Chasing the Mobile Desktop: How to Tame your Distributed Desktop Environment

Size: px
Start display at page:

Download "Chasing the Mobile Desktop: How to Tame your Distributed Desktop Environment"

Transcription

1 1 Table of Contents Executive Summary... 1 Desktop Management Checklist... 2 Traditional Desktop Systems Management... 3 PCLM Challenges... 4 PC Backup and Restore Challenges... 6 Desktop Virtualization... 7 Desktop Virtualization Challenges... 7 Extending Desktop Management to a Remote and Mobile Workforce... 9 Distributed Desktop Virtualization Chasing the Mobile Desktop: How to Tame your Distributed Desktop Environment Executive Summary Distributed organizations have unique desktop management challenges. End users span the globe, are often offline or connected via higher latency links, and typically have administrative privileges that can lead to a more unstable PC environment. Emerging technologies show promise for reducing desktop TCO, but assessing how they will work in a distributed environment is critical. This white paper surveys existing and emerging approaches to desktop management in the enterprise, covering both traditional systems management methods, as well as newer desktop virtualization technologies. We will discuss their advantages and shortcomings of each approach, and propose an alternative paradigm to desktop management that attempts to reconcile the conflicting needs of user experience and mobility vs. centralized management and control. Page 1

2 2 The Scope of Desktop and Laptop Management Tasks The management of desktops in the distributed enterprise encompasses all tasks related to keeping the desktops functional and their users productive. In this white paper, we focus on the tasks that can be automated with a desktop management system. When considering a desktop management solution, one should consider whether it addresses the following checklist of capabilities: Deployment, Migration and Retirement OS deployment and provisioning What are the tools and process for deploying the OS to newly provisioned machines, including delivery, boot and system configuration? Single image management Can you configure, update and patch a base image, consisting of the OS and a core set of applications that are common to some or all users? Hardware and OS migration/refresh Can you refresh the hardware while retaining user data, user-installed applications, and environment?; What is the process for migrating existing desktops to a new operating system (e.g., XP to Win7)? Archival of the desktop environment When de-provisioning hardware or when users leave the company, can you retain a copy of the user environment? Management and Operations Asset management What tools are available to track and manage software licenses, devices and inventory? Software distribution What process, tools and infrastructure are required to deliver application packages to all users, both LAN connected and distributed? Update and patch management How are endpoints updated with applications, drivers and OS patches? Compliance management Can you ensure that endpoints comply with corporate policies, including applications (black lists and white lists), versions, patches, and malware? Support Helpdesk operations What tools are available to helpdesk staff identify end user issues quickly? Break/fix, troubleshooting What methods and tools are available to help troubleshoot and quickly fix problems reported by end users? Remote control Can helpdesk staff remotely access an endpoint to troubleshoot a device? Restore from a snapshot Can a desktop be restored to a last known working configuration, in case of malware or software problems that reduce user productivity? Page 2

3 Backup and Continuous Data Protection Disaster recovery (system level ) Can a user be restored to a fully operational state after a laptop is lost, stolen or broken including user-installed applications, user data, and personal settings? What level of downtime is acceptable? Backup/restore (file level) Can end users restore individual files/directories that were deleted by accident, or retrieve older versions of files? Does this require helpdesk intervention? Restore persona (different desktops) Can a user s full environment be restored onto a different desktop environment (different hardware, virtual hardware, etc.?) Once core capabilities are defined, a desktop management system can then be evaluated against the following characteristics: 1. Coverage How comprehensively does a solution address the above functions? 2. Support for distributed users How effective are these solutions for users who are connected to the enterprise through VPN and/or WAN connections, and what is their user-experience, both during regular end user operation as well as during the management system s operation? For example, how quickly can IT get an end user back to full productivity after restoring a desktop over a WAN? Another consideration would be to determine how effectively a distributed user s desktop could be repaired or updated with latest patches? 3. TCO How much IT labor is necessary to perform management tasks (Opex), and what infrastructure (storage, servers, network, etc.,) is required to make the system optimally functional (Capex)? 3 Traditional Desktop Systems Management Managing desktops in the enterprise has traditionally been addressed by two types of disparate and non-integrated systems: PC Lifecycle Management (or PCLM 1 ) PC backup and business continuity systems PCLM systems are used to manage the desktops in a centralized and automated fashion. They are typically comprised of a suite of loosely-coupled tools with some common management that facilitates integration of the individual tasks into a controlled and monitored workflow. A typical PCLM system is comprised of the following components: 1 Gartner has recently termed this category PC Configuration and Lifecycle Management (PCCLM) Page 3

4 Desktop agent(s) One or more thick services that execute at the endpoint and carry out various tasks related to the management/operations category. For example, the agent performs inventory tracking and periodic scanning of the desktop to check for compliance with corporate policies. The agent is also responsible for receiving application packages (new or updates) from the server, installing them locally on the desktop, and reporting on the outcome of the installations. Management server The systems back-end that controls the management of the endpoints, including the distribution of software, collecting and controlling the asset management data, and providing the tools to construct and manage the images for deployment purposes. Note that the server does not contain any instance of the data or the meta-data of the endpoint, only a template to be distributed to a group of endpoints. OS deployment tool Typically provided as a separate tool intended to manage the first time provisioning of images to endpoints, or migrating users to new endpoints during a hardware refresh. This subsystem includes tools to construct the common image, a pre-installation environment, as well as definition of sequencing events that tailor the image to the specific hardware by executing scripts at the endpoint during different phases of the installation. Once an image has been deployed, all consequent updates to that endpoint are incremental and may vary from endpoint to endpoint, as users install their own applications and settings. Branch Proxy Infrastructure nodes that are used to push large data files to branches so that endpoints can read these large files from their local proxy instead of across a WAN. A typical PC backup/restore systems is comprised of the following components: Backup/restore desktop agent An agent that executes on the desktop and is responsible for tracking changes made by the user or the system, and uploading the changes efficiently to a backup server. Upon restore, the agent restores individual files (typically in a self-service mode) or an entire system (typically with the assistance of IT) back to operation. Backup/restore server The counterpart to the backup/restore agent, responsible for storing the desktop files efficiently and for restoring data to the endpoints, either in a file-level fashion, or for the entire system. 3.1 PCLM Challenges While PCLM systems have been in use for many years, they have several major architectural drawbacks, especially when managing mobile laptops and knowledge workers in distributed enterprises Challenge: Image Sprawl As mentioned above, a controlled image is deployed once to an endpoint, and from then on each endpoint evolves in its own way as different users (or IT administrators) install a variety of applications on the endpoints. Over time, the individual image contents diverge, leading to what is known as an image sprawl with the following downsides: PC instability: As users install applications and patches, the system has a higher likelihood of becoming unstable over time. Less stability means less user productivity, and more calls to the helpdesk. Page 4

5 Troubleshooting complexity: Since PCs deviate from the originally deployed image, it is harder to troubleshoot a problem when a desktop is not functioning properly, since any of the added applications could have contributed to the problem, and because there is no comparable system in the data center with which to experiment and understand the issue. Support escalations: Slow resolution of a user s problem can result in escalations to more expensive support resources Challenge: Delivering Software and Updates to Remote Users PCLM systems often rely on endpoints being connected to the corporate Intranet, and are not suitable for operation over a VPN connection or directly over the Internet. However, many remote users such as road warriors or outsourced employees that work at another company do not bother to connect to their corporate Intranet, and even if they do, the VPN connections are often limited in duration and in bandwidth. As a result, those desktops are often poorly managed. Another issue with managing distributed users is related to software and patch distribution. Typically, PCLM systems rely on proxy servers in order to perform the updates within a reasonable time and without requiring undue bandwidth. Since remote users often do not have access to branch proxy servers, the software updates or patches never make it to the end user, or take a very long time to occur, often resulting in calls to the helpdesk related to timeouts and connection failures in the midst of a PCLM operation. Recently, some PCLM systems started to introduce Internet-based client management systems. However, they offer very limited functionality (e.g., no support for client/os deployment, software distribution) and no support for network optimizations to enable effective management for remote users Challenge: Limited Break-Fix and Support Tools PCLM systems do not provide effective tools for IT to improve helpdesk operations and reduce user downtime. For example, there are no good tools to clean up a faulty machine and get it back into a working state by restoring it from snapshot, or by enforcing a good corporate image on the endpoint, without wiping out user personalization. Lack of support tools is even more painful when supporting remote users. As an example, consider the following scenario: In many organizations there is a threshold, typically minutes, after which a helpdesk employee stops trying to fix a PC problem and resorts to re-imaging the desktop with a fresh base image. This procedure is a painful process from an end-user perspective, because it means that all applications that were installed on that desktop on top of the base image are removed and must be reinstalled by the user. Furthermore, any user data on the desktop would need to be restored from the PC backup system (assuming it was backed up in the first place, including all environment and settings). Last but not least, re-imaging is both problematic and impractical for distributed WAN users, since sending a multi-gb image over the WAN is both time and bandwidth intensive. Alternatively, image servers must be deployed at the edges of the network, but this is a costly infrastructure and adds complexity to the PCLM system. In lieu of image servers at the branches, IT can ship DVDs or portable hard drives with the restore material, but this process is slow, vulnerable from data protection perspective, and usually leaves the user without PC access for days. Page 5

6 3.1.4 Challenge: Complexity of PCLM Agents and Contention with User Applications A typical PCLM solution employs multiple agents on the desktop including agents for asset management, system recovery, remote access, and for patch, update and software delivery management. Furthermore, most of these agents perform heavy computation on the endpoints. For example, a typical PCLM agent performs scanning for asset management and confirms installation of all software packages, which might contend for machine resources with user applications. More generally, the proliferation of uncoordinated heavy desktop agents impacts both the performance and stability of the desktop operation. In a sense, the complexity and execution overhead of these management tools defeats the purpose for which these tools were constructed to improve the quality of the user experience with respect to desktop usage. 3.2 PC Backup/Restore Challenges for Distributed Desktops Challenge: Full Desktop Restore Most PC backup systems focus on file level restores. Some provide system-wide restore on a separate hidden drive on the desktop, and a few can offer a whole system backup that is stored on the backup server. However, all systems are challenged when restoring a whole desktop environment to WANconnected users, due to the sheer amount of data that needs to be transferred, and the impact on user downtime. Further, most systems lack automation for full desktop restore, often requiring user access to boot-media and additional IT-support. Finally, none of these systems offer an automated full desktop restore (including user-installed applications, user data and settings, and corporate image) onto a different hardware platform, or into a virtual machine, (e.g., to enable temporary access to his/her desktop via a virtual machine until a physical device becomes available and is shipped to the user. ) Challenge: Snapshot Restore PC backup systems typically maintain multiple versions of specific files in the backup server, but they do not maintain complete snapshots of the entire desktop, including user-installed applications and system configuration. Hence, if the desktop gets corrupted (e.g., due to malware, or due to an application that was installed and is incompatible with the rest of the system) there is no good way to revert the desktop to last known working state from, say, a week ago Challenge: Backup Performance PC backup agents perform scanning of the desktop to check for updates, which impacts system resources on the desktop and often prompt end users to disable the service. To reduce this intrusion the frequency of the backup interval is typically limited to once a day at most. Page 6

7 4 Desktop Virtualization Desktop Virtualization (DV) is a new approach to desktop management that has gained traction in recent years. In this approach, IT can centrally manage and deploy desktops on virtual machines, which abstract the hardware and lead to a common machine image that is stored in a file (e.g., VMDK or VHD virtual disk format). This image can then be delivered to (virtual) endpoints. For a DV product to be considered a desktop management solution, it must also address the functional requirements listed in Section 2. For example, a DV solution should have an image management sub-system for constructing, configuring and delivering desktop images to virtual endpoints. In addition, on-going incremental updates to the images in the form of software and patch updates and application delivery should be supported. Finally, a comprehensive solution should include an integrated method for data protection and business continuity. There are two main types of desktop virtualization: Server-based DV Whereby the desktops execute in the data center on a pool of virtual machines, and are accessed by users via a thin-client protocol such as RDP or ICA. Such systems use a connection broker, which is an intermediary system component that accepts user requests, authenticates them, and provisions a virtual machine (possibly on-demand) loaded with the user s virtual desktop. In addition, a system for managing a pool of VMs to match the needs of end users and overall system load must be in place. Server-based DV is particularly relevant in LAN environments with fixed connectivity and can be effective for task workers, who often access limited application sets and have minimal requirements to keep data on the desktop. Client-based DV In this model, the desktop image (also referred to as a guest OS) executes on a virtual machine that is hosted on the client endpoint, as opposed to running in the data-center. One relevant use case for client-based DV is when the physical desktops are owned and managed by the end-user (also known as Bring Your Own PC, or BYOPC). Another use case is for third party contractors that need temporary access to a corporate PC to conduct their work. They are, however, less relevant for enterprise-owned PCs, where IT needs to manage both the PC and the native operating system. Client-based DV can be further classified into two types: o Type-2 Hypervisor The virtual machine runs as a process on top of a standard host operating system such as Windows or Mac-OS. The underlying host OS is completely unmanaged and not part of the DV solution. Because the OS is completely abstracted from the hardware, type-2 hypervisors offer more portability. o Type-1 (bare metal) Hypervisor The virtual machine runs on a specialized OS (e.g., Xen) that executes on bare-metal hardware and is dedicated and optimized to execute VMs. Type-1 hypervisors allow for faster access to the hardware and they can offer better security. Page 7

8 4.1 Desktop Virtualization Challenges While Desktop Virtualization is effective for certain use cases as described above, it introduces many challenges, especially when applied to distributed laptop users Server-Based DV Challenges User-experience for distributed and mobile knowledge workers While today s server-based DV systems can offer adequate user experience for task workers that are connected over LAN and use simple applications, they do not provide reasonable user experience for distributed and mobile knowledge workers, who are often connected over WAN and VPN connections, use sophisticated applications (e.g., enhanced graphics) and consume rich media. o Predictable performance Users don t want to depend on the network for every keyboard stroke or mouse movement they make, especially when they are mobile or connect from different networks to the data center. o Offline Many laptop users must be able to operate offline when not connected or when connectivity is intermittent or slow. Workflow consistency Server-based DV is a different paradigm for end users that can require a complete shift in how they work. Further, the transition from thick to thin clients requires many significant changes in IT process. Compute and storage infrastructure build out - Server based DV requires significant infrastructure build-out in both compute and storage resources, since all desktops now need to execute in real time, as well as be stored in the data center Client-based DV challenges Image Size: A major challenge in client-based DV is how to maintain and deliver a large multi-gb virtual machine image to remote endpoints over the WAN. Backup over WAN: A similar challenge exists for data protection how to continuously and efficiently protect remote/mobile laptops over WAN, especially for knowledge workers who generate large files in their desktops and install their own applications. Type-2 Hypervisor-specific issues: There are a number of challenges that are specific to a Type- 2 hypervisor, including: o Unmanaged Host OS This model leaves the underlying host OS unmanaged, yet the operation of the guest-managed OS depends on the health of the host OS. Furthermore, IT still needs to manage the host OS in many cases (e.g., using traditional systems management software), so the fundamental desktop management problem remains unresolved. o Security A compromised host OS can make the guest OS vulnerable to security attacks. o Performance Since the guest VM/OS runs as a process, its performance is degraded every access to devices needs to be translated via the host OS. Furthermore, each OS needs to run anti-virus and other infrastructure software, further taxing the shared CPU. Page 8

9 Type-1 hypervisor-specific issues: Additional challenges that are associated with Type-1 hypervisors include: o General availability One of the main challenges in type-1 HV is lack of wide support for drivers (especially paravirtualized drivers, which are optimized for a type-1 environment), particularly in the mobile laptop world with many unique devices such as power status, GPU access, multi-touch pointers, and fingerprint readers. In addition, most type-1 hypervisors require hardware assisted virtualization, which is not available on all hardware platforms. o Deployment Deployment is generally harder than with type-2 hypervisors because the type-1 needs to be installed on the bare-metal, wiping out the previous image, and then the managed OS must be re-deployed on top of the type-1 HV. o Managing the hypervisor The Hypervisor OS still needs to be managed and maintained in addition to the managed host OS Common DV Challenge: Supporting Single Image Management with User Personalization A basic premise behind DV-based management is the provisioning and management of virtual PCs, which are essentially virtual disk images encapsulated in a VMDK (or VHD) file. This approach allows IT to create a common image for all endpoints (unlike physical devices in which images differ based on the hardware configuration of the target device). However, the delivery of whole VMs implies that these systems cannot cope with any persistent changes made by the user. For example, if a user installs an application on top of the provisioned VM, the application would be kept on a delta disk, which together provides a uniform view of the modified virtual disk. However, if the IT administrator changes the common VM image and distributes it to the endpoints, any changes made by the user will be removed. In other words, there is typically no support for merging persistently user-installed changes that must exist in the system virtual machine disk. This challenge exists in both server-based and clientbased DV. 5 Addressing the Desktop Management Challenges As we observed, traditional systems management solutions, which can be effective in LAN-based settings, are complex to manage, interfere with end-user operations, lack integrated support for backup, continuity and support, and are particularly challenging when supporting distributed users. DV solutions improve on some of the issues by keeping and managing the desktop instances in the datacenter, enhancing protection, support, security and continuity. However, they introduce a new set of challenges, particularly for endpoints that are mobile and distributed, including offline support, performance, user-experience over WAN, personalization preservation, disruption to existing models, and high cost of the overall solution. Page 9

10 A key question is whether a third solution category can be found. This paper claims there is such model, as highlighted below. 5.1 Distributed Desktop Virtualization (DDV) The DDV model reconciles the seemingly conflicting requirements of centralization and user-experience. Instead of moving the entire desktop to the data center, including the physical compute resources and desktop image, as is the case with server-based DV solutions; or alternatively keeping the entire desktop at the end-point desktop, as is the case with SM and client-based DV solutions DDV offers a third alternative. Specifically designed to address the needs of distributed organizations, DDV can uniquely: Migrate the complete image of each desktop instance (including OS, applications, and all user data), into the data center so that they can be managed and protected centrally. Use the physical compute resources at the endpoint to execute the desktop workloads on a secondary (or cached) copy of the desktop image giving the end user local execution, including performance, the ability to personalize, and operate offline. Modularize the desktop image into three logical layers an IT-managed base image (OS and core IT applications), user-installed applications and settings, and user-data. Provide for efficient and consistent bi-directional synchronization between the centrally-stored and distributed desktop copies, in which the managed base-image propagates down to endpoints, while personally-generated data and user-installed applications continuously propagate up for backup and continuity purposes. Provide the capability to quickly reassign and stream the logical desktop onto different execution containers across geographical distances and over WAN, using optimizations and inplace image swapping technologies. Provide the capability to reassign logical desktops to different hardware platforms, as well as transition between physical and virtual machines. Leverage the endpoints already deployed, and ensure optimal efficiency across the network, server and storage infrastructure. The key advantage of this approach is in aligning the roles and responsibilities of the different types of users with their location and environment. That is, IT administrators can consolidate the management, protection and control of all desktop images in one location at the data center (in a similar fashion to what VDI systems offer), while end users execute the applications and access their personal data locally at the distributed endpoints (in a similar fashion to thick client environments managed by systems management tools), hence with good performance, offline capability, and native user-experience. While most organizations will harness a range of solutions to meet their varying needs, new solutions are available that are specifically designed to unify desktop management and data protection across distributed organizations. For more details on this architecture, visit Wanova.com/architecture. Page 10

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Citrix XenDesktop 2.0. Michael Schmidt Country Manager Switzerland Citrix Systems International GmbH

Citrix XenDesktop 2.0. Michael Schmidt Country Manager Switzerland Citrix Systems International GmbH Citrix XenDesktop 2.0 Michael Schmidt Country Manager Switzerland Citrix Systems International GmbH XenDesktop Citrix XenDesktop makes the delivery of Windows desktops from your datacenter simple, secure

More information

Securing the Data Center against

Securing the Data Center against Securing the Data Center against vulnerabilities & Data Protection Agenda Virtual Virtualization Technology How Virtualization affects the Datacenter Security Keys to a Secure Virtualized Deployment and

More information

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved. Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now

More information

Deploying VMware Mirage : Tips and Tricks for Success

Deploying VMware Mirage : Tips and Tricks for Success Deploying VMware Mirage : Tips and Tricks for Success Yaniv Weinberg Horizon Mirage Product Specialists Team leader 2014 VMware Inc. All rights reserved. Agenda 1 What is VMware Mirage? 2 What s new in

More information

Windows Server 2012 Hands- On Camp. Learn What s Hot and New in Windows Server 2012!

Windows Server 2012 Hands- On Camp. Learn What s Hot and New in Windows Server 2012! Windows Server 2012 Hands- On Camp Learn What s Hot and New in Windows Server 2012! Your Facilitator Damir Bersinic Datacenter Solutions Specialist Microsoft Canada Inc. damirb@microsoft.com Twitter: @DamirB

More information

How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER

How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER How VMware Mirage Complements and Extends Microsoft System Center Configuration Manager TECHNICAL WHITE PAPER Table of Contents. Introduction... 3 Intended Audience.... 3 What Is VMware Mirage?... 3 What

More information

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions

VMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop

More information

Deploying Application and OS Virtualization Together: Citrix and Virtuozzo

Deploying Application and OS Virtualization Together: Citrix and Virtuozzo White Paper Deploying Application and OS Virtualization Together: Citrix and Virtuozzo www.swsoft.com Version 1.0 Table of Contents The Virtualization Continuum: Deploying Virtualization Together... 3

More information

Desktop virtualization for all

Desktop virtualization for all Desktop virtualization for all 2 Desktop virtualization for all Today s organizations encompass a diverse range of users, from road warriors using laptops and mobile devices as well as power users working

More information

A Guide To Evaluating Desktop Virtualization Solutions

A Guide To Evaluating Desktop Virtualization Solutions A Guide To Evaluating Desktop Virtualization Solutions Takeaway Guide Table of Contents What To Look For In Evaluating Desktop Virtualization.........3 Achieving the Optimal Benefits of Desktop Virtualization.......7

More information

Image Management for View Desktops using Mirage

Image Management for View Desktops using Mirage Image Management for View Desktops using Mirage Mirage 5.9.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation

Whitepaper. Endpoint Strategy: Debunking Myths about Isolation Whitepaper Endpoint Strategy: Debunking Myths about Isolation May 2018 Endpoint Strategy: Debunking Myths about Isolation Endpoints are, and have always been, a major cyberattack vector. Attackers, aiming

More information

Traditional Desktop Deployment. Desktop Delivery Vision. End to End desktop virtualization. virtualization. virtualization

Traditional Desktop Deployment. Desktop Delivery Vision. End to End desktop virtualization. virtualization. virtualization End to End desktop virtualization End to End desktop virtualization Martijn Martijn Bosschaart Bosschaart End to End desktop virtualization Channel Channel Systems Systems Engineer Engineer Netherlands

More information

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s

Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s I D C T E C H N O L O G Y S P O T L I G H T Ret h i n k i n g Security f o r V i r t u a l Envi r o n m e n t s April 2012 Adapted from Market Analysis Perspective: Enterprise Virtualization Software Mainstream

More information

The McAfee MOVE Platform and Virtual Desktop Infrastructure

The McAfee MOVE Platform and Virtual Desktop Infrastructure The McAfee MOVE Platform and Virtual Desktop Infrastructure Simplifying and accelerating security management for virtualized environments Table of Contents Wish List of Security Elements for Virtualized

More information

Data Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM

Data Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM Rethinking Data Protection Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM Today s Reality: The Rules of the Game Have Changed for Data Protection EXPLOSION OF DATA DATA EVERYWHERE

More information

Tony Paikeday Sr. Solutions Marketing Manager. Chris Westphal Sr. Product Marketing Manager. C Cisco Systems, Inc.

Tony Paikeday Sr. Solutions Marketing Manager. Chris Westphal Sr. Product Marketing Manager. C Cisco Systems, Inc. Regain Control of the Desktop: Cisco Desktop Virtualization Solution with VMware View 4.6 Tony Paikeday Sr. Solutions Marketing Manager Chris Westphal Sr. Product Marketing Manager 1 Today s Agenda Cisco

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers Parallels Virtuozzo Containers White Paper Deploying Application and OS Virtualization Together: Citrix and Parallels Virtuozzo Containers www.parallels.com Version 1.0 Table of Contents The Virtualization

More information

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Securing the Empowered Branch with Cisco Network Admission Control. September 2007 Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations

More information

Understanding VDI End-to-End

Understanding VDI End-to-End Understanding VDI End-to-End Cloud Client-Computing Dario Gnaccarini Sales Engineer Cloud client-computing Matteo Mazzari Principal Consultant Services Compute continues to change 3 Billion people worldwide

More information

VMware Horizon Mirage 4.0 Reviewer s Guide REVIEWER S GUIDE

VMware Horizon Mirage 4.0 Reviewer s Guide REVIEWER S GUIDE VMware Horizon Mirage 4.0 Reviewer s Guide REVIEWER S GUIDE Table of Contents Introduction.... 5 Audience.... 5 Objectives: What You Will Learn.... 5 Navigating This Document for Key Horizon Mirage Use

More information

Controlling Costs and Driving Agility in the Datacenter

Controlling Costs and Driving Agility in the Datacenter Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,

More information

Introduction and Data Center Topology For Your System

Introduction and Data Center Topology For Your System Introduction and Data Center Topology For Your System This chapter provides an introduction, a data center overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,

More information

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today Agenda 1 Today s IT Challenges 2 Symantec s Collaborative Architecture 3 Symantec TM Endpoint Management Suite 4 Connecting Symantec Technologies Today 5 Q & A 1 Traditional Protection isn t Good Enough

More information

VMware Horizon Suite:

VMware Horizon Suite: VMware Horizon Suite: The Platform for Workforce Mobility Ralf von Gunten Sr. Systems Systems Engineer 2010 VMware Inc. All rights reserved Disclaimer This presentation may contain product features that

More information

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Global Headquarters: 5 Speen Street Framingham, MA USA P F Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E x t e n d i n g P C L i f e - C y c l e M a n a g e m e n t a n d C l i e n

More information

VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla. Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc.

VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla. Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc. VDI What is it? Virtual Desktop Infrastructure in Plain Vanilla Clifford Gabriel Data Center and Virtualization Trends and Technologies Inc. Trends and Technologies Inc. Gold Partner - Cisco Enterprise

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8

More information

Migration and Building of Data Centers in IBM SoftLayer

Migration and Building of Data Centers in IBM SoftLayer Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into

More information

Solution Track 4 Design a Scalable Virtual Desktop Infrastructure

Solution Track 4 Design a Scalable Virtual Desktop Infrastructure Solution Track 4 Design a Scalable Virtual Desktop Infrastructure Irene Yeoh System Consultant, VCP VMware, Inc. September 2008 Basics of Virtual Desktop Infrastructure (VDI) Ease of provisioning Migration

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

VMware Horizon FLEX 1.5 WHITE PAPER

VMware Horizon FLEX 1.5 WHITE PAPER WHITE PAPER Table of Contents What Is VMware Horizon FLEX?... 3 Terminology for Horizon FLEX.... 4 Key Benefits of Horizon FLEX... 4 Deploying Horizon FLEX.... 5 Tested Host Operating Systems for Horizon

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

Simplify Backups. Dell PowerVault DL2000 Family

Simplify Backups. Dell PowerVault DL2000 Family Simplify Backups Dell PowerVault DL2000 Family SIMPLIFYING I T The Dell PowerVault DL2000 family helps reduce the cost and complexity of backups and restores, freeing up valuable resources that you can

More information

Virtualization manager

Virtualization manager Red Hat Enterprise Virtualization manager for Desktops Delivering on the promises of hosted virtual desktops www.redhat.com TABLE OF CONTENTS 3 Benefits of desktop virtualization 3 Benefits for IT Departments

More information

Ensure Virtualization Security and Improve Business Productivity with Kaspersky

Ensure Virtualization Security and Improve Business Productivity with Kaspersky Ensure Virtualization Security and Improve Business Productivity with Kaspersky Kaspersky Security for Virtualization Agenda Virtualization Overview Kaspersky Virtualization Review New Virtualization Product

More information

INTEGRATING DELL EQUALLOGIC SANS WITH CITRIX XENSERVER

INTEGRATING DELL EQUALLOGIC SANS WITH CITRIX XENSERVER WHITE PAPER INTEGRATING DELL EQUALLOGIC SANS WITH CITRIX XENSERVER REALIZING VIRTUALIZATION S FULL POTENTIAL Hypervisor-based virtualization offers enterprises opportunities for cost savings, increased

More information

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability

Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability IT teams in companies of all sizes face constant pressure to meet the Availability requirements of today s Always-On

More information

The Virtues of Virtualization and the Microsoft Windows 10 Window of Opportunity

The Virtues of Virtualization and the Microsoft Windows 10 Window of Opportunity The Virtues of Virtualization and the Microsoft Windows 10 Window of Opportunity Cisco HyperFlex VDI for Citrix Market trends and VDI drivers The IT industry is trending toward small, incrementally expandable

More information

VMware Horizon View. Read more VMWARE solutions. Contact Us MicroAge.com

VMware Horizon View. Read more VMWARE solutions. Contact Us MicroAge.com Read more VMWARE solutions Contact Us 800-544-8877 solutions@microage.com MicroAge.com DATASHEET VMware Horizon View Deliver Desktop Services from Your Cloud AT A GLANCE VMware Horizon View delivers desktop

More information

20 Fast Facts About Microsoft Windows Server 2012

20 Fast Facts About Microsoft Windows Server 2012 20 Fast Facts About Microsoft Windows Server 2012 Laying the Cornerstone of the Next Generation of Computing Contents Virtualization and the Cloud................................................2 Data

More information

DEPLOYMENT WHITE PAPER.

DEPLOYMENT WHITE PAPER. DEPLOYMENT WHITE PAPER www.seavusprojectviewer.com Deployment Options Seavus Project Viewer provides a wide variety of deployment options: Single User installation is a stand-alone, web downloadable configuration

More information

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About

More information

WHITE PAPER. Desktop Virtualization Efficiencies with Citrix and NetApp. By Mark Bowker. October, 2008

WHITE PAPER. Desktop Virtualization Efficiencies with Citrix and NetApp. By Mark Bowker. October, 2008 WHITE PAPER Desktop Virtualization Efficiencies with Citrix and NetApp By Mark Bowker October, 2008 Table of Contents Table of Contents... i Executive Summary... 1 Virtualization is Sweeping Through the

More information

WHITE PAPER Resolving Common Challenges in Virtualized Environments IDC OPINION IN THIS WHITE PAPER SITUATION OVERVIEW. Sponsored by: Symantec

WHITE PAPER Resolving Common Challenges in Virtualized Environments IDC OPINION IN THIS WHITE PAPER SITUATION OVERVIEW. Sponsored by: Symantec WHITE PAPER Resolving Common Challenges in Virtualized Environments Sponsored by: Symantec Carla Arend January 2011 Nick Sundby IDC OPINION IDC EMEA, 389 Chiswick High Road, London, W4 4AE, U.K. Tel.+44.20.8987.7100

More information

BUSINESS CONTINUITY: THE PROFIT SCENARIO

BUSINESS CONTINUITY: THE PROFIT SCENARIO WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access

More information

Features. HDX WAN optimization. QoS

Features. HDX WAN optimization. QoS May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified

More information

Virtualization. Michael Tsai 2018/4/16

Virtualization. Michael Tsai 2018/4/16 Virtualization Michael Tsai 2018/4/16 What is virtualization? Let s first look at a video from VMware http://www.vmware.com/tw/products/vsphere.html Problems? Low utilization Different needs DNS DHCP Web

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server

How Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server How Parallels RAS Enhances Microsoft RDS White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Overview of Microsoft Remote Desktop Services... 3 Microsoft RDS Pain Points...

More information

Chapter 10 Protecting Virtual Environments

Chapter 10 Protecting Virtual Environments Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they

More information

Citrix Workspace Cloud

Citrix Workspace Cloud Citrix Workspace Cloud Roger Bösch Citrix Systems International GmbH Workspace Cloud is a NEW Citrix Management and Delivery Platform Customers Now Have a Spectrum of Workspace Delivery Options Done By

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance. Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do

More information

Migration. 22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1

Migration. 22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1 22 AUG 2017 VMware Validated Design 4.1 VMware Validated Design for Software-Defined Data Center 4.1 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/

More information

VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager

VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager VMware Join the Virtual Revolution! Brian McNeil VMware National Partner Business Manager 1 VMware By the Numbers Year Founded Employees R&D Engineers with Advanced Degrees Technology Partners Channel

More information

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER

Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Advanced Architecture Design for Cloud-Based Disaster Recovery WHITE PAPER Introduction Disaster Recovery (DR) is a fundamental tool for mitigating IT and business risks. But because it is perceived as

More information

Virtualization Overview

Virtualization Overview VMware W Hwhite I T E Ppaper A P E R Virtualization Overview Table of Contents Introduction... 3 Virtualization in a Nutshell... 3 Virtualization Approaches... 4 Virtualization for Server Consolidation

More information

Measuring VDI Fitness and User Experience Technical White Paper

Measuring VDI Fitness and User Experience Technical White Paper Measuring VDI Fitness and User Experience Technical White Paper 3600 Mansell Road Suite 200 Alpharetta, GA 30022 866.914.9665 main 678.397.0339 fax info@liquidwarelabs.com www.liquidwarelabs.com Table

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

CS 356 Operating System Security. Fall 2013

CS 356 Operating System Security. Fall 2013 CS 356 Operating System Security Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5 Database

More information

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration By Zeus Kerravala, Founder and Principal Analyst with ZK Research Contents Introduction: Effective File Collaboration Is

More information

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 03 Date 2018-05-23 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Developing an Enterprise Client Virtualization Strategy

Developing an Enterprise Client Virtualization Strategy White Paper Intel Information Technology Computer Manufacturing Client Virtualization Developing an Enterprise Client Virtualization Strategy Intel IT is investigating virtualization because it has the

More information

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)

More information

Enterprise print management in VMware Horizon

Enterprise print management in VMware Horizon Enterprise print management in VMware Horizon Introduction: Embracing and Extending VMware Horizon Tricerat Simplify Printing enhances the capabilities of VMware Horizon environments by enabling reliable

More information

Virtualization for your enterprise. A Dell Networking White Paper

Virtualization for your enterprise. A Dell Networking White Paper Virtualization for your enterprise A Dell Networking White Paper THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED

More information

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst

Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst ESG Lab Review Shavlik Protect: Simplifying Patch, Threat, and Power Management Date: October 2013 Author: Mike Leone, ESG Lab Analyst Abstract: This ESG Lab Review documents hands-on testing of Shavlik

More information

2013 InterWorks, Page 1

2013 InterWorks, Page 1 2013 InterWorks, Page 1 The BYOD Phenomenon 68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets. IT organizations

More information

Virtual Disaster Recovery

Virtual Disaster Recovery The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the usage

More information

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security

More information

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of

More information

UP B03 - Don't expire: Simplify Your Windows Migration Patrick Tyler - Distinguished System Engineer Mike Holmes IT HQ Department of the US Army

UP B03 - Don't expire: Simplify Your Windows Migration Patrick Tyler - Distinguished System Engineer Mike Holmes IT HQ Department of the US Army UP B03 - Don't expire: Simplify Your Windows Migration Patrick Tyler - Distinguished System Engineer Mike Holmes IT HQ Department of the US Army Simplify Your Windows Migration 1 2 Why Will You Migrate

More information

Powering Transformation With Cisco

Powering Transformation With Cisco Shape Your Business For the Future: Powering Transformation With Cisco Cisco VXI : Delivering The Next Generation of Virtualized Environment Herdiman Eka Wijaya 12 June 2012 Agenda What is Desktop Virtualization?

More information

Windows 7 Done Right: From Migration to Implementation

Windows 7 Done Right: From Migration to Implementation I D C E X E C U T I V E B R I E F Windows 7 Done Right: From Migration to Implementation Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com July 2010

More information

Introduction and Datacenter Topology For Your System

Introduction and Datacenter Topology For Your System Introduction and Datacenter Topology For Your System This chapter provides an introduction, a datacenter overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,

More information

VMware Mirage Web Management Guide. VMware Mirage 5.9.1

VMware Mirage Web Management Guide. VMware Mirage 5.9.1 VMware Mirage Web Management Guide VMware Mirage 5.9.1 VMware Mirage Web Management Guide You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Storage Solutions for VMware: InfiniBox. White Paper

Storage Solutions for VMware: InfiniBox. White Paper Storage Solutions for VMware: InfiniBox White Paper Abstract The integration between infrastructure and applications can drive greater flexibility and speed in helping businesses to be competitive and

More information

VMware View. John Mah Systems Consultant HP: +60 (12) VMware Malaysia

VMware View. John Mah Systems Consultant HP: +60 (12) VMware Malaysia VMware View Achieving Operational Efficiency through Desktop Virtualization John Mah Systems Consultant HP: +60 (12) 3004 118 Email: jmah@vmware.com VMware Malaysia Dennis Tio Shawn Tan Product Management

More information

Changing face of endpoint security

Changing face of endpoint security Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L

More information

vsan Disaster Recovery November 19, 2017

vsan Disaster Recovery November 19, 2017 November 19, 2017 1 Table of Contents 1. Disaster Recovery 1.1.Overview 1.2.vSAN Stretched Clusters and Site Recovery Manager 1.3.vSAN Performance 1.4.Summary 2 1. Disaster Recovery According to the United

More information

What s New in VMware vsphere 5.1 Platform

What s New in VMware vsphere 5.1 Platform vsphere 5.1 Platform VMware vsphere 5.1 TECHNICAL MARKETING DOCUMENTATION V 2.0 / UPDATED JUNE 2012 Table of Contents Introduction... 3 vsphere Platform Enhancements... 3 User Access... 3 Auditing....

More information

IBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute)

IBM Endpoint Manager. OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) IBM Endpoint Manager OS Deployment V3.8 User's Guide - DRAFT for Beta V.1.0 (do not distribute) Note Before

More information

VMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved.

VMware Overview VMware Infrastructure 3: Install and Configure Rev C Copyright 2007 VMware, Inc. All rights reserved. VMware Overview Kontakt: jens.soeldner@netlogix.de 1-1 You Are Here Virtual Infrastructure VMware Overview ESX Server Installation ESX Server Installation Networking Networking Storage Storage ESX Server

More information

Micro Focus Desktop Containers

Micro Focus Desktop Containers White Paper Security Micro Focus Desktop Containers Whether it s extending the life of your legacy applications, making applications more accessible, or simplifying your application deployment and management,

More information

D. By deleting the difference disks of the virtual machines within the Delivery Group

D. By deleting the difference disks of the virtual machines within the Delivery Group Volume: 138 Questions Question: 1 A Citrix Administrator updates all of the machines within a Delivery Group. After the update, an application stops working. The IT manager tells the administrator to revert

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

About the XenClient Enterprise Solution

About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution XenClient Enterprise is a distributed desktop virtualization solution that makes

More information

Cisco VXI Smart Solution with VMware View

Cisco VXI Smart Solution with VMware View Cisco VXI Smart Solution with VMware View What You Will Learn IT departments are inundated with user demands for wider mobile access, video and interactive multimedia services, new devices, and more flexible

More information

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview.

Citrix Connector Citrix Systems, Inc. All rights reserved. p.1. About this release. System requirements. Technical overview. Citrix Connector 3.1 May 02, 2016 About this release System requirements Technical overview Plan Install Citrix Connector Upgrade Create applications Deploy applications to machine catalogs Publish applications

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments

IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments The Challenges ESG Lab Review IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments Date: August 2015 Author: Vinny Choinski, Senior

More information