Shavlik Protect Advanced for Server - Term License ( 2 years )

Category: Drivers and system software
  $97.00
 
In Stock
Quantity:
Add to Cart Print
 

View all Drivers and system software by Ivanti >>


Product Id: 27402553

Description: Shavlik Protect Advanced for Server - Term License (2 years) + 2 Years VMware Basic Support & Subscription Service - Win

Mfr Part #: S-ADV-SV-2G-TLSS-C

MSRP: $101.00

Shavlik Protect brings enterprise-level IT management to companies of all sizes. Get centralized patch management and asset inventory for Windows and third party applications for both virtual and physical machines. And, from the same console, get patch management capabilities, dozens of pre-built ITScripts, power management, and centralized antivirus.
The Protect approach bundles best-in-class patch management for Microsoft and 3rd party applications, with other key IT operational capabilities to simplify and automate the systems management challenges most relevant to current IT environments.
Key Points
  • Ease of use
  • Automated patch deployment
  • ESXi hypervisor patching
  • Support for custom patches
  • Antivirus + antispyware
  • Asset inventory and tracking
  • Virtual machine management
  • Active protection with on-access file scanning
  • Comprehensive reporting
  • Automated E-mailer
  • Cloud agents
  • Machine groups
  • Machine view
  • Role-based administration
Product Features
  • Ease of use
    You start managing your physical and virtual assets, software, patches, AV, and energy costs.
  • Automated patch deployment
    By enabling the auto deploy option, you can automatically enforce patch policies by correcting any discrepancies found on the scanned machines. Any missing patches are automatically deployed immediately after the scan.
  • ESXi hypervisor patching
    Shavlik Protect can manage and track the vCenter Servers and the ESXi Hypervisors (ESXi hosts) that are used in your organization.
  • Support for custom patches
    Shavlk Protect provides the ability to patch virtually any Windows application on your network, including custom applications and legacy applications. You can also scan for and deploy private patches from Microsoft Corporation. All of this is managed with the implementation of the custom patch file editor. The editor's wizard-like interface expertly guides you through the process of creating your own custom patch XML files. The program combines your custom XML files with the primary XML patch data file and uses that modified file when performing scans and deployments.
  • Antivirus + antispyware
    For a fraction of the money you spend for antivirus protection today, you can have complete protection against the top security threats - operating system patching, application-level patching, virtual machine patching, and AV. Protect has integrated the ThreatTrack Security VIPRE antivirus + antispyware engine into the Shavlik agent. You'll save time by managing AV from the same familiar protect console and eliminate headaches by reducing the number of agents on your desktops and laptops.
  • Asset inventory and tracking
    IT can't manage what it can't see so an accurate asset inventory is an absolute necessity. Shavlik's asset management gives you a dynamic, up-to-date method to track your software, hardware and virtual assets. You will discover physical and virtual machines you didn't know you had and uncover software applications you didn't know were installed. By eliminating these blind spots, you can quickly close the gaps in your security and policy compliance.
  • Virtual machine management
    Shavlik Protect enables you to scan and patch offline virtual machines. Offline virtual machines are those that aren't powered on when a patch scan is performed. These virtual machines may be part of a roster kept to satisfy demand for more virtual machines quickly. It's important to ensure that these systems are patched so that when they are brought online they don't place your network at risk.
  • Active protection with on-access file scanning
    Active protection is an integrated component of the antivirus + antispyware engine. It provides real-time file scanning functions for each file as they are being accessed. This includes on-access scanning for all threats - including spyware, adware, malware, and viruses.
  • Comprehensive reporting
    More than 20 built-in reports ranging from executive dashboard to patch status detail. Advanced filtering allows you to obtain a very granular view all the way down to specific machines or specific patches. Reports can be exported in 9 different formats. Automatically email reports or notifications by defining the email recipients in scan template, deployment template, or machine group.
  • Automated E-mailer
    Shavlik Protect provides the ability to automatically e-mail scan results and reports to machine owners, network administrators, or executives.
  • Cloud agents
    Shavlik Protect agents can be installed from the cloud and can function without ever connecting directly to the Shavlik Protect console. Agent policies are uploaded from the console to the cloud where they are available to be downloaded by the agents. Agent results are uploaded to the cloud and then downloaded to the Shavlik Protect console.
  • Machine groups
    Shavlik Protect uses machine groups to keep track of the machines that are included in a particular scan. The machine groups within Shavlik's product are flexible enough to allow you to organize and group machines based on OU, Domain or IP ranges which will automatically identify new machines that are added to the network.
  • Machine view
    This extremely powerful and flexible tool enables you to display current information about every machine in your network that has been previously scanned and whose information resides in the database. It enables you to align management of your security posture with how you manage your network assets.
  • Role-based administration
    You can assign different roles to different users of Shavlik Protect. This enables you to make the program available to a wide variety of people within your organization while maintaining control over its use. The role assigned to a user determines what that particular user can do.