2. Agenda
1 Business & IT Challenges
2 Virtualization Strategy
3 Virtualizing the Endpoint
4 Demo
2
3. Business Challenges
• Everybody is cutting back
– Layoffs across the board
– Budget reductions
– Tighter control on all costs
– No purchases without proven short ROI
• IT has to do more with less
– Increased regulations and compliance rules
– “Gartner recommends IT Organizations Establish IT Cost-Cutting Programs
Now” – Feb. 25, 2008
• “Step 1 – Don’t Wait for the Cost-Cutting Mandate from Management”
• The new top priority?
3
4. IT Challenges
• Management challenges
– Most environments are now heterogeneous – physical and virtual assets
– Flexible end-user productivity models require rapid provisioning
– Application license models aren’t keeping up with dynamic workforce
– Silos within IT are serving the same users
• i.e. desktop management, server-based computing, virtual infrastructure
• Security concerns
– Introduction of single points of failure
– Potential loss of visibility/control
• Infrastructure complexity
– More unique computing stacks, not fewer
– Increasingly mobile workforce
– Multiple virtualization approaches and platforms
– Consumerization of IT
4
5. Symantec is Uniquely Positioned
Symantec protects, Virtualization allows focus on
manages, and controls Symantec information that matters
information
• Server & Client management
delivers • Separates information that matters
from commodity bits and hardware
• High availability
• Compliance
revolutionary • Allows enterprise to “architect
around the information”, rather
• Security results than systems or applications
5
6. Symantec’s Virtualization Solutions
• Symantec Solutions for Virtualization enable organizations to
take full advantage of server and endpoint virtualization while
preserving best practices for efficiency and cost savings.
Data Storage Business Endpoint
Protection Management Continuity Virtualization
Veritas Virtual Veritas Cluster Workspace
NetBackup
Infrastructure Server Virtualization
Veritas Storage Workspace
Backup Exec Veritas NetBackup
Foundation Streaming
Veritas Backup Exec & Workspace
Backup Exec
CommandCentral Backup Exec Corporate &
System Recovery
Storage System Recovery Remote
6
7. The Purpose of IT
1. Support end-user productivity
2. Protect confidential data
7
8. The Cost of the Endpoint
• The device
• The workspace
– Desktop, Applications, Profiles, Data
8
9. Endpoint Virtualization Vision
• TRANSFORM CLIENT COMPUTING
– Use virtualization to separate ‘information that matters’
– Improve the end-user experience
– Lower the cost of managing endpoint devices
STRATEGIES
• Portable user experience
• Centralized management
• Heterogeneous support
• Standards based approach
• Comprehensive protection and control
• Automation
9
10. Reduce Complexity and Cost
Portable Workspace
Data
Profile
Applications
Desktop
Separate Components
• Reduce maintenance costs
• Reduce support costs
Simple Complex Simple
Complex
Simple • Reduce storage requirements
• Simplify disaster recovery
Improve manageability and lower costs • Improve accessibility
for ALL desktops – physical and virtual • Increase flexibility
10
11. Dynamic Workspace Configuration
OSProfiles
Applications
/Data
Desktop
Role-based rules engine delivers the right resources
instantly, on-demand, regardless of location or device.
11
12. Comparing Compute Models
Essential Workspace Components
Desktop Applications Profile Data
Desktop Laptop Terminal Server Hypervisor PC Blade Storage
Profile Profile Profile Profile Profile
Data
Data Data Profile Data
App
App
App
App
App
App
App
App
App
App
App
App
App
App
App
App
Profile OS OS OS OS Data
Common Profile Profile Profile Profile Profile Profile Profile Data
Compute
Profile Data
App
App
App
App
App
App
App
App
App
App
App
App
App
App
App
App
Models
App
App
App
App
App
App
App
App
OS OS OS OS Data
App
App
App
App Profile Profile
Profile Profile Data
Data
App
App
App
App
App
App
App
App
App
App
App
App
App
App
App
App
OS OS OS OS OS
OS OS Data
Location Distributed Distributed Data center Data center Data center Data center
One physical One physical One physical Many virtual Many physical Many systems
& system system system systems systems Multi-user access
Utilization One user One user Many users One user each One user each
12
13. Dynamic Workspace Management
Automated
Workspace
Configuration
• User
• Device
• Location Rich Client PC Rich Client PC Presented Apps Virtual desktops Virtual PCs SAN / Storage
• Professionals • Mobile workers and/or Desktops • High security • Power users • Common store
• High graphic • Frequently • Task workers • Dedicated • Thin client • Secure data
applications disconnected • Shared compute computing access • Backed up
Desktop Laptop Terminal Server Hypervisor
Symantec Endpoint Virtualization PC Blade
Suite Storage
Consistent
Dynamic Profiles Profiles Profiles Profiles Profiles Data
Desktop Applications Applications
Applications
Profile
Applications Applications
Data
Workspace Applications (Profiles)
Desktop Desktop Desktop Desktop Desktop
Desktop Laptop Terminal Server Hypervisor PC Blade Storage
Hardware and
Infrastructure
(heterogeneous)
Symantec Symantec Citrix VMware Symantec Symantec
Managed by: or Microsoft or Microsoft or Microsoft or Microsoft or Microsoft or NetApp
or HW vendor, etc. or HW vendor, etc. or Symantec, etc. or Sun, etc. or HW vendor, etc. or EMC, etc.
13
14. Symantec Workspace Streaming
Streaming is a great collaborative technology. It allows
flexibility for remote access, but it’s also secure.
David Gipstein
Workspace Director of SEAS Computing & Information
Technology, Harvard
Streaming
Virtual Distribution For the user, it is just as if the application had been
installed locally, as intended by the manufacturer, and it works
• On-demand application in exactly that way.
streaming Chris Huber
• User-based provisioning Senior Consultant, X-Tech
• Direct MSI conversion
• Single click application
upgrades Symantec Workspace Streaming saves us 1,600
• Dynamic License technician hours a year, worth about $80,000. Payback is in four
Management
months.
• License cost optimization Jason Hyams
• Industry standard Director of Technology, St. Agnes Academy
distributed architecture
15. How Streaming Works
• Minimum bits required for UI
Startup Block
• Stream new functionality as needed
• Local execution On-demand
• Central management Predictive
• Online or offline
15
16. Application Lifecycle Management
New Applications Update Applications Retire Applications
(Purchased Software) (Version Control) (Recover Licenses)
Optimize License Utilization Package
(Monitor usage, look for opportunities)
Policy (To Virtualize or Not to Virtualize…)
License Compliance Management Provision
(Deliver then Inventory, or Proactive) Issues (Host or User, Directory connection?)
Broken Applications Visibility Presentation
(Repair or redeliver) (Preload or deliver later, how?)
Control
Delivery Personalization
(Push, Pull, On-Demand) Effort (Install-time logic and setup)
Connectivity User Data
(Online and Offline) (Local, remote, virtualized)
Endpoint Location
(LAN, WAN, Internet, Remote Office, Partner Company, Web Customer?)
“A number of technology developments are set to further improve manageability and standardization. Streaming technology, often used in
combination with application virtualization, is set to augment current application delivery techniques and promises to simplify some aspects of
the delivery process — particularly for roaming (that is, notebook) users.” - Gartner, “How to Reduce Your PC TCO 30% in 2011” Publication Date: 20 March 2009
16
18. Symantec Workspace Virtualization
We estimated that it would have taken a team of 15
technicians working full time for six months to (manually) switch
email systems… With Workspace Virtualization, we made the
Workspace switch in about two days – a 99 percent reduction in time.
Virtualization
Neil Baird
Senior Client Systems Analyst, University
Virtual Execution Health Care
• Eliminate application conflicts
• Accelerate application rollouts Symantec Workspace Virtualization has made testing
• Virtualized apps interact extremely easy, which is another big timesaver. Now when we
normally
want to tryout a new piece of software, we use Workspace
• User/system/management
agents interact normally with Virtualization to put it on a layer of the OS, run it, and see if we
virtualized apps like it. If we don’t, we just turn the application off, delete it, and
• Keeps base OS image clean
it’s completely gone.
• Rapidly resolve application Robert Boenne
problems
Network Engineer, Teachers Credit Union
• Integration with multiple
Symantec products
18
19. Application Virtualization
Traditional Environment Virtualized Environment
Application A
Application C
Application B
Application A
Application C
App D
Application B
App E
App D
App E
Virtualization Agent
Operating System Operating System
Streamed and virtualized applications are more
easily managed
“Applications that have been challenging to package for distribution with traditional software distribution tools are ideal candidates for
application virtualization and streaming.” - Gartner, “How to Reduce Your PC TCO 30% in 2011” Publication Date: 20 March 2009
19
20. Behavior of Virtualized Applications Apps
Interactive Apps (default) Isolated
(as required)
App App App App App App
A B C A B C
Can’t Can’t
see see in
out
Windows Operating System Windows Operating System
Full control over application visibility
20
21. Containment that’s Clear
Symantec Virtualization Competing Products
Anti-Virus
Inventory
Audit Anti-Virus
Inventory
Audit
App App App App App App
RAM
A B C A B C
DISK
Windows Operating System Windows Operating System
Performs Normally Limited Performance Does Not/Cannot Perform
Requires manual configuration
or specific integration with the
virtualization agent
22. A Decade of Experience
“Top three application “Second coolest Listed in top 5 client “I'm now going to officially expand my list
virtualization plays…” software of the year...” virtualization vendors to include Company #6: Symantec.”
- ComputerWorld Germany - IT Media Japan - PGQ solution matrix - Brian Madden, Brian Madden Inc
“Industry stalwarts such as CA, Symantec, Cisco and Sun are in the virtualization game for real now…” – CIO Magazine (CIO.com)
Altiris acquired by Symantec
AppStream founded HP Virtual Firefox FCS
AppStream FCS Endpoint Virtualization BU
nSuite founded SVS 2.0 AppStream acquired
FSLogic Founded FCS nSuite acquired
Protect FCS SEV Suite 6.1 FCS
FSLogic acquired Dell Mobile
by Altiris Clinical
Computing FCS
1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
UPSIDE
“Hot 100”
CRN
Networld + Interop “Emerging Tech EMA
“Best of Show” & SIAA 2005
Forrester “CODiE Dynamo” “All-Star 2008”
“People’s choice” Top Five TiEcon “50 Emerging
“Best of Finalist”
BayStart “X Internet” Vendors”
Vendor Showcase”
“Most Likely to Succeed Startup”
The first-of-its-kind Mozilla
2003 Finalist Firefox for HP Virtual
SystemSoftware Solution, 2008
FSLogic Protect
22