SlideShare a Scribd company logo
1 of 3
Download to read offline
Intelligent
Desktop
Virtualization (IDV)
ram
OS
OS + APP1
OS + APP2
What is Phantosys?
User Workspace
Hardware
Operating System
User Workspace
Software
Virtualized
Environment
Hardware
Traditional Desktop Virtualized Desktop
Intelligent Deskstop Virtualization (IDV)
Intelligent Deskstop Virtualization (IDV)
4.
Increase utilization of
OS & AP license BY
70%
LICENSE SHARING
MECHANISM
PC down time
possibility reduce BY
90%
MANAGEMENT
FUNCTION
99%
Emergency recovery time
reduce BY
SPEEDY
RECOVERY
Centralized management
with local client
processing
100%
PC
COMPABILITY
1.
Features of Phantosys
It provides a secure end-user experience without the complexity,
infrastructure investment and reduces the need for data center computing
capacity while improving end-user performance. It can deliver across all
types of applications, and across all connectivity scenarios with immediate
return on investment.
Phantosys stands for “Phantom System” with holding concept of IDV (Intelligent
Desktop Virtualization),which is to increase end user security. It is an evolution of
cutting edged desktop management. It simplifies desktop strategy in order to
provide common desktop image across the environment and deliver securely to
any device (endpoint) locate anywhere in the world.
Values of Phantosys
Maximize utilization of software license
through sharing concept
Lower TCO by reducing PC down time
Reduce cost of software deployment
Financial Benefits
Centralized management of Operating
Systems & Applications
Virus free environment
System restore with just a single reboot
Desktop policy standardization
Operation Benefits
Benefits of Phantosys
Protects user data in the event of
hard disk crash
Secure data link layer access will
ensure desktop data security
OS
OS + APP1
OS + APP2
Patented tree-structure image database
allows differential storage of relatively
minor variation among versions of user desktops,
enabling significant performance increase
Hassle free
software
deployment
and reduce time
consuming routine
Operating System
Restoration with
single reboot button
Virus free environment even
without using antivirus software
ram
Local cache allows for low
bandwidth environment and
minimize traffic during peak period
Prevent illegal
applications installed
on clients PC
Versatile support for multiple
operating system :
Windows XP / Vista / 7 / 8 /8.1
Linux: Ubuntu/CentOS/Fedora/
Suse/Redhat/Debian
Phantosys allow desktop management to be done
centrally with local execution so that IT retains full
control over operating system and application by
managing master image from data center and relies
on local computer to process. It creates layered
images to simplify management and allow for user
customization.
Prevent illegal application
installed on PCs
How Phantosys works?
Operating System
Office Software
Finance Software
Programming Software
Multi system platform
specific PIM structure
System
Management
Server
Concept of Phantosys System
Administrator Office
Finance Department
Human Resources Department
Developer Department
Transforming PCs into Smart Terminals
Processing
Environments
Combination
Intelligent Deskstop Virtualization (IDV)Intelligent Deskstop Virtualization (IDV)
Phantosys Main Features ?
 Full disk encryption
Phantosys uses advanced encryption technique to protect locally stored data. We use full disk
encryption instead of encrypting just the files containing the virtual machines. Full disk
encryption provides a higher level of security and to improve regulatory compliance. Data store
on the end user device is not accessible until the user fully authenticates to unlock the device.
The encrypted data is not accessible if the endpoint is stolen or an attempt is made to remove
hard disk and put into another computer.
 Instant Data Recovery
Another management feature is auto detect last changes to end user files and stream those
changes back to data center where backup image of the end user’s environment is kept. Thus, a
completely up-to-date replacement image with most recently backed-up data can be push to
any endpoints as long it is authenticates to unlock the device.
IT can set policies for which items to back up, back up frequency and how many backup
versions are stores. They also provide differential backup and de-duping capabilities to reduce
network bandwidth and storage requirements.
 Prevent data theft for lost at endpoint
Phantosys offer capabilities to continuously monitor end point devices in order to identify and
track lost or stolen device. Monitoring frequencies and lockout policies can be set for each
individual virtual machine. Phantosys can issue a self-destruct command to the stolen or lost
PCs by remotely kill function.
 Prevent data theft by Input Output(I/O) and USB controls
Enterprise IT can set up permissions prohibited data theft to have full control over Input Output
(I/O) such as CDROM, Floppy Drive and USB devises permissions.
 Virus protection
Since Phantosys owns all of the hardware resources on the endpoint which is purely a VM now,
it render no viruses to attack by ways of attacking the Window version with the intent of
logging keystrokes or scraping screen data. This is providing a high level of security to guest
operating system which is not available natively.
 Flexibility with high security: Allow different environment to co-exist
Not only that, it maintains complete separation between environments. It is the best way to
allow users the freedom to use their own personal environment for corporate use or vice versa.
Corporate environment is locked down and safe while personal environment will not be leaked
over the corporate partition. This allowed both of these environment to co-exist on the same
PC or laptop.
2.
3.
 Endpoint maintenance free
Endpoints may rapidly degrade in performance due to virus infect, users wreak havoc on
the settings, plug-ins, and applications on the PCs. With Phantosys reboot policies and
snapback capability, every time a PC boots, it boots form the clean image ensuring the
best performance and virtually maintenance free. It allows IT to achieve zero
maintenance and zero antivirus desktop environment.
 Maximize Software Resources and minimize Software Investment
With Phantosys, IT can create multiple master images to host different kind of
applications. It allows the master image to be deployed to different endpoints at
different time. This increases the utilization of applications & reduces software licenses
purchase.
Phantosys is based on the concept of local client processing
with centralized control, thus keeping the level of performance
and compatibility similar to a normal PC.
Phantosys leverages client hardware resources independent of
operating system to create a robust computing platform achieving
operation excellency, full control of central management with maximum
flexibility and securing Virtual machines (VM) on the endpoint .

More Related Content

What's hot

Radmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationRadmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationFamatech
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkawayrichardebowers
 
The People Terminating Unit
The People Terminating UnitThe People Terminating Unit
The People Terminating UnitCharles Moore
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutionsCanon Business CEE
 
Mudhrastec corporate brochur
Mudhrastec corporate brochur Mudhrastec corporate brochur
Mudhrastec corporate brochur Mudhrastec FZE
 
I 21455 amt-infographic-final
I 21455 amt-infographic-finalI 21455 amt-infographic-final
I 21455 amt-infographic-finalStefano Budimir
 
Embedded software development
Embedded software developmentEmbedded software development
Embedded software developmentPronesisvip
 
User manual freedom gateway lite 2.0
User manual freedom gateway lite 2.0User manual freedom gateway lite 2.0
User manual freedom gateway lite 2.0Vivek Mehrotra
 
Innowave Freedom NANO =PACS + Tele-radiology + Structured Reporting
Innowave Freedom NANO =PACS + Tele-radiology + Structured  Reporting Innowave Freedom NANO =PACS + Tele-radiology + Structured  Reporting
Innowave Freedom NANO =PACS + Tele-radiology + Structured Reporting Vivek Mehrotra
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systemsMinal21
 
UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in LinuxDr.YNM
 
Embeddedsystem 110412132957-phpapp02
Embeddedsystem 110412132957-phpapp02Embeddedsystem 110412132957-phpapp02
Embeddedsystem 110412132957-phpapp02ishan111
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systemskondalarao7
 
Embedded Systems Overview
Embedded Systems OverviewEmbedded Systems Overview
Embedded Systems OverviewSameer Rapate
 
Embedded Systems Implementation and Applications
Embedded Systems Implementation and ApplicationsEmbedded Systems Implementation and Applications
Embedded Systems Implementation and ApplicationsKaushik Padmanabhan
 

What's hot (20)

Radmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimizationRadmin - efficient solution for business processes optimization
Radmin - efficient solution for business processes optimization
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor
 
Imprivata Secure Walkaway
Imprivata Secure WalkawayImprivata Secure Walkaway
Imprivata Secure Walkaway
 
The People Terminating Unit
The People Terminating UnitThe People Terminating Unit
The People Terminating Unit
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
 
Mudhrastec corporate brochur
Mudhrastec corporate brochur Mudhrastec corporate brochur
Mudhrastec corporate brochur
 
I 21455 amt-infographic-final
I 21455 amt-infographic-finalI 21455 amt-infographic-final
I 21455 amt-infographic-final
 
Embedded software development
Embedded software developmentEmbedded software development
Embedded software development
 
User manual freedom gateway lite 2.0
User manual freedom gateway lite 2.0User manual freedom gateway lite 2.0
User manual freedom gateway lite 2.0
 
Innowave Freedom NANO =PACS + Tele-radiology + Structured Reporting
Innowave Freedom NANO =PACS + Tele-radiology + Structured  Reporting Innowave Freedom NANO =PACS + Tele-radiology + Structured  Reporting
Innowave Freedom NANO =PACS + Tele-radiology + Structured Reporting
 
Desktop support qua
Desktop support quaDesktop support qua
Desktop support qua
 
Chapter # 1
Chapter # 1Chapter # 1
Chapter # 1
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
 
DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Embeddedsystem 110412132957-phpapp02
Embeddedsystem 110412132957-phpapp02Embeddedsystem 110412132957-phpapp02
Embeddedsystem 110412132957-phpapp02
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Embedded Systems Overview
Embedded Systems OverviewEmbedded Systems Overview
Embedded Systems Overview
 
Embedded Systems Implementation and Applications
Embedded Systems Implementation and ApplicationsEmbedded Systems Implementation and Applications
Embedded Systems Implementation and Applications
 

Similar to Phantosys overview - Intelligent Desktop Virtualization

Phantosys innovation for home office and BYOD
Phantosys innovation for home office and BYODPhantosys innovation for home office and BYOD
Phantosys innovation for home office and BYODJose Bittencourt
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overviewNine23Ltd
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Nirav Ambani
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesJeff Stokes
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistNCS Computech Ltd.
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet TemplateTDSmaker
 
Unified threat management software 21 july 17
Unified threat management software 21 july 17Unified threat management software 21 july 17
Unified threat management software 21 july 17Yabibo
 
Unified threat management software 15 july 17
Unified threat management software 15 july 17Unified threat management software 15 july 17
Unified threat management software 15 july 17Yabibo
 
jentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finaljentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finalBen Ohana
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Marketing Team
 
Embedded systems software
Embedded systems softwareEmbedded systems software
Embedded systems softwarealanradley
 
Pano Logic - Purpose-built for Virtualization
Pano Logic - Purpose-built for VirtualizationPano Logic - Purpose-built for Virtualization
Pano Logic - Purpose-built for VirtualizationAngela M. Deisley
 

Similar to Phantosys overview - Intelligent Desktop Virtualization (20)

unit5final
unit5finalunit5final
unit5final
 
Phantosys innovation for home office and BYOD
Phantosys innovation for home office and BYODPhantosys innovation for home office and BYOD
Phantosys innovation for home office and BYOD
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
usb-lock-rp-en
usb-lock-rp-enusb-lock-rp-en
usb-lock-rp-en
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590Thin Client Smart Station Smart 2590
Thin Client Smart Station Smart 2590
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
Owny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring FeaturelistOwny IT Desktop Monitoring Featurelist
Owny IT Desktop Monitoring Featurelist
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
 
Unified threat management software 21 july 17
Unified threat management software 21 july 17Unified threat management software 21 july 17
Unified threat management software 21 july 17
 
Unified threat management software 15 july 17
Unified threat management software 15 july 17Unified threat management software 15 july 17
Unified threat management software 15 july 17
 
jentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-finaljentu-product-press-release-july-16th2016--omni_axcess-final
jentu-product-press-release-july-16th2016--omni_axcess-final
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018
 
Embedded systems software
Embedded systems softwareEmbedded systems software
Embedded systems software
 
Pano Logic - Purpose-built for Virtualization
Pano Logic - Purpose-built for VirtualizationPano Logic - Purpose-built for Virtualization
Pano Logic - Purpose-built for Virtualization
 
Thin client mechanism
Thin client mechanismThin client mechanism
Thin client mechanism
 
Network Monitoring
Network MonitoringNetwork Monitoring
Network Monitoring
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Phantosys overview - Intelligent Desktop Virtualization

  • 2. What is Phantosys? User Workspace Hardware Operating System User Workspace Software Virtualized Environment Hardware Traditional Desktop Virtualized Desktop Intelligent Deskstop Virtualization (IDV) Intelligent Deskstop Virtualization (IDV) 4. Increase utilization of OS & AP license BY 70% LICENSE SHARING MECHANISM PC down time possibility reduce BY 90% MANAGEMENT FUNCTION 99% Emergency recovery time reduce BY SPEEDY RECOVERY Centralized management with local client processing 100% PC COMPABILITY 1. Features of Phantosys It provides a secure end-user experience without the complexity, infrastructure investment and reduces the need for data center computing capacity while improving end-user performance. It can deliver across all types of applications, and across all connectivity scenarios with immediate return on investment. Phantosys stands for “Phantom System” with holding concept of IDV (Intelligent Desktop Virtualization),which is to increase end user security. It is an evolution of cutting edged desktop management. It simplifies desktop strategy in order to provide common desktop image across the environment and deliver securely to any device (endpoint) locate anywhere in the world. Values of Phantosys Maximize utilization of software license through sharing concept Lower TCO by reducing PC down time Reduce cost of software deployment Financial Benefits Centralized management of Operating Systems & Applications Virus free environment System restore with just a single reboot Desktop policy standardization Operation Benefits Benefits of Phantosys Protects user data in the event of hard disk crash Secure data link layer access will ensure desktop data security OS OS + APP1 OS + APP2 Patented tree-structure image database allows differential storage of relatively minor variation among versions of user desktops, enabling significant performance increase Hassle free software deployment and reduce time consuming routine Operating System Restoration with single reboot button Virus free environment even without using antivirus software ram Local cache allows for low bandwidth environment and minimize traffic during peak period Prevent illegal applications installed on clients PC Versatile support for multiple operating system : Windows XP / Vista / 7 / 8 /8.1 Linux: Ubuntu/CentOS/Fedora/ Suse/Redhat/Debian Phantosys allow desktop management to be done centrally with local execution so that IT retains full control over operating system and application by managing master image from data center and relies on local computer to process. It creates layered images to simplify management and allow for user customization. Prevent illegal application installed on PCs
  • 3. How Phantosys works? Operating System Office Software Finance Software Programming Software Multi system platform specific PIM structure System Management Server Concept of Phantosys System Administrator Office Finance Department Human Resources Department Developer Department Transforming PCs into Smart Terminals Processing Environments Combination Intelligent Deskstop Virtualization (IDV)Intelligent Deskstop Virtualization (IDV) Phantosys Main Features ?  Full disk encryption Phantosys uses advanced encryption technique to protect locally stored data. We use full disk encryption instead of encrypting just the files containing the virtual machines. Full disk encryption provides a higher level of security and to improve regulatory compliance. Data store on the end user device is not accessible until the user fully authenticates to unlock the device. The encrypted data is not accessible if the endpoint is stolen or an attempt is made to remove hard disk and put into another computer.  Instant Data Recovery Another management feature is auto detect last changes to end user files and stream those changes back to data center where backup image of the end user’s environment is kept. Thus, a completely up-to-date replacement image with most recently backed-up data can be push to any endpoints as long it is authenticates to unlock the device. IT can set policies for which items to back up, back up frequency and how many backup versions are stores. They also provide differential backup and de-duping capabilities to reduce network bandwidth and storage requirements.  Prevent data theft for lost at endpoint Phantosys offer capabilities to continuously monitor end point devices in order to identify and track lost or stolen device. Monitoring frequencies and lockout policies can be set for each individual virtual machine. Phantosys can issue a self-destruct command to the stolen or lost PCs by remotely kill function.  Prevent data theft by Input Output(I/O) and USB controls Enterprise IT can set up permissions prohibited data theft to have full control over Input Output (I/O) such as CDROM, Floppy Drive and USB devises permissions.  Virus protection Since Phantosys owns all of the hardware resources on the endpoint which is purely a VM now, it render no viruses to attack by ways of attacking the Window version with the intent of logging keystrokes or scraping screen data. This is providing a high level of security to guest operating system which is not available natively.  Flexibility with high security: Allow different environment to co-exist Not only that, it maintains complete separation between environments. It is the best way to allow users the freedom to use their own personal environment for corporate use or vice versa. Corporate environment is locked down and safe while personal environment will not be leaked over the corporate partition. This allowed both of these environment to co-exist on the same PC or laptop. 2. 3.  Endpoint maintenance free Endpoints may rapidly degrade in performance due to virus infect, users wreak havoc on the settings, plug-ins, and applications on the PCs. With Phantosys reboot policies and snapback capability, every time a PC boots, it boots form the clean image ensuring the best performance and virtually maintenance free. It allows IT to achieve zero maintenance and zero antivirus desktop environment.  Maximize Software Resources and minimize Software Investment With Phantosys, IT can create multiple master images to host different kind of applications. It allows the master image to be deployed to different endpoints at different time. This increases the utilization of applications & reduces software licenses purchase. Phantosys is based on the concept of local client processing with centralized control, thus keeping the level of performance and compatibility similar to a normal PC. Phantosys leverages client hardware resources independent of operating system to create a robust computing platform achieving operation excellency, full control of central management with maximum flexibility and securing Virtual machines (VM) on the endpoint .