Virtual Desktop Battle Of The Giants


Published on

Published in: Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Welcome to our Executive Technology Exchange. This morning we are talking about the Virtual Desktop Technology solutions that are available. We hope that you find our presentation informative and please feel free to provide us with your feedback.
  • Virtual Desktop Battle Of The Giants

    1. 1. Virtual Desktop Battle of the Giants Xen Desktop VS VMware VDI
    2. 2. The Traditional Windows Desktop Applications Hardware User Interface Operating System
    3. 3. The Desktop Challenge Hardware Operating System User Profile Data OS Files Local Storage Applications Hard Drive Memory System Board Processor Component Risk Ramifications Hardware Disk Drive Failure Memory Failure Processor Failure System Board Failure Lost Data Lost Time Lost $$$$ Operating System Patch Failure OS Corruption Virus / Malware Applications Patch Failure Data Corruption Application Compatibility User Profile Profile Corruption Data Lost Data Corrupted Data
    4. 4. What is Virtual Desktop Technology? <ul><li>Similar to Virtual Servers in that desktops are hosted as virtual devices on a virtual delivery platform </li></ul><ul><li>Allows easy replication and deployment of a standard image </li></ul><ul><li>Enforces platform standardization </li></ul><ul><li>Extends the useful life of existing desktop infrastructure </li></ul>
    5. 5. 3 Delivery Architectures VM Desktop Server Desktops Hardware Windows Server 2003 / 2008 User User User Workstation Desktops XP or Vista XP or Vista Traditional Desktop Desktop User User Blade Hardware VDI or XenDesktop XP or Vista User User XP or Vista
    6. 6. How does your Help Desk spend their time? Reactionary tasks SW, patches, and Q&A Network ops support Strategic project work
    7. 7. Why Do Something Different? The Traditional Approach <ul><li>Desktop administrators DEPLOY their Windows desktops. </li></ul><ul><li>Provision and manage every desktop. Create and manage a unique image for every device or user role. </li></ul><ul><li>Secure every endpoint to prevent data loss and malware. Constantly rollout patches. </li></ul><ul><li>Support users at every remote location, including those using “untrusted” desktops. </li></ul><ul><li>Perform hardware refreshes or retire desktops to support growing application needs for more computing power. </li></ul>Traditional desktop deployment is slow, expensive, and not secure. It provides low visibility into user experience and limits operational flexibility.
    8. 8. Why Do Something Now? A Better Approach <ul><li>DELIVER Windows desktops as a managed and secure service. </li></ul><ul><li>Provision, manage, and refresh desktops centrally. </li></ul><ul><li>Secure desktops within the data center. </li></ul><ul><li>Deliver virtual desktops on-demand, providing each type of user the exact resources they need, when they need them. </li></ul><ul><li>Proactively monitor and measure the end-user experience. </li></ul>Desktop delivery reduces the cost and complexity of desktop management, enhances security, increases flexibility, and improves end-user productivity and satisfaction.
    9. 9. Why do we actually want to control end-user devices? <ul><li>Reason #1: Productivity </li></ul><ul><ul><li>Deliver users consistent, reliable access to corporate applications and specific data </li></ul></ul><ul><ul><li>The device is part of that equation </li></ul></ul><ul><li>Reason #2: Network Security Risks </li></ul><ul><ul><li>Environments with missing patches, out of date anti-virus signatures, and missing firewalls can introduce infections or breaches </li></ul></ul><ul><li>Reason #3: Software Licensing Compliance </li></ul><ul><ul><li>Installations on unmanaged devices can be a violation of commercial licenses </li></ul></ul><ul><li>Reason #4: Corporate Data Risk </li></ul><ul><ul><li>Accidental loss or theft via Email </li></ul></ul><ul><ul><li>Theft from infections or key loggers </li></ul></ul><ul><ul><li>Theft from lost/discarded personal hard drives or portable media </li></ul></ul><ul><li>Reason #5: Employee Risk </li></ul><ul><ul><li>Employees quit (or are fired) all the time </li></ul></ul><ul><li>Reason #6: Keep costs as low as possible </li></ul><ul><ul><li>Supporting more, varied, unknown devices presents likely increases in costs </li></ul></ul>
    10. 10. Citrix XEN Desktop or VMware VDI ?
    11. 11. Why VMware VDI? <ul><li>VMware has been virtualizing operating systems for over 10 years </li></ul><ul><li>Integrated Application Steaming </li></ul><ul><li>Enterprise-class, scalable connection broker </li></ul><ul><li>Automatic desktop provisioning with optional “smart pooling” </li></ul><ul><li>Desktop persistence and secure tunneling options </li></ul><ul><li>Microsoft AD integration </li></ul><ul><li>Usability enhancements (such as USB redirection) </li></ul><ul><li>End-to-end enterprise-class desktop control and manageability </li></ul><ul><li>Familiar end user experience </li></ul><ul><li>Tightly integrated with VMware’s proven virtualization platform (VI3) </li></ul><ul><li>Scalability, security and availability suitable for organizations of all sizes </li></ul>
    12. 12. Enterprise Desktop Virtualization Choices <ul><li>Client side Solution –ACE 2 </li></ul><ul><li>Users take their desktops in a secure VM with them on portable media devices or laptops </li></ul><ul><li>Fully locked down VMs with full virtual disk encryption, device mgmt & network access control </li></ul><ul><li>Dynamic policies management </li></ul><ul><li>Server hosted Solution – VDI </li></ul><ul><li>Virtual desktops reside safe & secure in a corporate data center </li></ul><ul><li>Remote PCs connect from any device running a remote display protocol (e.g. RDP) </li></ul>
    13. 13. Virtual Desktop Infrastructure (VDI) <ul><li>Remote desktops within a firewall </li></ul><ul><li>Users need access to their own desktop </li></ul><ul><li>Thin clients offer improved reliability and economics </li></ul><ul><li>Reduces mgmt and support problems </li></ul>
    14. 14. VDI – Basic Implementation <ul><ul><li>A “One-to-One” relationship between endpoints and Virtual Machines is established </li></ul></ul><ul><ul><li>End-users are assigned the hostname of a VM which belongs to them. </li></ul></ul><ul><ul><li>Connections take place over an existing secured corporate network. </li></ul></ul><ul><ul><li>Remote viewing of VMs is done through desktop RDP software or the built-in features of a thin client. </li></ul></ul>
    15. 15. VDI – Simple Brokering Connection Broker <ul><ul><li>End-users are given a web address on the corporate network for the connection broker. </li></ul></ul><ul><ul><li>After authenticating, the connection broker provides a list of available resources to the end-user. </li></ul></ul><ul><ul><li>Enables pooling, provisioning, and other advanced management features. </li></ul></ul><ul><ul><li>Integrates with Directories (AD) and VirtualCenter. </li></ul></ul>
    16. 16. VDI – Tunneled Brokering Connection Broker Corporate Firewall <ul><ul><li>End-users are given a public web address for the connection broker. </li></ul></ul><ul><ul><li>After authenticating, the connection broker provides a list of available resources to the end-user. </li></ul></ul><ul><ul><li>The connection broker links the end-user via an encrypted tunnel to the VM. </li></ul></ul><ul><ul><li>The encrypted tunnel is a mini-VPN component designed to route only RDP traffic. </li></ul></ul>
    17. 17. VDI – Key Components VMware VI3 Platform Hosted virtual desktops VMware Virtual Desktop Manager Manages connection from client to hosted desktop. Active Directory User authentication VMware VirtualCenter Manages the VI3 platform Clients
    18. 18. Application Virtualization <ul><ul><li>Need for more secure desktops </li></ul></ul><ul><ul><li>Downtime and support too expensive </li></ul></ul><ul><ul><li>Increasing cost of Application Deployment and Desktop Management with higher security requirements </li></ul></ul><ul><ul><li>Pressure to reduce infrastructure cost by centralizing IT </li></ul></ul><ul><ul><li>Migration to XP, Vista, and .NET </li></ul></ul><ul><ul><li>Business Continuity and Disaster Recovery </li></ul></ul>
    19. 19. VDI – Key Benefits <ul><li>C O M P A T I B I L I T Y </li></ul><ul><ul><ul><li>Real Desktop Operating Systems </li></ul></ul></ul><ul><ul><ul><li>Isolation </li></ul></ul></ul><ul><li>V I R T U A L I Z A T I O N </li></ul><ul><ul><ul><li>Homogenous Virtual Hardware </li></ul></ul></ul><ul><ul><ul><li>VDI is Virtual Infrastructure </li></ul></ul></ul><ul><li>C E N T R A L I Z A T I O N </li></ul><ul><ul><li>Close to IT Operations </li></ul></ul><ul><ul><li>Application Performance </li></ul></ul><ul><ul><li>Security </li></ul></ul>
    20. 20. Why Citrix? The Citrix Dynamic Desktop Initiative brings together key industry players such as Microsoft, VMware, IBM, HP, Dell, Wyse, Neoware, and others to provide the most comprehensive desktop delivery solutions. Citrix is the market leader in delivering virtual Windows desktops with an estimated 10 million desktops to date. Citrix is the only company which can offer end-to-end Application Delivery Infrastructure for both application and desktop delivery.
    21. 21. Integrated Application Delivery Infrastructure Users Apps Users
    22. 22. Integrated Application Delivery Infrastructure
    23. 23. Integrated Application Delivery Infrastructure