• Save
Hosted Virtual Desktops and Streamed Applications
Upcoming SlideShare
Loading in...5
×
 

Hosted Virtual Desktops and Streamed Applications

on

  • 289 views

 

Statistics

Views

Total Views
289
Views on SlideShare
289
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Transition – What are Hosted Virtual Desktops?
  • Tenant isolation with encrypted drives, private vlan’s and shared computeU2Cloud provides end-to-end encryption through transport and Encrypted Drive to meet compliancy requirements.Transition – Let look at the virtualization lifecycle for desktops and applications

Hosted Virtual Desktops and Streamed Applications Hosted Virtual Desktops and Streamed Applications Presentation Transcript

  • HOSTED VIRTUAL DESKTOPS & STREAMED APPLICATIONS
  • The WhoU2Cloud is a leader in hosting Microsoft collaborative software solutions andbusiness productivity suites. Our customers range from Fortune 500 companiesto small consulting firms that would like to improve efficiencies and interactionswith their customers.
  • DeliveryOur solutions’ provide users with a secure, full-featured media-rich computingexperience with the latest productivity and entertainment applications. Ourproducts are delivered on-demand through the Internet to Smartphone’s, Tablets,PC’s, Macs or connected TVs.
  • U2Cloud is platform agnostic and only partners with the leadingtechnology manufacturers ensuring a robust and flexible solutionto better fit our clients ever-changing needs.
  • The What - Hosted Virtual Desktops (HVD)Hosted Virtual Desktop (HVD) - Its your very own private Windows PC, thatyou can connect to from anywhere on the planet. Jump from tablet to laptopto phone and keep working without missing a beat.
  • The What - Hosted Virtual Desktops (HVD)HVD enables a centralized desktop strategy that allows for quick and secureaccess to applications and desktops. HVD’s can be accessed from any network-connected device, including new PCs, older hardware, and thin clients. Inaddition, all data and applications are stored centrally, ensuring a higher levelof data security and helping simplify regulatory compliance.
  • The What - Hosted Virtual Desktops (HVD)When using HVD, you can present users with an entire desktop environment orjust the individual applications. Data is centrally stored and can be accessed byhosted virtual desktops or SaaS applications. From a user perspective, theseapplications are integrated seamlessly. They look, feel and behave like localapplications
  • Anytime, Anywhere, Any Device!Existing PC & MACWorkstationsThin ClientsExisting LaptopsApple Laptops &Chrome BooksiPadBlackberryAndroidiPhone
  • Intrinsic Benefits of HVDBusiness Continuity Business AgilityWork-Life BalancePredictable IT Costs Redefine the Role of IT Control and Compliance
  • Source: 451 Group 2012 Virtualization Market Report, October 2012The Hold-Up
  • The Initial Investment
  • Shared InfrastructureTo expensive to buildTo costly to maintainBuild once, Leverage infinitelyNot enough skilledresources toaccomplish
  • Secure & Compliant Multi-TenancyDesktop Virtualization LayerTenant 1 Tenant 2 PCI or HIPAA
  • < >Virtualization LifecycleCreateTemplateCustomizeDeploymentDeployServiceUpdateServiceBasic lifecycle of HVD andSaaS applications.Create “Golden Image” orvirtualized applicationApp customizations,preferences & securitySingle-to-many deploymentsSandboxed with zero impact onexisting systemsSoftware & security updatesApplication PatchingAdd-On Upgrades
  • The Flavors of VDINon-Persistentaka statelessThe major disadvantage of non-persistent desktops is that anycustomizations made by users and any applications that aredelivered outside of the base image are lost after each desktopreboot.• simple roll-out and update of basic images• guaranteed to be 100% identical• user always has the same (clean) desktop• less effort due to the standardization of images.• zero Windows configuration drift• less storage is required because a single base operatingsystem image can be shared across many desktopsTask WorkersKiosksCall CentersEDU & Training
  • The Flavors of VDIPersistentaka statefulThe major disadvantage of persistent desktops is the high cost.Persistent desktops also offer little operational cost savings, sincethey are managed one at a time like physical PCs, using the sameagent-based PC management tools.• users have freedom to install software within the desktop• personalization and settings maintain through reboots• least operational upheaval when migrating from PC model• users are assigned dedicated virtual machines & customresources which remain the same every time they loginDevelopers/ProgrammersDesignersEngineering CADFinancial Reporting
  • The Flavors of VDILayeredaka My Favorite• users have freedom to install software within the desktop• personalization and settings maintain through reboots• least operational upheaval when migrating from PC model• less storage is required because a single base operatingsystem image can be shared across many desktops• simple roll-out and update of basic images• standardization of images, simpler application packaging andability to rollback or “undo” OS and application patches.ExecutivesSalesMarketingFinance & AccountingOffice WorkersLayering combines the benefits of statefuland stateless desktops in one solution!
  • Layered Virtual Desktops• Pooled and Personal desktops that cost less than PCs• Personal desktops• Golden image +Personal vDisk• Enables full userpersonalization whileleveraging a commongolden imagePooled desktopsGolden imagePersonal virtual desktopsPooled desktopsIt’s all about simple managementPVDPVD contains• User installed Applications• User Data• User Preferences• Reduce management overhead by supportingpersonal and pooled desktops from a few goldenimages• Eliminate 60% of image storage costs withpersonalized desktops that use single instancemanagementBusiness Benefit
  • Why Application Virtualization?Application Server FarmSeveral different devicesInstall once, deliver anywhereSmaller storage footprintEasy application deployment 1 to 10,000Zero Application Drift – SandboxedSeamless updates & patchesConsistent end-user experience Security & Compliance
  • Application VirtualizationApplications are executed on the local devicebut only certain components are downloaded,making it possible to function without anetwork connection.Remote ApplicationsRun on a remote server rather than on a clientdevice. Agile DRApplication StreamingRun non-native apps.. i.e Quickbooks on iPadApplications can be faster using more robustCPU/GPU in addition to the proximity ofcorporate data
  • Application“Package”App-VXenAppThinAppGeneral InformationAdministrator PropertiesDeployment Type< >Install CommandRequirement RulesSupersedenceDetection MethodDependenciesEnd User MetadataApplication Streaming v 2.0The new delivery model
  • LunchCloud-Based Virtual DesktopTechnologyPresenter: Pete Valentine
  • Our Solution Provides• Secure & Compliant Desktops• Active-Directory Integration• Latest Microsoft Collaboration Tools• Next-Generation Application Firewalls• Self-Service Provisioning Portal• Secure Access Anytime, Anywhere from Any Device• Pay-As-You-Go• Streamlined DR & Business Continuity
  • True Application SecurityPooled desktopsNew VDI Challenges for the Firewall1. Identify applications regardless ofport, protocol, evasive tactic or SSL2. Identify users regardless of IP address3. Scan application content in real-time(prevent threats and data leaks)4. Granular visibility and policy controlover application access / functionality5. Multi-gigabit, in-line deployment withno performance degradation
  • App-IDIdentify theapplicationUser-IDIdentify the userContent-IDScan the contentSingle-Pass Application Security
  • • Users no longer defined solely by IP address– Leverage existing Active Directory infrastructure• Understand users application and threat behavior based on actual ADusername, not just IP• Manage and enforce policy based on user and/or AD group• Investigate security incidents, generate custom reportsEnterprise Directory IntegrationUser-ID
  • 256 SSL 256 SSL 256 SSLEnterprise Directory IntegrationCustomer Active-Directory U2Cloud Active-DirectoryAutomatic User Info & Security Group Synchronization
  • NG FirewallsFacebookEmail
  • Local VM VDI VMRuns below the operating systemto make PCs manageable, reliable, & secureSecure Local ExecutionType-1 Client HypervisorHypervisorOSAppsDataCompliant & Disconnected
  • • Powers Mobile Workstyles– Laptop as the primary device– Tablet and phone as a companion device• Unified End User Experience– Local execution– Hosted apps, data, desktops– Continuous synchronization between environments• Seamless Management & Powerful Security– Switching between devices and online/offline use– Rapid recovery in the field if laptop lost, stolen, or fails– Strong security with disk-encryption, remote kill, and time-based lockoutSecuring Road Warriors
  • Customer self-serviceSimple and intuitive MGMT interfaceDelegated administrationCloud services automationDashboard for usage and analyticsProvisioning PowerExchangeSharePointLyncCustom ServicesUser AccountsDesktopsLOB Apps256 SSL 256 SSL 256 SSLREDUCE OPERATING COSTSSCALE EFFICIENTLYEMPOWER CUSTOMERS
  • Provisioning PowerEmpower CustomersReduce operating costsScale efficientlyReseller ReadySimplified Billing Delegated AdministrationEasy to Subscribe to new services
  • IT OutsourcingData Storage and BackupInfrastructure as a ServiceDisaster RecoveryHosted EmailOffice ProductivitySaaSWebWindowsWhat you getAny-Device Windows DesktopLatest Microsoft Office VersionHosted Microsoft ExchangeEnterprise InfrastructureManaged BackupMultiple DatacentersIT now focuses on innovation
  • Cost of Doing Nothing• IT spending and complexity inhibits business growth• The business is exposed to disruptions and disasters• Workers remain tethered to the office• Security breaches increase with more devices• Your competition can gain an advantage
  • Executives in the Field“As a remote executive, I struggled every time I needed toaccess the company’s intranet, which forced me to VPN intothe network. I also kept data on my local device becausetrying to access it over my broadband connection was tooslow. Some coworkers did the same and lost data due to avirus, thankfully I was luckier. ““Since moving to a virtual desktop, I’m able to use any device.I’m able to work from any location. And best of all, I don’thave to worry about copying my data and applications onto allof my personal devices. I paid for these devices; I don’t wantwork to clutter up my personal space.”
  • DemoCloud-Based Virtual DesktopTechnologyPresenter: Pete Valentine
  • Q&ACloud-Based Virtual DesktopTechnologyPresenter: Pete Valentine
  • HOSTED VIRTUAL DESKTOPS & STREAMED APPLICATIONSThank You!