Product Description

In today's computing environments, the majority of new data is on endpoint devices. These devices are mobile and not always behind your perimeter security. Laptops, smartphones, MP3 players, thumb drives and other portable endpoint devices are especially vulnerable to loss and theft. Through wireless connections, endpoint devices can access networks that might not be secure.

At the same time, many users are not aware of the variety of security risks associated with their devices. Other users struggle to understand, implement, and maintain their security software.

Novell ZENworks 11 SP4 Endpoint Security Management simplifies endpoint security by putting you, not your users, in control of endpoint security. The ZENworks approach is simple: help you protect your network and mobile data by enforcing endpoint security policies that address both known and unknown security risks, whether users are within or beyond the office walls, by enabling you to manage the following endpoint security needs:

Key Features

  • Personal Firewall
    Control access to ports and protocols to protect against hackers, malware, protocol attacks, and more, while keeping security invisible to the end user.
  • Wireless Security
    Control when, how, and where users are allowed to connect. Wi-Fi connectivity can be limited to authorized and known access points, can be limited to access points with minimum encryption or signal strength, or can be disabled completely if necessary.
  • Data Encryption
    Secure data stored on the endpoint and on removable media by encrypting files so they can only be read by authorized users. Protects sensitive information on lost or stolen mobile computers.
  • USB Security
    Prevent intentional or inadvertent transmission of data to removable storage devices. Storage devices can be placed in read-only mode or fully disabled, while the endpoint hard drive and all network drives remain accessible and operational.
  • Application Control
    Ensure that only approved applications are run on corporate IT assets. Create black lists or enforce applications, (such as VPN or antivirus) to run prior to network connection.
  • Client Self Defense
    Protect the endpoint by ensuring that the Endpoint Security Agent cannot be altered, hacked, or uninstalled.
  • Port Control
    Control connectivity through LAN, modem, Bluetooth, infrared, 1394 (Firewire), and serial and parallel ports.
  • Scripting
    Run a JScript or VBScript on a device in either the system or user context. Trigger the script according to Endpoint Security Agent actions, location changes, or time periods.

Benefits

  • Use the same server infrastructure, management console, and endpoint client as the other ZENworks 11 products: Asset Management, Configuration Management, Full Disk Encryption, and Patch Management.
  • Reduce administrative resource requirements by bringing all endpoints under central policy control regardless of whether they are at work, at home, or on the road.
  • Increase security and reduce IT support costs by automatically adjusting security settings (without user involvement) as users move from location to location.
  • Combine driver-layer and application-layer security for layered protection against all types of hacker attacks to protect sensitive and valuable data.
  • Use a driver-layer stateful firewall to open communication ports for authorized network traffic only, blocks all unwanted intrusions, and completely hides the endpoint from port scans and other attacks to block malicious hackers before they get started.
  • Create a complete perimeter around the endpoint by putting the administrator in control of LAN, WLAN, modem, Bluetooth, IRDA, 1394, serial, parallel, and USB communication ports.
  • Enable organizations to securely increase productivity through Wi-Fi connectivity by enforcing a complete set of Wi-Fi security controls.
  • Protect critical data from loss or theft of the device or by unauthorized transfer to removable storage devices.
  • Keep users protected all the time by blocking attempts to change security settings or disable the product—even in safe mode, and even for administrative users.

For additional information about key features and benefits, visit the ZENworks Endpoint Security Management product page.

File Description

Filename Usage
ZENworks11SP4.iso Installation of ZENworks 11 SP4 or upgrading a ZENworks 11.3.x Primary Server to ZENworks 11 SP4. ZENworks 11 SP4 includes Asset Management, Configuration Management, Endpoint Security Management, Full Disk Encryption and Patch Management.
ZENworks11SP4_Appliance-x86_64.ova
ZENworks11SP4_Appliance-x86_64.zip.001
ZENworks11SP4_Appliance-x86_64.zip.002
ZENworks11SP4_Appliance-x86_64.zip.003
ZENworks11SP4_Appliance-x86_64.zip.004
ZENworks11SP4_Appliance-x86_64.vhd.zip
ZENworks11SP4_Appliance-x86_64.xen.tar.gz
Deployment of ZENworks 11 SP4 Virtual Appliance or upgrading ZENworks 11 SP3 Virtual Appliance to ZENworks 11 SP4 Virtual Appliance.
ApplianceMigrationUtility.iso ZENworks 11 SP3 Appliance to ZENworks 11 SP4 Appliance migration utility.
ZENworks_Reporting_56_Appliance-x86_64.vhd.zip
ZENworks_Reporting_56_Appliance-x86_64.ova
ZENworks_Reporting_56_Appliance-x86_64.xen.tar.gz
ZENworks_Reporting56_Migration_Utility.zip
Deployment of ZENworks Virtual Reporting Appliance 5.6.1, migrating, or upgrading from ZENworks Reporting 5 to ZENworks Reporting 5.6.1.
ZENworksDiagnosticCenter.zip Installation of the ZENworks Diagnostic Center utility.
Jaspersoft_Studio_5.6.iso Installation of Jaspersoft Studio 5.6 used to create and modify ZENworks reports.
embedded_datastore-edit_me_first.zip Patch with the registry keys to add the ZENworks Embedded Datastore and ZENworks Embedded Datastore for Auditing Services to a Windows ZENworks Server. Refer to the readme in the zip file for instructions.

System Requirements

For ZENworks 11 SP4 system requirements, see ZENworks 11 SP4 System Requirements.

Installation

For installation instructions, see the the ZENworks 11 SP4 documentation website.

When you install ZENworks 11 SP4, all products (Endpoint Security Management, Asset Management, Configuration Management, Full Disk Encryption, and Patch Management) are installed.

Asset Management, Configuration Management, and Patch Management are automatically activated in evalution mode. Endpoint Security and Full Disk Encryption are not automatically activated in evaluation mode. You must activate the evaluation for these two products.

The evaluation mode lasts 60 days, after which you must either discontinue the use of the product or provide a valid license code. No reinstallation of the software is required when you move from an evaluation license to a full license. For information about enabling evaluations and managing product licenses, see the ZENworks 11 SP4 Product Licensing Reference.

Known Issues

For a list of known issues, see the ZENworks 11 SP4 Readme.