Hosted Virtual Desktops and Streamed Applications


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Transition – What are Hosted Virtual Desktops?
  • Tenant isolation with encrypted drives, private vlan’s and shared computeU2Cloud provides end-to-end encryption through transport and Encrypted Drive to meet compliancy requirements.Transition – Let look at the virtualization lifecycle for desktops and applications
  • Hosted Virtual Desktops and Streamed Applications

    2. 2. The WhoU2Cloud is a leader in hosting Microsoft collaborative software solutions andbusiness productivity suites. Our customers range from Fortune 500 companiesto small consulting firms that would like to improve efficiencies and interactionswith their customers.
    3. 3. DeliveryOur solutions’ provide users with a secure, full-featured media-rich computingexperience with the latest productivity and entertainment applications. Ourproducts are delivered on-demand through the Internet to Smartphone’s, Tablets,PC’s, Macs or connected TVs.
    4. 4. U2Cloud is platform agnostic and only partners with the leadingtechnology manufacturers ensuring a robust and flexible solutionto better fit our clients ever-changing needs.
    5. 5. The What - Hosted Virtual Desktops (HVD)Hosted Virtual Desktop (HVD) - Its your very own private Windows PC, thatyou can connect to from anywhere on the planet. Jump from tablet to laptopto phone and keep working without missing a beat.
    6. 6. The What - Hosted Virtual Desktops (HVD)HVD enables a centralized desktop strategy that allows for quick and secureaccess to applications and desktops. HVD’s can be accessed from any network-connected device, including new PCs, older hardware, and thin clients. Inaddition, all data and applications are stored centrally, ensuring a higher levelof data security and helping simplify regulatory compliance.
    7. 7. The What - Hosted Virtual Desktops (HVD)When using HVD, you can present users with an entire desktop environment orjust the individual applications. Data is centrally stored and can be accessed byhosted virtual desktops or SaaS applications. From a user perspective, theseapplications are integrated seamlessly. They look, feel and behave like localapplications
    8. 8. Anytime, Anywhere, Any Device!Existing PC & MACWorkstationsThin ClientsExisting LaptopsApple Laptops &Chrome BooksiPadBlackberryAndroidiPhone
    9. 9. Intrinsic Benefits of HVDBusiness Continuity Business AgilityWork-Life BalancePredictable IT Costs Redefine the Role of IT Control and Compliance
    10. 10. Source: 451 Group 2012 Virtualization Market Report, October 2012The Hold-Up
    11. 11. The Initial Investment
    12. 12. Shared InfrastructureTo expensive to buildTo costly to maintainBuild once, Leverage infinitelyNot enough skilledresources toaccomplish
    13. 13. Secure & Compliant Multi-TenancyDesktop Virtualization LayerTenant 1 Tenant 2 PCI or HIPAA
    14. 14. < >Virtualization LifecycleCreateTemplateCustomizeDeploymentDeployServiceUpdateServiceBasic lifecycle of HVD andSaaS applications.Create “Golden Image” orvirtualized applicationApp customizations,preferences & securitySingle-to-many deploymentsSandboxed with zero impact onexisting systemsSoftware & security updatesApplication PatchingAdd-On Upgrades
    15. 15. The Flavors of VDINon-Persistentaka statelessThe major disadvantage of non-persistent desktops is that anycustomizations made by users and any applications that aredelivered outside of the base image are lost after each desktopreboot.• simple roll-out and update of basic images• guaranteed to be 100% identical• user always has the same (clean) desktop• less effort due to the standardization of images.• zero Windows configuration drift• less storage is required because a single base operatingsystem image can be shared across many desktopsTask WorkersKiosksCall CentersEDU & Training
    16. 16. The Flavors of VDIPersistentaka statefulThe major disadvantage of persistent desktops is the high cost.Persistent desktops also offer little operational cost savings, sincethey are managed one at a time like physical PCs, using the sameagent-based PC management tools.• users have freedom to install software within the desktop• personalization and settings maintain through reboots• least operational upheaval when migrating from PC model• users are assigned dedicated virtual machines & customresources which remain the same every time they loginDevelopers/ProgrammersDesignersEngineering CADFinancial Reporting
    17. 17. The Flavors of VDILayeredaka My Favorite• users have freedom to install software within the desktop• personalization and settings maintain through reboots• least operational upheaval when migrating from PC model• less storage is required because a single base operatingsystem image can be shared across many desktops• simple roll-out and update of basic images• standardization of images, simpler application packaging andability to rollback or “undo” OS and application patches.ExecutivesSalesMarketingFinance & AccountingOffice WorkersLayering combines the benefits of statefuland stateless desktops in one solution!
    18. 18. Layered Virtual Desktops• Pooled and Personal desktops that cost less than PCs• Personal desktops• Golden image +Personal vDisk• Enables full userpersonalization whileleveraging a commongolden imagePooled desktopsGolden imagePersonal virtual desktopsPooled desktopsIt’s all about simple managementPVDPVD contains• User installed Applications• User Data• User Preferences• Reduce management overhead by supportingpersonal and pooled desktops from a few goldenimages• Eliminate 60% of image storage costs withpersonalized desktops that use single instancemanagementBusiness Benefit
    19. 19. Why Application Virtualization?Application Server FarmSeveral different devicesInstall once, deliver anywhereSmaller storage footprintEasy application deployment 1 to 10,000Zero Application Drift – SandboxedSeamless updates & patchesConsistent end-user experience Security & Compliance
    20. 20. Application VirtualizationApplications are executed on the local devicebut only certain components are downloaded,making it possible to function without anetwork connection.Remote ApplicationsRun on a remote server rather than on a clientdevice. Agile DRApplication StreamingRun non-native apps.. i.e Quickbooks on iPadApplications can be faster using more robustCPU/GPU in addition to the proximity ofcorporate data
    21. 21. Application“Package”App-VXenAppThinAppGeneral InformationAdministrator PropertiesDeployment Type< >Install CommandRequirement RulesSupersedenceDetection MethodDependenciesEnd User MetadataApplication Streaming v 2.0The new delivery model
    22. 22. LunchCloud-Based Virtual DesktopTechnologyPresenter: Pete Valentine
    23. 23. Our Solution Provides• Secure & Compliant Desktops• Active-Directory Integration• Latest Microsoft Collaboration Tools• Next-Generation Application Firewalls• Self-Service Provisioning Portal• Secure Access Anytime, Anywhere from Any Device• Pay-As-You-Go• Streamlined DR & Business Continuity
    24. 24. True Application SecurityPooled desktopsNew VDI Challenges for the Firewall1. Identify applications regardless ofport, protocol, evasive tactic or SSL2. Identify users regardless of IP address3. Scan application content in real-time(prevent threats and data leaks)4. Granular visibility and policy controlover application access / functionality5. Multi-gigabit, in-line deployment withno performance degradation
    25. 25. App-IDIdentify theapplicationUser-IDIdentify the userContent-IDScan the contentSingle-Pass Application Security
    26. 26. • Users no longer defined solely by IP address– Leverage existing Active Directory infrastructure• Understand users application and threat behavior based on actual ADusername, not just IP• Manage and enforce policy based on user and/or AD group• Investigate security incidents, generate custom reportsEnterprise Directory IntegrationUser-ID
    27. 27. 256 SSL 256 SSL 256 SSLEnterprise Directory IntegrationCustomer Active-Directory U2Cloud Active-DirectoryAutomatic User Info & Security Group Synchronization
    28. 28. NG FirewallsFacebookEmail
    29. 29. Local VM VDI VMRuns below the operating systemto make PCs manageable, reliable, & secureSecure Local ExecutionType-1 Client HypervisorHypervisorOSAppsDataCompliant & Disconnected
    30. 30. • Powers Mobile Workstyles– Laptop as the primary device– Tablet and phone as a companion device• Unified End User Experience– Local execution– Hosted apps, data, desktops– Continuous synchronization between environments• Seamless Management & Powerful Security– Switching between devices and online/offline use– Rapid recovery in the field if laptop lost, stolen, or fails– Strong security with disk-encryption, remote kill, and time-based lockoutSecuring Road Warriors
    31. 31. Customer self-serviceSimple and intuitive MGMT interfaceDelegated administrationCloud services automationDashboard for usage and analyticsProvisioning PowerExchangeSharePointLyncCustom ServicesUser AccountsDesktopsLOB Apps256 SSL 256 SSL 256 SSLREDUCE OPERATING COSTSSCALE EFFICIENTLYEMPOWER CUSTOMERS
    32. 32. Provisioning PowerEmpower CustomersReduce operating costsScale efficientlyReseller ReadySimplified Billing Delegated AdministrationEasy to Subscribe to new services
    33. 33. IT OutsourcingData Storage and BackupInfrastructure as a ServiceDisaster RecoveryHosted EmailOffice ProductivitySaaSWebWindowsWhat you getAny-Device Windows DesktopLatest Microsoft Office VersionHosted Microsoft ExchangeEnterprise InfrastructureManaged BackupMultiple DatacentersIT now focuses on innovation
    34. 34. Cost of Doing Nothing• IT spending and complexity inhibits business growth• The business is exposed to disruptions and disasters• Workers remain tethered to the office• Security breaches increase with more devices• Your competition can gain an advantage
    35. 35. Executives in the Field“As a remote executive, I struggled every time I needed toaccess the company’s intranet, which forced me to VPN intothe network. I also kept data on my local device becausetrying to access it over my broadband connection was tooslow. Some coworkers did the same and lost data due to avirus, thankfully I was luckier. ““Since moving to a virtual desktop, I’m able to use any device.I’m able to work from any location. And best of all, I don’thave to worry about copying my data and applications onto allof my personal devices. I paid for these devices; I don’t wantwork to clutter up my personal space.”
    36. 36. DemoCloud-Based Virtual DesktopTechnologyPresenter: Pete Valentine
    37. 37. Q&ACloud-Based Virtual DesktopTechnologyPresenter: Pete Valentine