{"id":492,"date":"2003-12-04T00:00:00","date_gmt":"2003-12-04T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/04\/central-control-for-your-network\/"},"modified":"2021-12-30T11:37:28","modified_gmt":"2021-12-30T11:37:28","slug":"central-control-for-your-network","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/12\/04\/central-control-for-your-network\/","title":{"rendered":"Central Control for Your Network"},"content":{"rendered":"<p>With LANDesk Man-agement Suite 8, IT managers can control the computers on their networks and implement software and security policies efficiently.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It includes asset management, device discovery, software license management, PC remote control, software distribution, and operating system recovery and migration.<\/p>\n<p>Macintosh support has also been improved in this version.<\/p>\n<p>To combat any network degradation and to increase performance to remote computers, LANDesk 8 provides bandwidth throttling, multicast distribution, and checkpoint restarts.  For example, to distribute a security update to all Microsoft Office users or a new virus definition to all your users, you can simply specify the maximum bandwidth and eliminate congestion issues.<\/p>\n<p>Using its peer download technology, LANDesk 8 will serve the appropriate packages to a select number of users across your network&#8217;s various subnets, and those machines will in turn serve them to their peers.<\/p>\n<p>In the event that a machine shuts down halfway through a transfer, the byte-level checkpoint restart feature will ensure that the update gets efficiently completed upon restart.<\/p>\n<p>LANDesk 8 presents a lot of management capabilities in one package, as do competitors such as Microsoft SMS and Novell ZenWorks.<\/p>\n<p>While the initial experience can be a little daunting, the performance enhancements that LANDesk 8 delivers (namely the multicast and incremental file-transfer capabilities) are worth the initial start-up pains.<\/p>\n<p>More info: [url=http:\/\/www.pcmag.com\/article2\/0,4149,1399924,00.asp?kc=PCRSS02129TX1K0000530]http:\/\/www.pcmag.com\/article2\/0,4149,1399924,00.asp?kc=PCRSS02129TX1K0000530[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-492","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=492"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/492\/revisions"}],"predecessor-version":[{"id":2979,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/492\/revisions\/2979"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}