Phantosys is an extraordinary client management software solution, based on sophisticated and unique virtualization technology, developed to address the pains of IT management, using a concept that is very effective, yet simple to use, affordable and compatible with almost any type of computer and operating system.
2. What is Phantosys?
User Workspace
Hardware
Operating System
User Workspace
Software
Virtualized
Environment
Hardware
Traditional Desktop Virtualized Desktop
Intelligent Deskstop Virtualization (IDV)
Intelligent Deskstop Virtualization (IDV)
4.
Increase utilization of
OS & AP license BY
70%
LICENSE SHARING
MECHANISM
PC down time
possibility reduce BY
90%
MANAGEMENT
FUNCTION
99%
Emergency recovery time
reduce BY
SPEEDY
RECOVERY
Centralized management
with local client
processing
100%
PC
COMPABILITY
1.
Features of Phantosys
It provides a secure end-user experience without the complexity,
infrastructure investment and reduces the need for data center computing
capacity while improving end-user performance. It can deliver across all
types of applications, and across all connectivity scenarios with immediate
return on investment.
Phantosys stands for “Phantom System” with holding concept of IDV (Intelligent
Desktop Virtualization),which is to increase end user security. It is an evolution of
cutting edged desktop management. It simplifies desktop strategy in order to
provide common desktop image across the environment and deliver securely to
any device (endpoint) locate anywhere in the world.
Values of Phantosys
Maximize utilization of software license
through sharing concept
Lower TCO by reducing PC down time
Reduce cost of software deployment
Financial Benefits
Centralized management of Operating
Systems & Applications
Virus free environment
System restore with just a single reboot
Desktop policy standardization
Operation Benefits
Benefits of Phantosys
Protects user data in the event of
hard disk crash
Secure data link layer access will
ensure desktop data security
OS
OS + APP1
OS + APP2
Patented tree-structure image database
allows differential storage of relatively
minor variation among versions of user desktops,
enabling significant performance increase
Hassle free
software
deployment
and reduce time
consuming routine
Operating System
Restoration with
single reboot button
Virus free environment even
without using antivirus software
ram
Local cache allows for low
bandwidth environment and
minimize traffic during peak period
Prevent illegal
applications installed
on clients PC
Versatile support for multiple
operating system :
Windows XP / Vista / 7 / 8 /8.1
Linux: Ubuntu/CentOS/Fedora/
Suse/Redhat/Debian
Phantosys allow desktop management to be done
centrally with local execution so that IT retains full
control over operating system and application by
managing master image from data center and relies
on local computer to process. It creates layered
images to simplify management and allow for user
customization.
Prevent illegal application
installed on PCs
3. How Phantosys works?
Operating System
Office Software
Finance Software
Programming Software
Multi system platform
specific PIM structure
System
Management
Server
Concept of Phantosys System
Administrator Office
Finance Department
Human Resources Department
Developer Department
Transforming PCs into Smart Terminals
Processing
Environments
Combination
Intelligent Deskstop Virtualization (IDV)Intelligent Deskstop Virtualization (IDV)
Phantosys Main Features ?
Full disk encryption
Phantosys uses advanced encryption technique to protect locally stored data. We use full disk
encryption instead of encrypting just the files containing the virtual machines. Full disk
encryption provides a higher level of security and to improve regulatory compliance. Data store
on the end user device is not accessible until the user fully authenticates to unlock the device.
The encrypted data is not accessible if the endpoint is stolen or an attempt is made to remove
hard disk and put into another computer.
Instant Data Recovery
Another management feature is auto detect last changes to end user files and stream those
changes back to data center where backup image of the end user’s environment is kept. Thus, a
completely up-to-date replacement image with most recently backed-up data can be push to
any endpoints as long it is authenticates to unlock the device.
IT can set policies for which items to back up, back up frequency and how many backup
versions are stores. They also provide differential backup and de-duping capabilities to reduce
network bandwidth and storage requirements.
Prevent data theft for lost at endpoint
Phantosys offer capabilities to continuously monitor end point devices in order to identify and
track lost or stolen device. Monitoring frequencies and lockout policies can be set for each
individual virtual machine. Phantosys can issue a self-destruct command to the stolen or lost
PCs by remotely kill function.
Prevent data theft by Input Output(I/O) and USB controls
Enterprise IT can set up permissions prohibited data theft to have full control over Input Output
(I/O) such as CDROM, Floppy Drive and USB devises permissions.
Virus protection
Since Phantosys owns all of the hardware resources on the endpoint which is purely a VM now,
it render no viruses to attack by ways of attacking the Window version with the intent of
logging keystrokes or scraping screen data. This is providing a high level of security to guest
operating system which is not available natively.
Flexibility with high security: Allow different environment to co-exist
Not only that, it maintains complete separation between environments. It is the best way to
allow users the freedom to use their own personal environment for corporate use or vice versa.
Corporate environment is locked down and safe while personal environment will not be leaked
over the corporate partition. This allowed both of these environment to co-exist on the same
PC or laptop.
2.
3.
Endpoint maintenance free
Endpoints may rapidly degrade in performance due to virus infect, users wreak havoc on
the settings, plug-ins, and applications on the PCs. With Phantosys reboot policies and
snapback capability, every time a PC boots, it boots form the clean image ensuring the
best performance and virtually maintenance free. It allows IT to achieve zero
maintenance and zero antivirus desktop environment.
Maximize Software Resources and minimize Software Investment
With Phantosys, IT can create multiple master images to host different kind of
applications. It allows the master image to be deployed to different endpoints at
different time. This increases the utilization of applications & reduces software licenses
purchase.
Phantosys is based on the concept of local client processing
with centralized control, thus keeping the level of performance
and compatibility similar to a normal PC.
Phantosys leverages client hardware resources independent of
operating system to create a robust computing platform achieving
operation excellency, full control of central management with maximum
flexibility and securing Virtual machines (VM) on the endpoint .