
  • 25.
  • 26. Use technology to control technology
  • 27. Reduce ongoing cost of new machines and initiatives
  • 28.
  • 29. Empower the end user 9 Self service Individualized installations and images Empower the end user but keep central control K12 SDK User Roles Predefined User Roles restrict access to Kaseya functions based on job responsibilities, such as Inventory Management.
  • 30. Have a Plan B 10 Immediate lockdown Increased responsiveness Emergency planning
  • 32. Central Standardization &Automation of IT Services PatchManagement Computer Audit and Discovery PC Remote Control/RemoteSupport RemoteDesktopManagement LAN and Systems Monitoring Software Deployment & SystemsManagement Service Desk and Trouble Ticketing Backup andDisasterRecovery NetworkPolicyManagement Cross Platform Support Security, Vulnerability Assessment Power Management (User State) Machine"Personality“Management
  • 33. What’s Kaseya? Coordinated management distribution technology IT Service & Support Automation Framework Proactive - call end-users when or before problems happen, instead of vice-versa Let the Machines Heal Themselves Automate 80% of typical support requests If machines break, they fix themselves
  • 34. Kaseya Base Components Ability to manage any system, anywhere Browser based console Comprehensive software and hardware inventory of Windows and Mac Systems Track assets like monitors and printers without an agent System Monitoring , Alerting and Resolution Automation of routine procedures (defrags, disk clean etc) Microsoft Patch Management Software Deployment and 3rd Party Updates Remote Management with Kaseya Live Connect End User Self Service Ticketing Reporting
  • 35. Agent Network Topology Distributed Kaseya Agents Deployed as a service to client systems 001011100101 0010101001011 001011100101 VSA VSA 0010101001011 Agent Loads as local System Service Establish the connection OUTBOUND Port 5721 Asks server, “Any Instructions?” on 30 Second Intervals Performs the Tasks Encrypted Communication 2003 + Server MS SQL IIS , DOT Net, ASP, ASPX Dynamic Content Behind firewall
  • 36. For More Information Javier Esteve - javier.esteve@kaseya.com Anthony Juliano - ajuliano@landmarkventures.com Visit Our Education IT Resource Centerhttp://www.kaseya.com/industries/education-it-res.aspx   Learn More About Kaseyawww.kaseya.com/PPSresources

Notes de l'éditeur

  1. Do you feel like a business partner or just a service provider? Do you struggle to make your voice heard in larger organizational decisions?  
  2. If you’re the CIO of a large Fortune 500 company, the strategy for being viewed as influential sounds straightforward: attach yourself to revenue generating projects and measure value in $ROI. But what if you’re the CIO of an Education organization? These business world strategies don’t translate as easily for Education CIOs. Technology in academia tends to be squarely focused on operations and support, which can sideline IT’s bigger goals and broader decision-making role in favor of “just keeping the lights on.”  To make matters worse, most end-users only ever get to see the “bad side” of operational IT, i.e. when a teacher’s machine isn’t working or a student’s internet connection goes down.  If you’re a CIO in education, all of the baselines most CIOs deal with are magnified, because you’re dealing with very unique users in a very constrained environment. You don’t get extra money to play around with strategic issues. You’re accountable to parents, trustees, school boards, and all of the money you spend is tightly locked down or even politically charged.
  3. If you’re the CIO of a large Fortune 500 company, the strategy for being viewed as influential sounds straightforward: attach yourself to revenue generating projects and measure value in $ROI. But what if you’re the CIO of an Education organization? These business world strategies don’t translate as easily for Education CIOs. Technology in academia tends to be squarely focused on operations and support, which can sideline IT’s bigger goals and broader decision-making role in favor of “just keeping the lights on.”  To make matters worse, most end-users only ever get to see the “bad side” of operational IT, i.e. when a teacher’s machine isn’t working or a student’s internet connection goes down.  If you’re a CIO in education, all of the baselines most CIOs deal with are magnified, because you’re dealing with very unique users in a very constrained environment. You don’t get extra money to play around with strategic issues. You’re accountable to parents, trustees, school boards, and all of the money you spend is tightly locked down or even politically charged.
  4. As you can see, very little of our preventative work is seen by the user. This is typical…preventative work is invisible, even though it takes up a huge amount of our time as CIOs. At the same time, most of what users DO see is during problems. With this kind of interaction, no wonder IT is seen as a utility!Let’s look at it another way…
  5. This balance makes it look like we spend all of our time doing visible stuff, but it’s really more like this…
  6. The reality is that almost all of the work you do in keeping an operational IT system running is both preventative AND invisible to the user.
  7. In order to gain strategic influence, educational CIOs need to demonstrate the ways in which they can add vale. This can happen by cutting costs, by putting more tech into schools, and most importantly by exposing the work that’s being done on the back-end in a positive, user friendly way.
  8. Here’s what Kaseya does.(wheel)2. Agent architecture3. Integration & automation.3 paradoxes in reverse order - ratio of machines (managing fiefdoms, and device, anywhere, doesn’t have to be on VPN) - allow for freedom but always have the ability to control a machine remotely. Application blocking, keyword filtering - kaseya allows you to do ops cheap and easy – do more w/ less. Automate, don’t spend resources continuing to play the ops game, so you have more tiume for straegy. But alspo, turn ops into strateguy – gather data, understand data, IT resource planning.