SlideShare a Scribd company logo
1 of 109
Download to read offline
Uw werkplek- en datacenterspecialist
Ontwerpen • Implementeren • Optimaliseren
Citrix & Nutanix:
‘de kracht van de combinatie’
Simple, Secure & Scalable
Agenda
• 12.00 - 13.00 uur Lunch
• 13.00 - 13.10 uur Opening & welkom
• 13.10 - 13.50 uur Nutanix
• 14.00 - 14.45 uur Citrix & AppSense
• 14.45 - 15.00 uur Koffiepauze
• 15.00 - 15.30 uur Werkplektransformatie
• 15.30 - … uur Afsluiting & borrel
Even voorstellen
Arjen Visser
Directeur Sales
Over ICT-Partners
• 80 experts
• Meer dan 15 jaar ervaring
• Drie vestigingen
Focus ICT-Partners
• Transities van werkplek- en datacenter infrastructuur
• Architectuur / Roadmapping
• Security
• Cloud (services, azure, office 365)
• Automation
Partners
Haal meer uit uw werkplek
met Citrix & Nutanix!
Door Mahil el Khatib, Nutanix
The Enterprise Cloud Company
Mahil el Khatib, Sr. Systems Engineer
The Best IT Infrastructure Is
You Can’t See
Just Works
Invisible …
Web-Scale: Design Point for Invisible
Design Principles
••Unbranded x86 servers: fail-fast systems
••No special purpose appliances
••All intelligence and services in software
••Extensive automation and rich analytics
••Distributed everything
Benefits
••Linear, predictable scale-out
••Always-on systems
••Fast innovation in software
••Operational simplicity
••Lower TCO
You needed VMware.
You want Amazon Web Services.
YOU’LL LOVE
NUTANIX.
The Cloud Era Is Well Underway
“I deployed my application
in five minutes.”
Rapid Time to Market
“No more time spent on low-
level infrastructure
management.”
One-Click Simplicity
“I use and pay for just what I
need only when I need it.”
Fractional IT Consumption
“New capabilities are
available on a regular basis.”
Continuous Innovation
Why Not AWS For All Workloads?
Predictable Workloads
Elastic Workloads
25%
75%
Balance Owning and Renting For
Today’s Enterprise Workloads
Spin up and down resources
on the public cloud
Lower costs with private cloud
infrastructure
Bringing The Cloud To The Enterprise Datacenter
Fractional
Consumption
Invisible
Operations
Instant
Delivery
Frictionless
Tailored SLAs for
Every App
Balance Owning
and Renting
Data Access and
Governance
Choice and Freedom
from Lock-in
Control
Continuous
Innovation
Complexity with Legacy Infrastructure
x Lifecycle complexity
x Resource silos
x Support challenges
x High costs
++ Automated operations
++ Self-service provisioning
++ Monitoring and analytics
Network
Virtualization
Compute
Storage Network
Storage
Virtualization
App App
Re-Platforming the Enterprise Datacenter
Integrated, scale-out
compute and storage
Virtualization
App App
Storage
Controller
Storage
Controller
Storage
Controller
Storage
Controller
Server Server
Storage
Controller
Storage
Controller
with built-in virtualization
and management
Scalable Distributed System Design
VM VM VM CVM
Hypervisor
VM VM VM CVM
Hypervisor
Tier 1 Workloads
(running on all nodes)
Nutanix Controller VM
(one per node)
VM VM VM CVM
Hypervisor
Distributed Storage Fabric
ü Snapshots ü Clones ü Compression ü Deduplication
ü Locality ü Tiering ü Erasure Coding ü Resilience
Node 1 Node 2 Node N
X86 X86 X86
Extensible Storage Fabric
20
CVM
Distributed Storage Fabric
NFS/SMB/iSCSI SMB File Shares
FSVM FSVMFSVM
iSCSI Volume Groups
Bare Metal Apps
FSVM
VM
VM VMVM
CVM CVM CVM
HYPERVISOR HYPERVISOR HYPERVISORHYPERVISOR
Seamless Application and Data Mobility
ü Sizer ü One-click Hypervisor Conversion ü Cross-Hypervisor DR
ü Foundation ü Backup to Public Cloud ü Cross-Hypervisor Backup
App Mobility Fabric
VM VM VM CVM VM VM VM CVM
ESXi
VM VM VM CVM
ESXi
Node 1 Node 2 Node N
Distributed Storage Fabric
X86 X86 X86
ESXiESXiESXi ESXiESXi
AHV AHV AHV
Eliminate
Complexity…
Integrated Consumer-Grade Management
Intuitive
Beautiful
Insightful
Security-First Design
Full-Stack Security
Development Lifecycle
Micro-
Segmentation
Encryption
Anti-VirusAnti-MalwareFirewall
Key
Management
EcosystemSecurity
Certifications
Automated Validation
and Self-healing
Repeat
Update
Asses
Test
Measure
Report
Hyperconverged >> Enterprise Cloud
Integrated
Compute & Storage
Backup & DR Services
VM Storage
Hyperconverged
Infrastructure
2012
File Services
Native Virtualization
Multi-hypervisor Support
Hybrid-cloud Services
Machine Intelligence
Systems & Ops Mgmt.
HCI++
2014+
Enterprise Cloud
Cloud Automation
Self Service
Network Segmentation
Object Storage
Application Ecosystem
Container Services
2016+
Hyperconverged
Infrastructure
Integrated
Compute & Storage
Backup & DR Services
VM Storage
VxRail
Cisco HyperFlex
Hewlett Packard
Enterprise
Block Services
Network Visualization
Application Mobility
Hyper-V
Prism
Deduplication
Innovating at the Speed of The Cloud
vSphere support
Scale-out storage
KVM Support
Multi-cluster
Management
Backup to AWS
Built-in Virtualization
VM High Availability
Backup to Azure
VM Flash Mode
Erasure Coding
Product
Launch
2.5
3.0
3.5
4.0
4.1
4.5
4.6
Major New Features in the
Nutanix Enterprise Cloud
Platform
2011 2012 2013 2014 2015
VM-centric Backup + DR
Non-disruptive Upgrades
Compression
4.7
4x Faster Performance
Integrated File Services
AMF Hypervisor Conversion
Prism Pro with X-Fit
2016
Block Services
Container Support
What-If Planning &
more..
Broad Ecosystem Support
Guest
Operating
Systems
Windows Server
Applications
and
Technology
Hardware
Platforms
Powering All Workloads and Use Cases
VDI
Branch
Office
Data Protection &
Disaster
Recovery
Big Data
Private &
Hybrid Clouds
Collaboration
and UC
Enterprise
Applications
Thank You
&
One more thing……………
TAC Centers
NBD Depots
Durham
Amsterdam
24x7x365
“Follow the Sun”
Support
97%
Customer
Satisfaction
+90
Net Promoter
Score
70+
Countries
Languages
7
WW Support
Centers
Global Support Overview
San Jose
Sydney
Bangalore
Tokyo
Beijing
Haal meer uit uw werkplek
met Citrix & Nutanix!
Door Bert Jansema, ICT-Partners
Bert Jansema
Introductie
Werkplek 2.0
Werkplek 2.0
• Technische realisatie (SBC, VDI, virtualisatie)
• Informatie altijd beschikbaar door internet en massacommunicatie
• Mobiliteit: werkplek op kantoor, thuis en onderweg
• Security is een vakgebied
• Virtuele teams
• Voice command & response
• Nieuwe projectietechnieken (glas, holo)
• Artificial Intelligence
• Virtual Reality
• Augmented Reality
• Instant data analyse
• Volledige persoonlijke afstemming
Werkplek 2020
Gas los!! Terug naar…
ICT ondersteunend, flexibel en onzichtbaar
• Bereiken:
• Access anywhere anytime anyway
• Consistente user experience
• Rekening houdend met:
• Vraagfluctuatie, onvoorspelbare groei
• Snel evoluerende bedreigingen
• In de greep houden van:
• Kosten!
• technische complexiteit
SIMPLESCALABLE SECURE
W2K12
Citrix Flexcast Management Architecture (FMA)
Applicaties	&	
Desktop
XenApp Server	
(Controller	&	Delivery)
W2K12
Applicaties	&	
Desktop
XenApp Server	
(Controller	&	Delivery)
W2K12
Applicaties	&	
Desktop
XenApp Server	
(Controller	&	Delivery)
Delivery	Controller
W2K12
Applicaties	&	
Desktop
Delivery	Agent
W2K16
Applicaties	&	
Desktop
Delivery	Agent
Win10
Applicaties	&	
Desktop
Delivery	Agent
XenApp IMA XenDesktop FMA
SimpleScalable
Citrix Studio
Simple
Machine	Catalogs
Delivery	Groups
Policy
Logging
Administrators
Controllers
Hosting
Licensing
StoreFront
App-V	Publishing
Citrix Director
Simple
HDX Protocol
• Intelligente redirection
• Adaptive compression
• Data de-duplication
SimpleScalable Secure
•Any Cloud Hybrid Cloud Provisioning
• Amazon Web Services
• Windows Azure
• Citrix CloudPlatform
•Any Device
• Citrix Receiver voor Windows, IOS, Android, Linux
•Any App
• Published Apps (XenApp)
• VDI (XenDesktop)
• Remote PC
SimpleScalable
Long Term Service Release
• Lagere TCO door hoge kwaliteit van de releases en voorspelbare
onderhoudsintervallen
• Voorspelbaar onderhoud door cumulatieve update packs
• 5 jaar “gewoon” support en 5 jaar extended support
• Voorwaarde is dat alle Citrix componentversies LTSR compliant zijn
Simple
Gemiddelde Citrix omgeving
Desktop virtualisatie lagen
Compute and Storage (HW)
Hypervisor
Control and Access Layer
Desktop Layer
User Layer
Infrastructure (Studio, file, AD, SQL, License)
Nutanix Acropolis Hypervisor / Vmware ESX / Microsoft Hyper-V
Desktop Delivery (XD) & Image Controllers (MCS)
Access Controllers (StoreFront) and Networking (NetScaler)
Profile management, golden image, and apps
User type and end-points (Receiver)
Citrix ShareFile and file services
Desktop virtualisatie lagen
Compute and Storage (HW)
Hypervisor
Control and Access Layer
Desktop Layer
User Layer
Infrastructure (Studio, file, AD, SQL, License)
Nutanix Acropolis Hypervisor / Vmware ESX / Microsoft Hyper-V
Desktop Delivery (XD) & Image Controllers (MCS)
Access Controllers (StoreFront) and Networking (NetScaler)
Profile management, golden image, and apps
User type and end-points (Receiver)
Citrix ShareFile and file services
Citrix Provisioning Services
Citrix Provisioning Services
• Stream van ‘image’ (vDisk) naar meerdere machines tegelijkertijd
• Maakt gebruik van PXE boot technologie
• Sterke afhankelijkheid van goede netwerk-setup, DHCP
• Sizing is van groot belang (failover/caching)
Mooie oplossing, maar redelijk complex
Citrix Machine Creation Services
Citrix Machine Creation Services
• Functionaliteit van PVS met……
• …..Eenvoud van MCS
• Gebruik bestaande hypervisor functies
• Geen afhankelijkheid van PXE en DHCP
• Geen additionele componenten
• Eenvoudige updates
Number	of	virtual	desktops
SAN
Performance
MCS op traditionele SAN?
MCS op Nutanix
Voordelen van MCS op Nutanix?
Verdere vereenvoudiging van	de	MCS	architectuur!
Eenvoudige configuratie in XenDesktop Studio maakt het leven eenvoudiger:
Meerdere kopieën
van	images
Onderhoud van	
meerdere
datastores
IO	problemen
Meer voordelen van MCS Nutanix!
Gereduceerde
Opstarttijden
Betere
schaalbaarheid
VM	migratie
Desktop virtualisatie lagen
Compute and Storage (HW)
Hypervisor
Control and Access Layer
Desktop Layer
User Layer
Infrastructure (Studio, file, AD, SQL, License)
Nutanix Acropolis Hypervisor / Vmware ESX / Microsoft Hyper-V
Desktop Delivery (XD) & Image Controllers (MCS)
Access Controllers (StoreFront) and Networking (NetScaler)
Profile management, golden image, and apps
User type and end-points (Receiver)
Citrix ShareFile and file services
HP, Dell, Cisco, Lenovo
Cisco, HP, Arista, Mellanox
Qlogic, Emulex
EMC, NetApp, HP, Dell, HDS
Cisco, Brocade
VMware, Microsoft, XenServer
Cisco, HP, Arista, Mellanox
VMware, Microsoft
Simplifying the XenDesktop Infrastructure Stack
Network
Scale out compute
and storage
Virtualization
Network
Virtualization
Compute
SAN Fabric
Storage
AHV
Nutanix
Citrix – Nutanix Integration
Production	
Ready	for	AHV
Integrated	Management Fast	Provisioning
No	vTax to	run	Citrix	on	Nutanix
Fully	integrated	with	Desktop	
Studio	UI
High	speed	image	updates	and	
operations
Includes	Nutanix	standard	benefits
• Shadow	clones	and	boot-storm	handling
• Rapid	troubleshooting	and	clear	ops	line-of-sight
• Linear	scaling	and	pay-as-you-grow	consumption	model
Native Citrix Studio Integration
Going distributed simplifies things..
Before After
Linearly Scaling Virtual Desktop Infrastructure
VMs(Desktops)
• Scale incrementally one node at a time
• Protect infrastructure investment by eliminating forklift upgrades
• Scale storage capacity & performance linearly
Pay-as-you-grow
Number of Nodes
Citrix XenDesktop/XenApp on Nutanix AHV
VM VM VM
VM VM VM
VM
VM
VM
VM
AHV
Nutanix AHV is
Citrix XenApp/XenDesktop
Citrix NetScaler VPX*
Citrix ShareFile
Citrix Cloud
Citrix
StoreFront
XenDesktop
Delivery Controller
AHV
Citrix Sharefile &
File services
SQL Server & Infra
/network services
Citrix Studio, Director
VM
Citrix
NetScaler VPX
Desktop virtualisatie lagen
Compute and Storage (HW)
Hypervisor
Control and Access Layer
Desktop Layer
User Layer
Infrastructure (Studio, file, AD, SQL, License)
Nutanix Acropolis Hypervisor / Vmware ESX / Microsoft Hyper-V
Desktop Delivery (XD) & Image Controllers (MCS)
Access Controllers (StoreFront) and Networking (NetScaler)
Profile management, golden image, and apps
User type and end-points (Receiver)
Citrix ShareFile and file services
“SET THE USER FREE”
e n d p o i n t s e c u r i t y s i m p l i f i e d
AppSense now part of the LANDESK family
zonder concessies aan veiligheid en
beheersbaarheid
IT’S NEVER OR
I.T.
MANAGED
USER MANAGED
Mobile
VIRTUALPHYSICAL AND
UNMANAGEDMANAGED AND
BYODCOPE AND
PERSONAL APPSCORPORATE APPS AND
PERSONAL DATACORPORATE DATA AND
ALWAYS AND
I.T.
MANAGED
USER MANAGED
Users want to Personalize their workspace and access
their Data. IT wants to manage Policy, Privilege,
Performance and Analytics for each user. Combined,
these elements define User DNA™
Workspace Management
IT Settings
User Settings
+
= User DNA™
AppSense unlocks User DNA™
so IT can manage it independently.
Personalization
Policy
Privileges
Performance
Data Access
Analytics
User DNA™ is stored, managed and distributed from a central
AppSense database, leveraging the AppSense platform. IT gets
granular, contextual control allowing User DNA™ to follow the user,
creating a seamless workspace experience.
AppSense
Database
Physical Virtual Cloud
Workspace Management
Creating a Balanced Portfolio
Patch
Management
Endpoint Security
Configuration
Management
Physical, Virtual
& Mobile
Service
Management
Asset
Management
User
Environment
Management
Security
AnalyticsandDashboards
Environment
Management
Privilege
Management
Application
Control
File & Profile
Migration
PROTECT
Protects against zero-day attacks by preventing malicious software
from executing
CONTROLEXECUTION
Apply precise control over how authorized applications execute and
whether applications can launch other applications to prevent stealth
rootkits from infiltrating your enterprise systems.
RANSOMWARECONTINUOUSTORISE
Ransomware is not going away any time soon, because the business
model offers high reward for minimal effort. Compared to 2015’s 29
ransomware families, 79 new families already emerged this year
PREVENT
Prevents malware from running when your host system reboots. Also locks
down the registry until rights are approved by the IT administrator
01
02
03
04
Protect Against Ransomware
Source: TrendLabs 2016 Security Roundup
Common Security Weakness
§ Almost all forms of attack use privilege escalation when installing malware that needs
administrative privileges.
§ Phishing, which continues to be the most common front end for damaging attacks, is
used to obtain user credentials from which to start the escalation, and phishing
succeeds because of poor hygiene in application and privilege management.
85% of all Critical vulnerabilities documented
in the report can be mitigated by removing
admin rights *2015 Microsoft Vulnerabilities Report
99.5% of all vulnerabilities reported in Internet
Explorer in 2015 could be mitigated by
removing admin rights *2015 Microsoft Vulnerabilities Report
86% of reported vulnerabilities come from 3rd
party applications. *National Vulnerability Database
In 2015, Microsoft Windows represented the most targeted
software platform, with 42 percent of the top 20 discovered
exploits directed at Microsoft platforms and applications. *HP
Cyber Risk Report 2016
Malware Monetization and
Application Vulnerabilities
The average ransom discovered to date
in 2016 stands at US$679, up from $294
in 2015 *ISTR Ransomware & Business, Symantec
Feb 2016, the Hollywood
Presbyterian Medical Center
(HPMC) paying the attackers’
demand of US$17,000
Missing Patches
• Third Party
• MS Office
• Adobe
• Java
01
Dangerous
Applications
• Media
• Runtimes
• Web browsers
02
Misconfigured
User Access
• Admin rights
• Least Privilege
• Password
Management
03
Unprotected
Data
• Sensitive Data
• Unencrypted
• Multiple
Storage
04
Endpoint Security Threats
Patching
• Clear visibility
on all
endpoints
• Effective
Detection
• Automatic
Policy
Enforcement
• Single
Management
Console
01
Unhazardous
Applications
• Minimize
exposure
• Automatic
uninstall
• Application
Whitelist/Blac
klist
• EPC for
remote
connections
02
Proper User
Access
• Remove
Admin rights
• Determine
Least
Privilege
• Automate
Elevation
• User self-
service Portal
03
Data Protection
• Enable Data
Encryption
• Automated
Scans
• Protect
External
Media
• Backup and
Recovery
04
Endpoint Security Best Practices
By AppSense
CATCH
PATCH
MATCH
Strategic Approach & Benefit
MITIGATES AT LEAST
OF TARGETED
CYBER INTRUSIONS
• National Security Agency, Information Assurance Guidance, www.nsa.gov/ia/mitigation_guidance/
• Australian Government Department of Defence, Strategies to Mitigate Targeted Cyber Intrusions,
www.asd.gov.au/infosec/mitigationstrategies.htm
PATCH
Applications and
Operating System
CATCH
Malicious software with
a Whitelist
MATCH
The Right People with
the Right Privileges
Introducing…
AppSense Endpoint Security
§ Privilege Management
§ Application Control with Trusted Ownership™
§ Granular Exceptions
§ Prescriptive Security Analytics
§ Automated Patch Management
Regain Control of Applications
Regain control of applications running across the business without locking
down your users
Use cases – Security and beyond
• Deploy all users as standard users
• Assign privilege to individual applications based on user roles and needs
• Prevent execution of unauthorized applications
Productivity & Security
Control
Panel –
uninstall
program
Task
Manager –
kill process
Regedit /
Command
Action Example Solution
Install Applications
Change Configurations
Remove Patches &
Uninstall Software
Defeat Security Tools
control.exe
Denied Application:
Denied Application:
cmd.exe
regedit.exe
taskmgr.exe
Denied Application:
Application Control:
System Level Visibility
System Level
(ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe,
.dll processes, App launches, binaries created, drivers, etc.)
Intelligence
System Level
(ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe,
.dll processes, App launches, binaries created, drivers, etc.)
Application Control by :Trusted Ownership – IT Admin or Service Account
White / Blacklisting
Digital Signatures
Control
System Level
(ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe,
.dll processes, App launches, binaries created, drivers, etc.)
Application Control by: Trusted Ownership – IT Admin or Service Account
White / Blacklisting
Digital Signatures
Network Access Control - Application Termination
Application Control - URL Redirection - Rights Management – Self Elevation –
Win Store App Control
Prevent & Awareness
System Level
(ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe,
.dll processes, App launches, binaries created, drivers, etc.)
Application Control by means of Trusted Ownership – IT Admin or Service Account
White / Blacklisting
Digital Signatures
Quarantine Block Warn Dialogue Monitor Educate
Network Access Control - Application Termination
Application Control - URL Redirection – Privilege Management – Self Elevation –
Granular Exceptions & Contextual Aware - Win Store App Control (Win8/8.1/10)
Response
System Level
(ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe,
.dll processes, App launches, binaries created, drivers, etc.)
Application Control by: Trusted Ownership – IT Admin or Service Account
White / Blacklisting
Digital Signatures
Quarantine Block Warn Dialogue Monitor Educate
Auditing / Monitoring Advanced Reporting Application Admin Rights Discovery
Evidentiary Forensics License Management
Network Access Control - Application Termination
Application Control - URL Redirection - Rights Management – Self Elevation –
Granular Exceptions & Contextual Aware - Win Store App Control (Win8/8.1/10)
AppSense Endpoint Security
Allows desktop and InfoSec teams to protect endpoints and enable
regulatory compliance without degrading the user experience.
Protection
Identify and block unauthorized applications
from running
Automate Microsoft and third-party
application patch assessment and deployment
Enforce software licensing and ensure
compliance
Detect suspicious endpoint behaviour
User Experience & Productivity
Manage user privileges and policies at a
highly granular level
Allow user self-elevation
Monitor admin rights and self-elevation
trends
User	Settings
Apps
User	Settings
Apps
User	Settings
Apps
User	Settings
Apps
User	Settings
Apps
Vragen
Citrix Productportfolio
• Citrix XenApp
• Citrix XenDesktop
• Citrix XenServer
• Citrix XenClient
• NetScaler
• NetScaler Gateway
• NetScaler CloudBridge
• Provisioning Server
• XenMobile
• Citrix Receiver
• ShareFile
• GoToMyPC
Een succesvolle werkplektransformatie
Door Jan van Pijkeren, VPProjects
Handreiking voor een succesvolle
transitie
Jan van Pijkeren - Projectmanager
Waar begin ik?
Afbeelding: http://www.huffingtonpost.com
BC
Afbeelding: http://hollandrodendaily.org/business-case-template/
De Business Case staat en nu?
Afbeelding: https://nl.wikipedia.org/wiki/Project
Volgens
Prince2:
Afbeelding: http://www.bkkc.nl/nieuws/2013-april/maak-een-concreet-plan-van-je-ideeen-voor-de-impul
Wat staat er in?
Waarom
Wat is het doel?
Wat
Welk eindproduct ga je maken?
Hoe
Op welke manier ga je het doen?
Wie
Welke mensen gaan meedoen?
Welke middelen
Welk materiaal, welk materieel?
Wanneer
Wat is het tijdpad van het project?
Een praktijk
voorbeeld
Van methodiek naar
aanpak
Afbeelding:
http://www.projectcarto
on.com/about/
Wat kan Pitz voor u betekenen?
Afbeelding: http://www.topchange.nl/opleiding-project-management/
Afsluiting
Onze oplossingen
ICT-Partners helpt u succesvol te zijn met uw ICT. Wij ontwerpen,
implementeren en optimaliseren ICT-omgevingen met de nieuwste
technologieën, die bijdragen aan continuïteit, stabiliteit en kostenbesparing.
Bedankt!
ICT-Partners
Vosselmanstraat 2
7311 CL Apeldoorn
T 055 528 22 22
E Connect@ict-partners.nl
Hoofdweg 290
9765 CN Paterswolde
T 050 364 31 02
E Connect@ict-partners.nl

More Related Content

What's hot

Web scale IT - Nutanix
Web scale IT - NutanixWeb scale IT - Nutanix
Web scale IT - NutanixUnitiv
 
Presentazione Tintri - Clouditalia @ VMUGIT UserCon 2015
Presentazione Tintri - Clouditalia @ VMUGIT UserCon 2015Presentazione Tintri - Clouditalia @ VMUGIT UserCon 2015
Presentazione Tintri - Clouditalia @ VMUGIT UserCon 2015VMUG IT
 
Hyper Converged Systems
Hyper Converged Systems Hyper Converged Systems
Hyper Converged Systems Megan Salley
 
Simplivity webinar presentation
Simplivity webinar presentationSimplivity webinar presentation
Simplivity webinar presentationRyan Hadden
 
A buyer's guide to Hyper-Converged infrastructure
A buyer's guide to Hyper-Converged infrastructureA buyer's guide to Hyper-Converged infrastructure
A buyer's guide to Hyper-Converged infrastructureEric Van 't Hoff
 
Nutanix and microsoft_webinar_oct_28
Nutanix and microsoft_webinar_oct_28Nutanix and microsoft_webinar_oct_28
Nutanix and microsoft_webinar_oct_28groberts52
 
SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix Citrix
 
Dell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking DatacenterDell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking DatacenterNEXTtour
 
An Easy Path to Kubernetes on Nutanix
An Easy Path to Kubernetes on Nutanix An Easy Path to Kubernetes on Nutanix
An Easy Path to Kubernetes on Nutanix NEXTtour
 
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...patmisasi
 
Making Virtualization Invisible with AHV and Acropolis App Mobility Fabric
Making Virtualization Invisible with AHV and Acropolis App Mobility FabricMaking Virtualization Invisible with AHV and Acropolis App Mobility Fabric
Making Virtualization Invisible with AHV and Acropolis App Mobility FabricNEXTtour
 
Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementJürgen Ambrosi
 
Hyperconvergence and Death of the Storage Array - Interop 2015
Hyperconvergence and Death of the Storage Array - Interop 2015Hyperconvergence and Death of the Storage Array - Interop 2015
Hyperconvergence and Death of the Storage Array - Interop 2015Stuart Miniman
 
Nutanix Fundamentals The Enterprise Cloud Company
Nutanix Fundamentals The Enterprise Cloud CompanyNutanix Fundamentals The Enterprise Cloud Company
Nutanix Fundamentals The Enterprise Cloud CompanyNEXTtour
 
Nutanix Technology Bootcamp
Nutanix Technology BootcampNutanix Technology Bootcamp
Nutanix Technology BootcampICT-Partners
 
Nutanix - Expert Session - Metro Availability
Nutanix -  Expert Session - Metro AvailabilityNutanix -  Expert Session - Metro Availability
Nutanix - Expert Session - Metro AvailabilityChristian Johannsen
 
Nutanix .Next 2017 - Infrastructure Planning Just Got Smarter
Nutanix .Next 2017 - Infrastructure Planning Just Got SmarterNutanix .Next 2017 - Infrastructure Planning Just Got Smarter
Nutanix .Next 2017 - Infrastructure Planning Just Got SmarterMarc Trouard-Riolle
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...marketingunitrends
 
Hyperconverged Infrastructure, It's the Future
Hyperconverged Infrastructure, It's the FutureHyperconverged Infrastructure, It's the Future
Hyperconverged Infrastructure, It's the FutureHoward Marks
 

What's hot (20)

Web scale IT - Nutanix
Web scale IT - NutanixWeb scale IT - Nutanix
Web scale IT - Nutanix
 
Presentazione Tintri - Clouditalia @ VMUGIT UserCon 2015
Presentazione Tintri - Clouditalia @ VMUGIT UserCon 2015Presentazione Tintri - Clouditalia @ VMUGIT UserCon 2015
Presentazione Tintri - Clouditalia @ VMUGIT UserCon 2015
 
Hyper Converged Systems
Hyper Converged Systems Hyper Converged Systems
Hyper Converged Systems
 
Simplivity webinar presentation
Simplivity webinar presentationSimplivity webinar presentation
Simplivity webinar presentation
 
A buyer's guide to Hyper-Converged infrastructure
A buyer's guide to Hyper-Converged infrastructureA buyer's guide to Hyper-Converged infrastructure
A buyer's guide to Hyper-Converged infrastructure
 
Nutanix and microsoft_webinar_oct_28
Nutanix and microsoft_webinar_oct_28Nutanix and microsoft_webinar_oct_28
Nutanix and microsoft_webinar_oct_28
 
SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix SYN 104: Citrix and Nutanix
SYN 104: Citrix and Nutanix
 
Dell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking DatacenterDell - The Incredible Shrinking Datacenter
Dell - The Incredible Shrinking Datacenter
 
An Easy Path to Kubernetes on Nutanix
An Easy Path to Kubernetes on Nutanix An Easy Path to Kubernetes on Nutanix
An Easy Path to Kubernetes on Nutanix
 
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
Scalar Cisco Hyperflex Presentation, May 13 2016, Part III: Scalar Lunch & Le...
 
Making Virtualization Invisible with AHV and Acropolis App Mobility Fabric
Making Virtualization Invisible with AHV and Acropolis App Mobility FabricMaking Virtualization Invisible with AHV and Acropolis App Mobility Fabric
Making Virtualization Invisible with AHV and Acropolis App Mobility Fabric
 
Le soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data ManagementLe soluzioni tecnologiche per il Copy Data Management
Le soluzioni tecnologiche per il Copy Data Management
 
Hyperconvergence and Death of the Storage Array - Interop 2015
Hyperconvergence and Death of the Storage Array - Interop 2015Hyperconvergence and Death of the Storage Array - Interop 2015
Hyperconvergence and Death of the Storage Array - Interop 2015
 
Nutanix Fundamentals The Enterprise Cloud Company
Nutanix Fundamentals The Enterprise Cloud CompanyNutanix Fundamentals The Enterprise Cloud Company
Nutanix Fundamentals The Enterprise Cloud Company
 
Nutanix Technology Bootcamp
Nutanix Technology BootcampNutanix Technology Bootcamp
Nutanix Technology Bootcamp
 
Hyperconvergence... and the public sector
Hyperconvergence... and the public sectorHyperconvergence... and the public sector
Hyperconvergence... and the public sector
 
Nutanix - Expert Session - Metro Availability
Nutanix -  Expert Session - Metro AvailabilityNutanix -  Expert Session - Metro Availability
Nutanix - Expert Session - Metro Availability
 
Nutanix .Next 2017 - Infrastructure Planning Just Got Smarter
Nutanix .Next 2017 - Infrastructure Planning Just Got SmarterNutanix .Next 2017 - Infrastructure Planning Just Got Smarter
Nutanix .Next 2017 - Infrastructure Planning Just Got Smarter
 
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
Protect the Hype: Backup Best Practices for Converged & Hyperconverged Infras...
 
Hyperconverged Infrastructure, It's the Future
Hyperconverged Infrastructure, It's the FutureHyperconverged Infrastructure, It's the Future
Hyperconverged Infrastructure, It's the Future
 

Similar to Citrix & Nutanix: 'de kracht van de combinatie

Genesys Distributie - 27oct2010
Genesys Distributie - 27oct2010Genesys Distributie - 27oct2010
Genesys Distributie - 27oct2010Agora Group
 
The next step in workspace | Simple, Scalable, Secure
The next step in workspace | Simple, Scalable, SecureThe next step in workspace | Simple, Scalable, Secure
The next step in workspace | Simple, Scalable, SecureICT-Partners
 
20170209 dev day-websites_vs_cloudservices_vsservicefabric_scenarios
20170209 dev day-websites_vs_cloudservices_vsservicefabric_scenarios20170209 dev day-websites_vs_cloudservices_vsservicefabric_scenarios
20170209 dev day-websites_vs_cloudservices_vsservicefabric_scenariosRicardo González
 
Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011Louis Göhl
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
London .NET Developers Azure Camp Keynote
London .NET Developers Azure Camp KeynoteLondon .NET Developers Azure Camp Keynote
London .NET Developers Azure Camp KeynoteTom Walker
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the CloudAmazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the CloudAmazon Web Services
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon Web Services
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon Web Services
 
Microsoft Azure in der Praxis
Microsoft Azure in der PraxisMicrosoft Azure in der Praxis
Microsoft Azure in der PraxisYvette Teiken
 
Citrix The Intelligence Workspace and State-of-the-art for SAP
Citrix The Intelligence Workspace and State-of-the-art for SAPCitrix The Intelligence Workspace and State-of-the-art for SAP
Citrix The Intelligence Workspace and State-of-the-art for SAPPT Datacomm Diangraha
 
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLac Viet Computing Corporation
 
OpenStack VDI and DaaS with Leostream and the Teradici Pervasive Cloud Comput...
OpenStack VDI and DaaS with Leostream and the Teradici Pervasive Cloud Comput...OpenStack VDI and DaaS with Leostream and the Teradici Pervasive Cloud Comput...
OpenStack VDI and DaaS with Leostream and the Teradici Pervasive Cloud Comput...Leostream
 
Benefits of the Azure Cloud
Benefits of the Azure CloudBenefits of the Azure Cloud
Benefits of the Azure CloudCaserta
 
Managing your virtual environment with System Center & Windows Server 2012
Managing your virtual environment with System Center & Windows Server 2012Managing your virtual environment with System Center & Windows Server 2012
Managing your virtual environment with System Center & Windows Server 2012C/D/H Technology Consultants
 
Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011Joan Tuls
 
Azure with citrix by bipeen sinha
Azure with citrix by bipeen sinhaAzure with citrix by bipeen sinha
Azure with citrix by bipeen sinhaBipeen Sinha
 

Similar to Citrix & Nutanix: 'de kracht van de combinatie (20)

Genesys Distributie - 27oct2010
Genesys Distributie - 27oct2010Genesys Distributie - 27oct2010
Genesys Distributie - 27oct2010
 
The next step in workspace | Simple, Scalable, Secure
The next step in workspace | Simple, Scalable, SecureThe next step in workspace | Simple, Scalable, Secure
The next step in workspace | Simple, Scalable, Secure
 
20170209 dev day-websites_vs_cloudservices_vsservicefabric_scenarios
20170209 dev day-websites_vs_cloudservices_vsservicefabric_scenarios20170209 dev day-websites_vs_cloudservices_vsservicefabric_scenarios
20170209 dev day-websites_vs_cloudservices_vsservicefabric_scenarios
 
Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011Citrix vision and product highlights november 2011
Citrix vision and product highlights november 2011
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
Infrastructure Solution Day | Final
Infrastructure Solution Day | FinalInfrastructure Solution Day | Final
Infrastructure Solution Day | Final
 
London .NET Developers Azure Camp Keynote
London .NET Developers Azure Camp KeynoteLondon .NET Developers Azure Camp Keynote
London .NET Developers Azure Camp Keynote
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the CloudAmazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
 
Microsoft Azure in der Praxis
Microsoft Azure in der PraxisMicrosoft Azure in der Praxis
Microsoft Azure in der Praxis
 
Clouds Infrastructure Administration
Clouds Infrastructure Administration Clouds Infrastructure Administration
Clouds Infrastructure Administration
 
Citrix The Intelligence Workspace and State-of-the-art for SAP
Citrix The Intelligence Workspace and State-of-the-art for SAPCitrix The Intelligence Workspace and State-of-the-art for SAP
Citrix The Intelligence Workspace and State-of-the-art for SAP
 
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
 
OpenStack VDI and DaaS with Leostream and the Teradici Pervasive Cloud Comput...
OpenStack VDI and DaaS with Leostream and the Teradici Pervasive Cloud Comput...OpenStack VDI and DaaS with Leostream and the Teradici Pervasive Cloud Comput...
OpenStack VDI and DaaS with Leostream and the Teradici Pervasive Cloud Comput...
 
HCI ECOCAST
HCI ECOCAST HCI ECOCAST
HCI ECOCAST
 
Benefits of the Azure Cloud
Benefits of the Azure CloudBenefits of the Azure Cloud
Benefits of the Azure Cloud
 
Managing your virtual environment with System Center & Windows Server 2012
Managing your virtual environment with System Center & Windows Server 2012Managing your virtual environment with System Center & Windows Server 2012
Managing your virtual environment with System Center & Windows Server 2012
 
Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011Presentaties seminar rethink the desktop 20.01.2011
Presentaties seminar rethink the desktop 20.01.2011
 
Azure with citrix by bipeen sinha
Azure with citrix by bipeen sinhaAzure with citrix by bipeen sinha
Azure with citrix by bipeen sinha
 

More from ICT-Partners

Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaarWebinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaarICT-Partners
 
Inspiratiesessie Cloud en Security
Inspiratiesessie Cloud en SecurityInspiratiesessie Cloud en Security
Inspiratiesessie Cloud en SecurityICT-Partners
 
Experiencing the hyperconverged
Experiencing the hyperconvergedExperiencing the hyperconverged
Experiencing the hyperconvergedICT-Partners
 
De innovatieve en adaptieve werkplek
De innovatieve en adaptieve werkplekDe innovatieve en adaptieve werkplek
De innovatieve en adaptieve werkplekICT-Partners
 
Past de cloud wel echt bij uw organisatie?
Past de cloud wel echt bij uw organisatie?Past de cloud wel echt bij uw organisatie?
Past de cloud wel echt bij uw organisatie?ICT-Partners
 
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...ICT-Partners
 
Terug naar eenvoud in ICT
Terug naar eenvoud in ICTTerug naar eenvoud in ICT
Terug naar eenvoud in ICTICT-Partners
 
Mobiliteit zonder grenzen
Mobiliteit zonder grenzenMobiliteit zonder grenzen
Mobiliteit zonder grenzenICT-Partners
 
IoT de aanjager voor een nieuwe vorm van UC
IoT de aanjager voor een nieuwe vorm van UCIoT de aanjager voor een nieuwe vorm van UC
IoT de aanjager voor een nieuwe vorm van UCICT-Partners
 
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centreDiscussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centreICT-Partners
 
Houd controle over uw data
Houd controle over uw dataHoud controle over uw data
Houd controle over uw dataICT-Partners
 
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?ICT-Partners
 
Uw datacenter als nutsvoorziening
Uw datacenter als nutsvoorzieningUw datacenter als nutsvoorziening
Uw datacenter als nutsvoorzieningICT-Partners
 
Windows 10 voor bedrijven
Windows 10 voor bedrijvenWindows 10 voor bedrijven
Windows 10 voor bedrijvenICT-Partners
 
Nutanix in de praktijk: dataprotectie strategieën
Nutanix in de praktijk: dataprotectie strategieënNutanix in de praktijk: dataprotectie strategieën
Nutanix in de praktijk: dataprotectie strategieënICT-Partners
 
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!ICT-Partners
 
Why the end user experience needs Service Assurance (Xangati)
Why the end user experience needs Service Assurance (Xangati)Why the end user experience needs Service Assurance (Xangati)
Why the end user experience needs Service Assurance (Xangati)ICT-Partners
 
Het Roelof van Echten College werkt dankzij AppSense DataNow apparaat- en loc...
Het Roelof van Echten College werkt dankzij AppSense DataNow apparaat- en loc...Het Roelof van Echten College werkt dankzij AppSense DataNow apparaat- en loc...
Het Roelof van Echten College werkt dankzij AppSense DataNow apparaat- en loc...ICT-Partners
 
Door een positieve UC-gebruikerservaring succesvol zijn
Door een positieve UC-gebruikerservaring succesvol zijnDoor een positieve UC-gebruikerservaring succesvol zijn
Door een positieve UC-gebruikerservaring succesvol zijnICT-Partners
 

More from ICT-Partners (20)

Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaarWebinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
Webinar: Het nieuwe back-uppen: simpel, snel en schaalbaar
 
Inspiratiesessie Cloud en Security
Inspiratiesessie Cloud en SecurityInspiratiesessie Cloud en Security
Inspiratiesessie Cloud en Security
 
Experiencing the hyperconverged
Experiencing the hyperconvergedExperiencing the hyperconverged
Experiencing the hyperconverged
 
De innovatieve en adaptieve werkplek
De innovatieve en adaptieve werkplekDe innovatieve en adaptieve werkplek
De innovatieve en adaptieve werkplek
 
Past de cloud wel echt bij uw organisatie?
Past de cloud wel echt bij uw organisatie?Past de cloud wel echt bij uw organisatie?
Past de cloud wel echt bij uw organisatie?
 
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
Webinar: 'Terug naar eenvoud in ICT | Dé roadmap voor ICT-innovatie & datacen...
 
Terug naar eenvoud in ICT
Terug naar eenvoud in ICTTerug naar eenvoud in ICT
Terug naar eenvoud in ICT
 
Mobiliteit zonder grenzen
Mobiliteit zonder grenzenMobiliteit zonder grenzen
Mobiliteit zonder grenzen
 
IoT de aanjager voor een nieuwe vorm van UC
IoT de aanjager voor een nieuwe vorm van UCIoT de aanjager voor een nieuwe vorm van UC
IoT de aanjager voor een nieuwe vorm van UC
 
Discussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centreDiscussing strategies for building the next gen data centre
Discussing strategies for building the next gen data centre
 
Houd controle over uw data
Houd controle over uw dataHoud controle over uw data
Houd controle over uw data
 
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
Snelle verandering in het ICT-landschap: noodzaak voor security 2.0?
 
Inzicht2
Inzicht2Inzicht2
Inzicht2
 
Uw datacenter als nutsvoorziening
Uw datacenter als nutsvoorzieningUw datacenter als nutsvoorziening
Uw datacenter als nutsvoorziening
 
Windows 10 voor bedrijven
Windows 10 voor bedrijvenWindows 10 voor bedrijven
Windows 10 voor bedrijven
 
Nutanix in de praktijk: dataprotectie strategieën
Nutanix in de praktijk: dataprotectie strategieënNutanix in de praktijk: dataprotectie strategieën
Nutanix in de praktijk: dataprotectie strategieën
 
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
Citrix Workspace Suite: De werkplekimplementatie die niet kan mislukken!
 
Why the end user experience needs Service Assurance (Xangati)
Why the end user experience needs Service Assurance (Xangati)Why the end user experience needs Service Assurance (Xangati)
Why the end user experience needs Service Assurance (Xangati)
 
Het Roelof van Echten College werkt dankzij AppSense DataNow apparaat- en loc...
Het Roelof van Echten College werkt dankzij AppSense DataNow apparaat- en loc...Het Roelof van Echten College werkt dankzij AppSense DataNow apparaat- en loc...
Het Roelof van Echten College werkt dankzij AppSense DataNow apparaat- en loc...
 
Door een positieve UC-gebruikerservaring succesvol zijn
Door een positieve UC-gebruikerservaring succesvol zijnDoor een positieve UC-gebruikerservaring succesvol zijn
Door een positieve UC-gebruikerservaring succesvol zijn
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Citrix & Nutanix: 'de kracht van de combinatie

  • 1. Uw werkplek- en datacenterspecialist Ontwerpen • Implementeren • Optimaliseren
  • 2. Citrix & Nutanix: ‘de kracht van de combinatie’ Simple, Secure & Scalable
  • 3. Agenda • 12.00 - 13.00 uur Lunch • 13.00 - 13.10 uur Opening & welkom • 13.10 - 13.50 uur Nutanix • 14.00 - 14.45 uur Citrix & AppSense • 14.45 - 15.00 uur Koffiepauze • 15.00 - 15.30 uur Werkplektransformatie • 15.30 - … uur Afsluiting & borrel
  • 5. Over ICT-Partners • 80 experts • Meer dan 15 jaar ervaring • Drie vestigingen
  • 6. Focus ICT-Partners • Transities van werkplek- en datacenter infrastructuur • Architectuur / Roadmapping • Security • Cloud (services, azure, office 365) • Automation
  • 8. Haal meer uit uw werkplek met Citrix & Nutanix! Door Mahil el Khatib, Nutanix
  • 9. The Enterprise Cloud Company Mahil el Khatib, Sr. Systems Engineer
  • 10. The Best IT Infrastructure Is You Can’t See
  • 12. Web-Scale: Design Point for Invisible Design Principles ••Unbranded x86 servers: fail-fast systems ••No special purpose appliances ••All intelligence and services in software ••Extensive automation and rich analytics ••Distributed everything Benefits ••Linear, predictable scale-out ••Always-on systems ••Fast innovation in software ••Operational simplicity ••Lower TCO
  • 13. You needed VMware. You want Amazon Web Services. YOU’LL LOVE NUTANIX.
  • 14. The Cloud Era Is Well Underway “I deployed my application in five minutes.” Rapid Time to Market “No more time spent on low- level infrastructure management.” One-Click Simplicity “I use and pay for just what I need only when I need it.” Fractional IT Consumption “New capabilities are available on a regular basis.” Continuous Innovation
  • 15. Why Not AWS For All Workloads? Predictable Workloads Elastic Workloads 25% 75% Balance Owning and Renting For Today’s Enterprise Workloads Spin up and down resources on the public cloud Lower costs with private cloud infrastructure
  • 16. Bringing The Cloud To The Enterprise Datacenter Fractional Consumption Invisible Operations Instant Delivery Frictionless Tailored SLAs for Every App Balance Owning and Renting Data Access and Governance Choice and Freedom from Lock-in Control Continuous Innovation
  • 17. Complexity with Legacy Infrastructure x Lifecycle complexity x Resource silos x Support challenges x High costs ++ Automated operations ++ Self-service provisioning ++ Monitoring and analytics Network Virtualization Compute Storage Network Storage
  • 18. Virtualization App App Re-Platforming the Enterprise Datacenter Integrated, scale-out compute and storage Virtualization App App Storage Controller Storage Controller Storage Controller Storage Controller Server Server Storage Controller Storage Controller with built-in virtualization and management
  • 19. Scalable Distributed System Design VM VM VM CVM Hypervisor VM VM VM CVM Hypervisor Tier 1 Workloads (running on all nodes) Nutanix Controller VM (one per node) VM VM VM CVM Hypervisor Distributed Storage Fabric ü Snapshots ü Clones ü Compression ü Deduplication ü Locality ü Tiering ü Erasure Coding ü Resilience Node 1 Node 2 Node N X86 X86 X86
  • 20. Extensible Storage Fabric 20 CVM Distributed Storage Fabric NFS/SMB/iSCSI SMB File Shares FSVM FSVMFSVM iSCSI Volume Groups Bare Metal Apps FSVM VM VM VMVM CVM CVM CVM HYPERVISOR HYPERVISOR HYPERVISORHYPERVISOR
  • 21. Seamless Application and Data Mobility ü Sizer ü One-click Hypervisor Conversion ü Cross-Hypervisor DR ü Foundation ü Backup to Public Cloud ü Cross-Hypervisor Backup App Mobility Fabric VM VM VM CVM VM VM VM CVM ESXi VM VM VM CVM ESXi Node 1 Node 2 Node N Distributed Storage Fabric X86 X86 X86 ESXiESXiESXi ESXiESXi AHV AHV AHV
  • 23. Security-First Design Full-Stack Security Development Lifecycle Micro- Segmentation Encryption Anti-VirusAnti-MalwareFirewall Key Management EcosystemSecurity Certifications Automated Validation and Self-healing Repeat Update Asses Test Measure Report
  • 24. Hyperconverged >> Enterprise Cloud Integrated Compute & Storage Backup & DR Services VM Storage Hyperconverged Infrastructure 2012 File Services Native Virtualization Multi-hypervisor Support Hybrid-cloud Services Machine Intelligence Systems & Ops Mgmt. HCI++ 2014+ Enterprise Cloud Cloud Automation Self Service Network Segmentation Object Storage Application Ecosystem Container Services 2016+ Hyperconverged Infrastructure Integrated Compute & Storage Backup & DR Services VM Storage VxRail Cisco HyperFlex Hewlett Packard Enterprise Block Services Network Visualization Application Mobility
  • 25. Hyper-V Prism Deduplication Innovating at the Speed of The Cloud vSphere support Scale-out storage KVM Support Multi-cluster Management Backup to AWS Built-in Virtualization VM High Availability Backup to Azure VM Flash Mode Erasure Coding Product Launch 2.5 3.0 3.5 4.0 4.1 4.5 4.6 Major New Features in the Nutanix Enterprise Cloud Platform 2011 2012 2013 2014 2015 VM-centric Backup + DR Non-disruptive Upgrades Compression 4.7 4x Faster Performance Integrated File Services AMF Hypervisor Conversion Prism Pro with X-Fit 2016 Block Services Container Support What-If Planning & more..
  • 26. Broad Ecosystem Support Guest Operating Systems Windows Server Applications and Technology Hardware Platforms
  • 27. Powering All Workloads and Use Cases VDI Branch Office Data Protection & Disaster Recovery Big Data Private & Hybrid Clouds Collaboration and UC Enterprise Applications
  • 28. Thank You & One more thing……………
  • 29. TAC Centers NBD Depots Durham Amsterdam 24x7x365 “Follow the Sun” Support 97% Customer Satisfaction +90 Net Promoter Score 70+ Countries Languages 7 WW Support Centers Global Support Overview San Jose Sydney Bangalore Tokyo Beijing
  • 30.
  • 31. Haal meer uit uw werkplek met Citrix & Nutanix! Door Bert Jansema, ICT-Partners
  • 33.
  • 34.
  • 35.
  • 37. Werkplek 2.0 • Technische realisatie (SBC, VDI, virtualisatie) • Informatie altijd beschikbaar door internet en massacommunicatie • Mobiliteit: werkplek op kantoor, thuis en onderweg • Security is een vakgebied
  • 38. • Virtuele teams • Voice command & response • Nieuwe projectietechnieken (glas, holo) • Artificial Intelligence • Virtual Reality • Augmented Reality • Instant data analyse • Volledige persoonlijke afstemming Werkplek 2020
  • 39. Gas los!! Terug naar…
  • 40.
  • 41. ICT ondersteunend, flexibel en onzichtbaar • Bereiken: • Access anywhere anytime anyway • Consistente user experience • Rekening houdend met: • Vraagfluctuatie, onvoorspelbare groei • Snel evoluerende bedreigingen • In de greep houden van: • Kosten! • technische complexiteit
  • 43. W2K12 Citrix Flexcast Management Architecture (FMA) Applicaties & Desktop XenApp Server (Controller & Delivery) W2K12 Applicaties & Desktop XenApp Server (Controller & Delivery) W2K12 Applicaties & Desktop XenApp Server (Controller & Delivery) Delivery Controller W2K12 Applicaties & Desktop Delivery Agent W2K16 Applicaties & Desktop Delivery Agent Win10 Applicaties & Desktop Delivery Agent XenApp IMA XenDesktop FMA SimpleScalable
  • 46. HDX Protocol • Intelligente redirection • Adaptive compression • Data de-duplication SimpleScalable Secure
  • 47. •Any Cloud Hybrid Cloud Provisioning • Amazon Web Services • Windows Azure • Citrix CloudPlatform •Any Device • Citrix Receiver voor Windows, IOS, Android, Linux •Any App • Published Apps (XenApp) • VDI (XenDesktop) • Remote PC SimpleScalable
  • 48. Long Term Service Release • Lagere TCO door hoge kwaliteit van de releases en voorspelbare onderhoudsintervallen • Voorspelbaar onderhoud door cumulatieve update packs • 5 jaar “gewoon” support en 5 jaar extended support • Voorwaarde is dat alle Citrix componentversies LTSR compliant zijn Simple
  • 50. Desktop virtualisatie lagen Compute and Storage (HW) Hypervisor Control and Access Layer Desktop Layer User Layer Infrastructure (Studio, file, AD, SQL, License) Nutanix Acropolis Hypervisor / Vmware ESX / Microsoft Hyper-V Desktop Delivery (XD) & Image Controllers (MCS) Access Controllers (StoreFront) and Networking (NetScaler) Profile management, golden image, and apps User type and end-points (Receiver) Citrix ShareFile and file services
  • 51. Desktop virtualisatie lagen Compute and Storage (HW) Hypervisor Control and Access Layer Desktop Layer User Layer Infrastructure (Studio, file, AD, SQL, License) Nutanix Acropolis Hypervisor / Vmware ESX / Microsoft Hyper-V Desktop Delivery (XD) & Image Controllers (MCS) Access Controllers (StoreFront) and Networking (NetScaler) Profile management, golden image, and apps User type and end-points (Receiver) Citrix ShareFile and file services
  • 53. Citrix Provisioning Services • Stream van ‘image’ (vDisk) naar meerdere machines tegelijkertijd • Maakt gebruik van PXE boot technologie • Sterke afhankelijkheid van goede netwerk-setup, DHCP • Sizing is van groot belang (failover/caching) Mooie oplossing, maar redelijk complex
  • 55. Citrix Machine Creation Services • Functionaliteit van PVS met…… • …..Eenvoud van MCS • Gebruik bestaande hypervisor functies • Geen afhankelijkheid van PXE en DHCP • Geen additionele componenten • Eenvoudige updates
  • 58. Voordelen van MCS op Nutanix? Verdere vereenvoudiging van de MCS architectuur! Eenvoudige configuratie in XenDesktop Studio maakt het leven eenvoudiger: Meerdere kopieën van images Onderhoud van meerdere datastores IO problemen
  • 59. Meer voordelen van MCS Nutanix! Gereduceerde Opstarttijden Betere schaalbaarheid VM migratie
  • 60. Desktop virtualisatie lagen Compute and Storage (HW) Hypervisor Control and Access Layer Desktop Layer User Layer Infrastructure (Studio, file, AD, SQL, License) Nutanix Acropolis Hypervisor / Vmware ESX / Microsoft Hyper-V Desktop Delivery (XD) & Image Controllers (MCS) Access Controllers (StoreFront) and Networking (NetScaler) Profile management, golden image, and apps User type and end-points (Receiver) Citrix ShareFile and file services
  • 61. HP, Dell, Cisco, Lenovo Cisco, HP, Arista, Mellanox Qlogic, Emulex EMC, NetApp, HP, Dell, HDS Cisco, Brocade VMware, Microsoft, XenServer Cisco, HP, Arista, Mellanox VMware, Microsoft Simplifying the XenDesktop Infrastructure Stack Network Scale out compute and storage Virtualization Network Virtualization Compute SAN Fabric Storage AHV Nutanix
  • 62. Citrix – Nutanix Integration Production Ready for AHV Integrated Management Fast Provisioning No vTax to run Citrix on Nutanix Fully integrated with Desktop Studio UI High speed image updates and operations Includes Nutanix standard benefits • Shadow clones and boot-storm handling • Rapid troubleshooting and clear ops line-of-sight • Linear scaling and pay-as-you-grow consumption model
  • 63. Native Citrix Studio Integration
  • 64. Going distributed simplifies things.. Before After
  • 65. Linearly Scaling Virtual Desktop Infrastructure VMs(Desktops) • Scale incrementally one node at a time • Protect infrastructure investment by eliminating forklift upgrades • Scale storage capacity & performance linearly Pay-as-you-grow Number of Nodes
  • 66. Citrix XenDesktop/XenApp on Nutanix AHV VM VM VM VM VM VM VM VM VM VM AHV Nutanix AHV is Citrix XenApp/XenDesktop Citrix NetScaler VPX* Citrix ShareFile Citrix Cloud Citrix StoreFront XenDesktop Delivery Controller AHV Citrix Sharefile & File services SQL Server & Infra /network services Citrix Studio, Director VM Citrix NetScaler VPX
  • 67. Desktop virtualisatie lagen Compute and Storage (HW) Hypervisor Control and Access Layer Desktop Layer User Layer Infrastructure (Studio, file, AD, SQL, License) Nutanix Acropolis Hypervisor / Vmware ESX / Microsoft Hyper-V Desktop Delivery (XD) & Image Controllers (MCS) Access Controllers (StoreFront) and Networking (NetScaler) Profile management, golden image, and apps User type and end-points (Receiver) Citrix ShareFile and file services
  • 68. “SET THE USER FREE” e n d p o i n t s e c u r i t y s i m p l i f i e d AppSense now part of the LANDESK family
  • 69. zonder concessies aan veiligheid en beheersbaarheid
  • 71. Mobile VIRTUALPHYSICAL AND UNMANAGEDMANAGED AND BYODCOPE AND PERSONAL APPSCORPORATE APPS AND PERSONAL DATACORPORATE DATA AND ALWAYS AND I.T. MANAGED USER MANAGED
  • 72. Users want to Personalize their workspace and access their Data. IT wants to manage Policy, Privilege, Performance and Analytics for each user. Combined, these elements define User DNA™ Workspace Management IT Settings User Settings + = User DNA™ AppSense unlocks User DNA™ so IT can manage it independently. Personalization Policy Privileges Performance Data Access Analytics
  • 73. User DNA™ is stored, managed and distributed from a central AppSense database, leveraging the AppSense platform. IT gets granular, contextual control allowing User DNA™ to follow the user, creating a seamless workspace experience. AppSense Database Physical Virtual Cloud Workspace Management
  • 74. Creating a Balanced Portfolio Patch Management Endpoint Security Configuration Management Physical, Virtual & Mobile Service Management Asset Management User Environment Management Security AnalyticsandDashboards Environment Management Privilege Management Application Control File & Profile Migration
  • 75. PROTECT Protects against zero-day attacks by preventing malicious software from executing CONTROLEXECUTION Apply precise control over how authorized applications execute and whether applications can launch other applications to prevent stealth rootkits from infiltrating your enterprise systems. RANSOMWARECONTINUOUSTORISE Ransomware is not going away any time soon, because the business model offers high reward for minimal effort. Compared to 2015’s 29 ransomware families, 79 new families already emerged this year PREVENT Prevents malware from running when your host system reboots. Also locks down the registry until rights are approved by the IT administrator 01 02 03 04 Protect Against Ransomware Source: TrendLabs 2016 Security Roundup
  • 76. Common Security Weakness § Almost all forms of attack use privilege escalation when installing malware that needs administrative privileges. § Phishing, which continues to be the most common front end for damaging attacks, is used to obtain user credentials from which to start the escalation, and phishing succeeds because of poor hygiene in application and privilege management.
  • 77. 85% of all Critical vulnerabilities documented in the report can be mitigated by removing admin rights *2015 Microsoft Vulnerabilities Report 99.5% of all vulnerabilities reported in Internet Explorer in 2015 could be mitigated by removing admin rights *2015 Microsoft Vulnerabilities Report 86% of reported vulnerabilities come from 3rd party applications. *National Vulnerability Database In 2015, Microsoft Windows represented the most targeted software platform, with 42 percent of the top 20 discovered exploits directed at Microsoft platforms and applications. *HP Cyber Risk Report 2016 Malware Monetization and Application Vulnerabilities The average ransom discovered to date in 2016 stands at US$679, up from $294 in 2015 *ISTR Ransomware & Business, Symantec Feb 2016, the Hollywood Presbyterian Medical Center (HPMC) paying the attackers’ demand of US$17,000
  • 78. Missing Patches • Third Party • MS Office • Adobe • Java 01 Dangerous Applications • Media • Runtimes • Web browsers 02 Misconfigured User Access • Admin rights • Least Privilege • Password Management 03 Unprotected Data • Sensitive Data • Unencrypted • Multiple Storage 04 Endpoint Security Threats
  • 79. Patching • Clear visibility on all endpoints • Effective Detection • Automatic Policy Enforcement • Single Management Console 01 Unhazardous Applications • Minimize exposure • Automatic uninstall • Application Whitelist/Blac klist • EPC for remote connections 02 Proper User Access • Remove Admin rights • Determine Least Privilege • Automate Elevation • User self- service Portal 03 Data Protection • Enable Data Encryption • Automated Scans • Protect External Media • Backup and Recovery 04 Endpoint Security Best Practices
  • 81. Strategic Approach & Benefit MITIGATES AT LEAST OF TARGETED CYBER INTRUSIONS • National Security Agency, Information Assurance Guidance, www.nsa.gov/ia/mitigation_guidance/ • Australian Government Department of Defence, Strategies to Mitigate Targeted Cyber Intrusions, www.asd.gov.au/infosec/mitigationstrategies.htm PATCH Applications and Operating System CATCH Malicious software with a Whitelist MATCH The Right People with the Right Privileges
  • 82. Introducing… AppSense Endpoint Security § Privilege Management § Application Control with Trusted Ownership™ § Granular Exceptions § Prescriptive Security Analytics § Automated Patch Management
  • 83. Regain Control of Applications Regain control of applications running across the business without locking down your users Use cases – Security and beyond • Deploy all users as standard users • Assign privilege to individual applications based on user roles and needs • Prevent execution of unauthorized applications
  • 84. Productivity & Security Control Panel – uninstall program Task Manager – kill process Regedit / Command Action Example Solution Install Applications Change Configurations Remove Patches & Uninstall Software Defeat Security Tools control.exe Denied Application: Denied Application: cmd.exe regedit.exe taskmgr.exe Denied Application: Application Control:
  • 85. System Level Visibility System Level (ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe, .dll processes, App launches, binaries created, drivers, etc.)
  • 86. Intelligence System Level (ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe, .dll processes, App launches, binaries created, drivers, etc.) Application Control by :Trusted Ownership – IT Admin or Service Account White / Blacklisting Digital Signatures
  • 87. Control System Level (ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe, .dll processes, App launches, binaries created, drivers, etc.) Application Control by: Trusted Ownership – IT Admin or Service Account White / Blacklisting Digital Signatures Network Access Control - Application Termination Application Control - URL Redirection - Rights Management – Self Elevation – Win Store App Control
  • 88. Prevent & Awareness System Level (ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe, .dll processes, App launches, binaries created, drivers, etc.) Application Control by means of Trusted Ownership – IT Admin or Service Account White / Blacklisting Digital Signatures Quarantine Block Warn Dialogue Monitor Educate Network Access Control - Application Termination Application Control - URL Redirection – Privilege Management – Self Elevation – Granular Exceptions & Contextual Aware - Win Store App Control (Win8/8.1/10)
  • 89. Response System Level (ActiveX controls, VBscripts, batch files, MSI packages and registry configuration files, .exe, .dll processes, App launches, binaries created, drivers, etc.) Application Control by: Trusted Ownership – IT Admin or Service Account White / Blacklisting Digital Signatures Quarantine Block Warn Dialogue Monitor Educate Auditing / Monitoring Advanced Reporting Application Admin Rights Discovery Evidentiary Forensics License Management Network Access Control - Application Termination Application Control - URL Redirection - Rights Management – Self Elevation – Granular Exceptions & Contextual Aware - Win Store App Control (Win8/8.1/10)
  • 90. AppSense Endpoint Security Allows desktop and InfoSec teams to protect endpoints and enable regulatory compliance without degrading the user experience. Protection Identify and block unauthorized applications from running Automate Microsoft and third-party application patch assessment and deployment Enforce software licensing and ensure compliance Detect suspicious endpoint behaviour User Experience & Productivity Manage user privileges and policies at a highly granular level Allow user self-elevation Monitor admin rights and self-elevation trends
  • 93. Citrix Productportfolio • Citrix XenApp • Citrix XenDesktop • Citrix XenServer • Citrix XenClient • NetScaler • NetScaler Gateway • NetScaler CloudBridge • Provisioning Server • XenMobile • Citrix Receiver • ShareFile • GoToMyPC
  • 94.
  • 95. Een succesvolle werkplektransformatie Door Jan van Pijkeren, VPProjects
  • 96. Handreiking voor een succesvolle transitie Jan van Pijkeren - Projectmanager
  • 97. Waar begin ik? Afbeelding: http://www.huffingtonpost.com
  • 99. De Business Case staat en nu? Afbeelding: https://nl.wikipedia.org/wiki/Project
  • 102. Wat staat er in? Waarom Wat is het doel? Wat Welk eindproduct ga je maken? Hoe Op welke manier ga je het doen? Wie Welke mensen gaan meedoen? Welke middelen Welk materiaal, welk materieel? Wanneer Wat is het tijdpad van het project?
  • 105. Wat kan Pitz voor u betekenen? Afbeelding: http://www.topchange.nl/opleiding-project-management/
  • 107. Onze oplossingen ICT-Partners helpt u succesvol te zijn met uw ICT. Wij ontwerpen, implementeren en optimaliseren ICT-omgevingen met de nieuwste technologieën, die bijdragen aan continuïteit, stabiliteit en kostenbesparing.
  • 109. ICT-Partners Vosselmanstraat 2 7311 CL Apeldoorn T 055 528 22 22 E Connect@ict-partners.nl Hoofdweg 290 9765 CN Paterswolde T 050 364 31 02 E Connect@ict-partners.nl