Kaseya Asset Discovery
The information in this presentation is confidential and proprietary to Kaseya and may not be disclosed or distributed without the prior written permission of Kaseya. This document, and any related presentation, as well as Kaseya's strategy, possible future developments, products, platforms, directions and/or functionality are all subject to change without notice at Kaseya’s sole discretion. The information in this document does not constitute a commitment, contract, promise or legal obligation to deliver any material, code or functionality. This document is provided without warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. This document is for informational purposes only and may not be incorporated into a contract. All forward-looking statements, including those set forth in this presentation, are subject to various assumptions, risks and uncertainties that could cause actual results to differ materially from projections. Readers are cautioned not to place undue reliance on such forward-looking statements, and specifically, not to rely upon such in making purchasing decisions.
Copyright ©2014 Kaseya 2
Discovery Use Cases
Asset Management – Locate server/workstations in network
– Automatic Kaseya Agent deployment
– Launch Remote Control, Agent Procedure
Performance Monitoring – Query local/remote devices
– Verify availability, measure performance
– Raise alarm, open trouble ticket
No “one size fits all” solution
Copyright ©2014 Kaseya 4
VSA/Network Monitor
LAN Watch
– Ping sweep within local network
– Port scan, MAC address for classification
Domain Watch
– Synchronize Active Directory data
Network Monitor Integrated
– Monitor assets from VSA Discovery
Copyright ©2014 Kaseya 6
Smart Event Suppression
Root cause analysis
– Check availability of upstream devices
– Identify real cause of outage
– Highlight affected devices/applications
Eliminate false alarms
– Prevent alarm flood from affected devices
Copyright ©2014 Kaseya 13
Asset Fingerprinting
Copyright ©2014 Kaseya 14
Device Signatures – Identify device type, running application
– Locate key performance/availability metrics
– Default thresholds based on industry standard
– Facilitate rapid deployment
Traditional Approach
Locate MIBs
Load, Compile
Identify Metrics
Adjust Thresholds
Start Monitoring
Traverse
Solution
Perform Discovery
Start Monitoring
Supported IT Infrastructure
Copyright ©2014 Kaseya 15
•Arrowpoint
•F5
•Coradiant
•Peribit
•Bluecoat
• Riverbed
•NetApp
•Brocade
•Sun T300
•ADIC
•Dell
•EMC
Applications Firewalls
•Oracle, SQL Server, DB2, MySQL
•Exchange, Lotus Notes
•IIS, Apache, WebLogic, WebSphere, Java, JMX
•Citrix, AD, DNS, DHCP, WINS
•Blackberry
Network
•Routing (BGP, OSPF, RIP)
•Frame Relay & ATM
•WiFi, RMON2
•Cisco, Foundry, Juniper, Avaya, Amperion, Neoteris
Servers
• VMware vSphere, Xen, HyperV
• Dell OpenManager
• Compaq Insight Manager
• Cisco UCS, CUCM
• Linux, Solaris, HP-UX, Windows, Novell
Content Delivery
Storage
Fixed Wireless
Voice over IP
Environmental Management
•Netscreen
•Checkpoint
•Fortinet
•PIX
•NetASQ
•Kagoor
•Broadworks
•DragonWave
•NextNet
•Redline
•Tasman
•Liebert
•APC
•NetBotz
•Valere
•Omnitronix
•Cyclades
•Cisco Call Manager
•Cisco IP-SLA
VSA Discovery Roadmap
Key objectives
– Strong focus on user experience
– Utilize best-of-breed technology
– Improve reliability and consistency
Approach
– Enhance LAN discovery engine
– Augment server audit data
– Retain feature parity
Copyright ©2014 Kaseya 17
Evolving Asset Discovery Scope
Beyond servers/workstations
Hybrid cloud/virtualized environments – Elastic compute resources
– vMotion/DRS
SaaS Applications – Google Apps, Office 365
– User synchronization
Storage Area Network
Copyright ©2014 Kaseya 18