Plan H1n1 Update 2


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Enter Virtual Desktop Infrastructure technology or VDI. Many organizations can realize the benefits of server-based computing (SBC) technology because VDI is a form of SBC. The difference is organizations can benefit from the efficiencies of virtualizing their desktops in the data center. VDI delivers completely isolated desktops to end users that are not shared. And there are no application compatibility problems. Many organizations are considering VDI, but they should really be only looking at one vendor, VMware. And here’s why…
  • Deploy desktops in minutes instead of weeks through automated desktop provisioning. Standardize the deployment process by maintaining a library of pre-built desktop images in VMware VirtualCenter that can be called on quickly when a new office or group of users are needed.
  • VMware VDM 2 is tightly integrated with Active Directory and AD authentication is a pre-requisite for VDM. Typically customer already maintain users in the Active Directory. VMware VDM references these user accounts instead of relying on an internal directory or database of users. There are many benefits of this approach: VMware VDM supports authentication against complex multi domain configurations. Many customers have user accounts in different domains and use domain trusts to authorize access to resources in the Windows infrastructure. VMware VDM supports these sophisticated configurations by default. User management processes do not have to be disrupted by implementing VMware VDM. These include creating user accounts, resetting passwords and changing NT permissions for users to groups. For example, if the process for resetting a user password is that the user calls the helpdesk, this can continue without having to retrain the helpdesk administrators. User account policies, such as password complexity or expiration are also retained. Users in VMware VDM can reuse any existing group policy in the domain. By referencing domain accounts directly, VMware VDM does not need to use third-party or inbuilt replication systems. This means there is no risk of data becoming out of sync and removes any computational overhead of user-data replication. It is possible to configure strong two-factor authentication using SecurID, in addition to AD authentication. Two-factor authentication is often a requirement for users who access the VDI environment from an un-trusted client or over an un-trusted network.
  • The VDM Client is an application used to connect clients to VDM Connection server and to virtual desktops. The user enters the URL of the VDM Connection Server and their AD credentials into the VDM Client. Alternatively, end users may use a browser to access their VDI desktop. VMware VDI can be enhanced using thin clients. Thin clients can reduce the TCO of a VMware VDI deployment because the ongoing support and maintenance costs of thin clients is generally less than that of traditional PCs. VMware VDM 2 support XPe and Linux clients, which provides support for many of the thin clients on the market. The WYSE S10 and V10L devices are also supported.
  • Plan H1n1 Update 2

    1. 1. Contingency plan for H1N1 Eduardo Penedos July 2009
    2. 2. Agenda <ul><ul><li>The Challenge </li></ul></ul><ul><ul><li>The Contingency Plan </li></ul></ul><ul><ul><li>The Solution </li></ul></ul><ul><ul><li>The Action Plan </li></ul></ul>
    3. 3. The Challenge <ul><ul><li>H1N1 is much more contagious than normal flu which may cause huge impacts on the work force. (Huge number of employees sick at the same time, estimates around 40% during peak times) </li></ul></ul><ul><ul><li>The Health Authorities will “enforce” on quarantine for individuals that some how were in contact with other individuals who has a positive diagnostic. This could lead, in same cases to entire departments, even offices to be without human resources. </li></ul></ul><ul><ul><li>Forecasts indicate that the major disruption regarding H1N1 will be related to supply chains fulfillments, not people. Meaning that B2B and B2C will be severed impacted. </li></ul></ul><ul><ul><li>In a stressed economic situation like the one we are facing is mandatory to keep the business running. Employees will be required to work from home when needed. </li></ul></ul><ul><ul><li>Stress period … Oct thru Dec ( at least in Portugal) </li></ul></ul>
    4. 4. The Contingency Plan <ul><ul><li>Quickly create an infrastructure to host the necessary number of desktops to keep business critical operations running. </li></ul></ul><ul><ul><li>Maintain the security levels required using customer own VPN of a SSL VPN, allow the use of standard and private communications like ADSL, DSL and 3G. </li></ul></ul><ul><ul><li>Allow employees to access from home, or other locations, to the “office” PC (Virtual or Physical) </li></ul></ul><ul><ul><li>No need for additional training. </li></ul></ul><ul><ul><li>Rotate Virtual PC’s amongst users. </li></ul></ul><ul><ul><li>Allow secure access to business critical applications. </li></ul></ul><ul><ul><li>Allow users to communicate with co-workers, suppliers and customers. </li></ul></ul><ul><ul><li>No need to change Applications ( All application will work without any changes or customizations) </li></ul></ul>
    5. 5. The Solution <ul><ul><li>Desktop virtualization on the customer datacenter </li></ul></ul><ul><ul><ul><li>Keep the Desktops under control (better management) </li></ul></ul></ul><ul><ul><ul><li>Keep high levels of security (Higher security) </li></ul></ul></ul><ul><ul><ul><li>Allow desktop reuse (better management) </li></ul></ul></ul><ul><ul><ul><li>Allow access from SSL VPN (Higher security) </li></ul></ul></ul><ul><ul><ul><li>Allow use of thin printing and usb devices (better flexibility) </li></ul></ul></ul><ul><ul><ul><li>Could use existing Server and Storage hardware (reduce costs) </li></ul></ul></ul><ul><ul><ul><li>Reuse this new infrastructure to build a formal DR/BC for the desktop users. </li></ul></ul></ul><ul><ul><ul><li>Application compatibility and support </li></ul></ul></ul>
    6. 6. VMware Virtual Desktop Infrastructure (View) … <ul><li>Benefits of Desktop Virtualization </li></ul><ul><ul><li>Easier to manage desktops with centralized encapsulated files </li></ul></ul><ul><ul><li>Deliver just enough server to desktop users </li></ul></ul><ul><ul><ul><li>Move hardware independent desktops seamlessly among servers </li></ul></ul></ul><ul><ul><li>Complete isolated desktops with no application changes </li></ul></ul><ul><ul><li>Desktop disaster recovery not previously available </li></ul></ul>
    7. 7. Why everybody is looking at VMware View? <ul><li>Rapid Deployment </li></ul><ul><ul><li>VMware Infrastructure templates can be used to replicate 1000s of desktops quickly </li></ul></ul><ul><ul><li>Automatic desktop provisioning with View pooling capabilities </li></ul></ul><ul><ul><li>Rapid redeployments of virtual images throughout desktop lifecycle </li></ul></ul><ul><ul><ul><li>Changing, patching, restarting images improved when centralized & virtualized </li></ul></ul></ul><ul><ul><li>Allow the use of existing unvirtualized desktops </li></ul></ul>
    8. 8. <ul><ul><li>Full integration with Microsoft Active Directory (AD): </li></ul></ul><ul><ul><ul><li>User credentials authenticated against AD; </li></ul></ul></ul><ul><ul><ul><li>VDM Connection Server maintains authenticated session for each user; </li></ul></ul></ul><ul><ul><ul><li>‘ Single sign-on’ (SSO) to virtual desktops </li></ul></ul></ul><ul><ul><li>Optional SSL encapsulation & tunneling </li></ul></ul><ul><ul><li>Optional two-factor authentication via RSA SecurID ® </li></ul></ul><ul><ul><li>Event logs </li></ul></ul>VMware VDM Security
    9. 9. VMware VDI Client Access <ul><li>Native Windows Client </li></ul><ul><ul><li>Provides extended capabilities (e.g. USB device support on Windows XP & Vista) </li></ul></ul><ul><li>Thin-Client Support </li></ul><ul><ul><li>Thin clients based on Linux and XPe </li></ul></ul><ul><ul><li>WYSE ThinOS models </li></ul></ul><ul><li>Browser Access </li></ul><ul><ul><li>Windows, Linux & Mac </li></ul></ul>
    10. 10. The Action Plan <ul><li>The most critical period for H1N1 is going to be October thru December </li></ul><ul><li>We can work with your preferred integrator/HW vendor to set up an environment during next 2 weeks </li></ul>All our employees are working from home using virtual PC’s