Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


1.1.1 Product benefits

JP1/IT Desktop Management 2 provides a means of managing an organization's security infrastructure and assets. To manage device security in an organization, rules must be laid down and users required to comply. Administrators must keep track of security issues and respond appropriately.

JP1/IT Desktop Management 2 supports security and asset management as follows:

Full picture of IT device status

To properly manage the security of IT devices, the administrator must first understand which devices are subject to security rules. To manage the devices as assets within the organization, the administrator must know what hardware and software is being used and how everything is currently configured. JP1/IT Desktop Management 2 has functionality to periodically search and discover devices in the network and collect information about them automatically. Information is acquired about any new device discovered in the search, allowing IT equipment to be managed using accurate, up-to-date information. This reduces the administrator's workload in data collection.

Enforcement of security rules for IT devices

One of the options for determining organizational security rules is an Information Security Management System (ISMS). To manage security under an ISMS, users must comply with rules relating to settings and operations. In JP1/IT Desktop Management 2, the rules determined by the organization are applied to IT devices as security policies, and degrees of compliance with those policies can be monitored. This allows rules to be enforced on the devices. If any computer violates a security policy, action can be taken or the offender sent a warning message automatically, relieving the administrator and senior staff from having to deal with users directly.

Identification and resolution of security vulnerabilities

To run an organization's computers securely, vulnerable computers must be identified and response measures quickly put in place to forestall virus infections and information leaks. Getting to the root of a problem by manually checking an array of measures, such as the computer's security settings, application of anti-virus products or Windows updates, and protection against information leaks can be extremely time-consuming and costly. With JP1/IT Desktop Management 2, you can check through a listing of the security status of each computer, and immediately spot any security issues. If there is a problem, the security of the whole system can be managed efficiently by automatically applying anti-virus products and Windows updates and isolating insecure devices from the network.

IT network monitoring

The widespread use of mobile computing poses the risk that people may bring their own computers into the organization. Connection of unauthorized equipment into the network can result in information leaks and virus infections. To prevent such damage, the organization's network is monitored so that newly connected devices are immediately discovered. JP1/IT Desktop Management 2 can check for unauthorized connections and automatically isolate any device that has no security provision. By using this network monitoring functionality, you can see all the network connections within the organization and better safeguard the system security.

Software installation and maintenance

For computer-based business tasks, the required software needs to be installed on the computers. This takes time if users have to do their own installations. Using JP1/IT Desktop Management 2, in a single operation you can install software on all the computers where it is required. Upgrades can be performed promptly, however frequently they are needed. Updated programs designed to fix a bug or correct a security issue can be distributed and applied automatically.

Remote control of user computers

With the rapid advance in information technology in recent years, users who are not equipped to set up applications or troubleshoot problems are increasingly common. To handle their computer problems, organizations typically rely on a system administrator with specialist knowledge. If workplaces are dispersed, it becomes difficult to respond in a timely manner. Using JP1/IT Desktop Management 2, when a problem occurs on a computer in another location, the system administrator can take immediate action from his or her own computer, enabling fast response by remote control.