Security, Tracking, Audit, Remote supportSecurity, Tracking, Audit, Remote support
vSTAR: no hardware to install and maintain, no updates to apply…nothing to think about except run your business and let Ventucom manage and monitor your IT environment. IT automation is a key factor in Ventucom being able to deliver a proactive, results based IT service model. vSTAR provides unparalleled automation of periodic IT tasks required to manage and maintain all your systems and devices. From the moment you sign up, you will have a completely configured, fully automated, cloud-based IT management solution with the functionality and power that no one else can offer!
vSTAR can scan a client’s network, from within and outside of the client’s firewall. The system allows clients to receive proactive notification and reports on viruses, unauthorized guest accounts, product version code issues, and more than 350 other potential vulnerabilities.
In addition to its vSTAR product, Ventucom offers a range of network management options, depending on what fits best with an organization’s capabilities at each of its locations. This can extend from remote monitoring of server operations and messaging to comprehensive monitoring, alerts and remote correction of problems. Procedures such as security analysis and event log monitoring make sure each network operates properly and that proactive maintenance is done to avoid problems. Remote monitoring also can be used to assess how well local network maintenance is being carried out, such as measuring the effectiveness of local server backups.
Outsourcing network management to Ventucom provides organizations with the most reliable, available and secure networks by building on Ventucom’s incomparable combination of Internet-based technology and local expertise.
Antivirus—provides complete protection from dangerous attacks and malicious software all managed centrally.
Audit & Inventory—track every system and software detail no matter where the machines are located.
Discovery—finds all the attached devices and computers on your network providing a complete view of the network.
Monitoring—proactive monitoring with instant notification of s or changes, all critical to security, network performance and the overall operations of the organization.
Patch Management—automatically keeps servers, workstations and remote computers up-to-date with the latest important security patches and Windows updates.
Policy Management—administration of IT policies ensuring all devices everywhere are secure, in compliance and managed consistently across the organization.
Software Deployment—streamlines the software deployment and update process for the most common third-party solutions.
Remote Access—provides a robust and powerful interface to access and have full control over all devices in the network with minimal end user interruption.
What Can It Do?
Remote Virus Removal—remotely delete a virus from a laptop that is away from the office
Disable Internet Access—if there is an indication of unauthorized or non-secure access to the internet, it can shut down a computer’s ability to access the internet while preserving control of it.
Asset Location Alert—detect if a machine is taken home against company policy.
Theft Protection—track, manage, secure and recover machines that have been stolen; like having a LoJack on the computer!
Safe Mode Reboot—reboot a machine into Safe Mode, which is critical to battling viruses and malware as well as troubleshooting and repairing driver and display errors.
Unauthorized Website Visit Detection and Restriction—prevent users from visiting websites that are not authorized by company policy.
Application Deployment—deploy software and know which installations succeeded or failed.
Info Center—a website for the client’s management to view the inventory and status of their environment.
Example #1: Windows Updates
WINDOWS UPDATES: Example of a vStar process
vSTAR makes the administration of machines more efficient by streamlining basic maintenance and eliminating repetitive tasks. For example, when Microsoft issues a patch, Ventucom can use the vSTAR patch management engine to automatically update all of a client’s systems. What was originally a process done manually onsite is now executed automatically and consistently across all client’s machines. The vSTAR patch policy process used:
- Audits the client’s environment for systems that need to be updated
- Checks that each system has the required components for the upgrade
- Powers on machines that are turned off
- Downloads and installs appropriate components to get systems ready for install
- Installs the Microsoft patch to a test system and ensures all kinks are ironed out
- Pushes the patch to waiting systems and remotely installs it on each machine
- Reboots the systems with user permission
- Tests that the patch was installed correctly
- Compiles a report indicating patch successes, failures and what needs to be done to complete the operation
Example #2: Mobile Device Management
Users are becoming increasingly mobile, and with the proliferation of Bring-Your-Own-Devices (BYOD), critical business data is being dragged along with them. Organizations are increasingly finding their users accessing email, documents and applications on smartphones and tablets, requiring them to extend robust IT systems management controls and security policies to mobile devices. As users continue to access business data and applications on their mobile devices, organizations can now use vSTAR Mobile Device Management to implement business continuity, accessibility and security policies on those devices.
- Extend polices to mobile devices, including iPhone, iPad, BlackBerry and Android phones and tablets
- Protect business data no matter where it sits or is accessed from
- Increase efficiency with the ability for mobile email configuration remotely
Loss or Theft Handling
Loss or theft of mobile devices is a common issue across the entire spectrum of users. Waiting for someone to answer the phone in the hope of it being returned may not be an option. In addition, critical business information may be compromised as a result of the loss. Mobile Management has the unique ability to perform a series of operations to ensure maximum data protection and the ability to locate and retrieve. It can:
- Make phone unusable (lock phone)
- Report phone location