Nomad uses a pull model for maximum scalability with no complex WAN administration, and is peer-based to make use of existing capacity with local content access. Our Reverse QoS™ technology also ensures business traffic is never adversely impacted.
Full automation for deployment of OS images, applications, updates and patches for all Windows-based software – including Office 365. This automation provides the quickest and most secure route to Windows 10, while also providing a consistent process for migrations, replacements or rebuilds.
Works with Configuration Manager’s existing access controls, so there’s no need for separate user security or administration.
Encrypted content prevents unauthorized access, while digitally signed content ensures it came from a trusted source. What’s more, there’s no Java and no device drivers to introduce potential vulnerabilities.
Full automation of the migration process reduces the cost, complexity and disruption of migrating to Windows 10. And automating the switch from BIOS to UEFI means no compromise on security and no deskside visits.
Nomad delivers cost reductions by eliminating the need for site-specific distribution points, and decreasing the costs of distributing system management content, from the full migration to Windows 10 to ongoing software updates and OS patches.
With its intelligent bandwidth throttling and usage management, Nomad eliminates the need for scheduling IT tasks to deliver fully automated systems management. Automated discovery of network topography enables administrators to treat complex, distributed networks as simple and local.
Integrating with and building on the security provided by SCCM, Nomad ensures data is fully encrypted (and compressed and signed if required) – and goes only where it’s meant to. Nomad’s peer-to-peer model creates a fail-safe IT environment, making sure data is safely backed up during high-risk imaging activity.
Through quick delivery of patches and updates, Nomad also reduces risk by ensuring vulnerabilities are fixed as soon as possible.
Are you secure?
Find out with our free Software Intelligence tool.
Software Intelligence provides analysis of potential security vulnerabilities in your organization, from four key security controls that could mitigate 85% of cyber attacks if properly implemented.