SlideShare a Scribd company logo
800.800.4239 | CDW.com/PeopleWhoGetIT
VDI FOR BUSINESS
Derrek Kim - Technical Specialist
BEYOND THE HYPE
22CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
How do I
manage costs?
How do I take
advantage
of virtualization?
Should we go with
Rich Clients or
Thin Clients?
How do I keep
my mobile
users productive?
Should I embrace
cloud services?
How do I keep my
data safe and
applications secure?
VIRTUAL DESKTOP INFRASTRUCTURE
33CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
THE NEED FOR A DESKTOP STRATEGY
44CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
APPLICATION CONSIDERATIONS
Provide access
from
anywhere
Know which
applications
you have
Manage
application
lifecycle
55CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Challenges
OPERATING SYSTEM AND
BROWSER CONSIDERATIONS
Access
from
anywhere
Image
management
Operating
System
migration
66CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
DATA & USER SETTINGS
CONSIDERATIONS
Data Protection
& Compliance
Anywhere
access
to data & user
settings
Ever-increasing volume of
data from multiple sources
77CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Challenges
HARDWARE CONSIDERATIONS
Handling the
growing mobility
of end users
Addressing
consumerization
Managing the
Hardware Lifecycle
88CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VIRTUAL DESKTOP INFRASTRUCTURE
• What is VDI
• Use cases
• Components
• Licensing considerations
• VDI Technology landscape
WHAT IS VDI?
Understanding VDI Hype
1010CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
BASICS OF VDI
VDI defines a broad range of technologies which enable end
user desktop computing processes to be run on remote
computing resources or locally in a manner which provides
isolation from the primary end user OS.
1111CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
REASONS FOR VDI
• Standardization , Stable
• External Users – Non-Corporate resource
• React to changes quickly
• Maintain Intellectual Property
• Data Protection – Proximity/Backup
• Comply with Global Export rules (Regulatory Compliance)
• D/R Pandemic – What if 40% of workforce force to work
from home
• Mandates for quick security patches
• Need for extremely Quick Application updates
• Support volatile Client device environment
1212CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
REASONS FOR VDI
• Applications need client OS (specific environment)
• Users need a customizable environment
• Policy against a shared computing model
• BYOC
• Local/Off line usage
• Device independence
1313CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
REASONS AGAINST VDI
• Cost
• Application Performance - Video
• Complexity
• Local device access
1414CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
• Open a branch office
• Start an offshore project
• On-board a new employee
• Move a dept from building
A to Z
• Add, delete & update apps
• Apply security patches
• Implement ‗BYOC‘
1515CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VIRTUALIZATION REALITY
• VDI can be beneficial for EVERY organization
However…
• VDI is NOT for every application
VDI USAGE?
Where does it really make sense
1717CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
HIGH IMPACT USER
Premium knowledge worker Sensitive / Secure Information
Examples: Healthcare, Military
1818CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
HIGH VOLUME TASK WORKER
Task oriented Important / Secure Information
Examples: Tax prep, Call Center,
Remote/At-Home worker
• Limited access to local storage
• Standardized Desktop and Apps
• Non-company (personal) computer
1919CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
NOT RECOMMENDED
Mobility/Flexibility/Performance
Anywhere access to Information
Examples: Knowledge worker,
Media Creation/Editing, Sales
2020CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
• What is VDI
• Where does it make sense to use it
CHECKPOINT
TECHNICAL COMPONENTS
What‘s needed to implement VDI
VDI EXPLAINED
2222CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
TECHNOLOGY IN USE
2323CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization
Platform
• Microsoft Hyper-V
• VMware vSphere
• Citrix XenServer
TECHNOLOGY IN USE
2424CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
• MS Windows VDA Licensing
• MS Windows VL w/SA
Windows VDA is required for
ALL VDI implementations
that use a non-SA device to
access a Windows VDI
desktop, regardless of the
VDI infrastructure vendor
TECHNOLOGY IN USE
2525CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
• Template VMs/Thin Provisioning
• Microsoft App-V
• Citrix XenApp
• Microsoft RDS
• Profile Tools
• Other…
TECHNOLOGY IN USE
2626CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI
Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
• Citrix XenDesktop
• Citrix Provisioning Server
• Microsoft RD Broker
• Microsoft SCVMM
• VMware View
TECHNOLOGY IN USE
2727CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
TYPES OF VDI
• One to one relationship
• Highest costStatic
• One to Many relationship
• Pools must be maintainedPooled
• One to Many
• Elasticity
• System Managed Pools
Dynamic
2828CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
ESSENTIAL COMPONENTS
Factors that need to be accounted for when deploying a Virtualized
Desktop Infrastructure
• Folder Redirection
• Profiles Availability
• Application Installation
• App Virtualization
• Remote Application Access
• Image Management
• Image Deployment
• Session Management
• User Connectivity
Data &
User Settings
Applications
Operating
System
WINDOWS LICENSING
Licensing Windows in a VDI Environment
3030CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 1:Standard Users
MICROSOFT VDI LICENSING
My company has 100 PCs and 100 users that access Windows® client Operating
System (OS) (―Windows Client OS‖ implies one of the following operating systems:
Windows XP, Windows Vista®, Windows 7) running on virtual machines (VMs) using
VDI. However, only 50 VMs are running at any one time.
License: If the PCs are covered under Software Assurance (SA),
then no additional licensing is required, as Software Assurance
contains rights to Windows VDI desktops.
3131CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 2: Shift Workers
MICROSOFT VDI LICENSING
My company has 100 PCs with 300 workers accessing these PCs in shifts.
At any time, 150 Windows client OS VMs are being accessed using VDI.
License: If the PCs are covered under Software Assurance, then
no additional licensing is required, as Software Assurance contains
rights to Windows VDI desktops.
3232CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 3: Mixed Desktop Hardware
MICROSOFT VDI LICENSING
My company has 100 PCs under SA and 100 thin clients (running a minimal OS such
as Windows FLP or Windows Embedded for purposes of accessing a VDI). We have 100
Windows client VMs.
License: For the 100 PCs covered under SA, no additional
licensing is required. Each of the 100 thin clients would need
a Windows Virtual Desktop Access (VDA) license, and hence
a total of 100 Windows VDA licenses are required.
3333CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 4: Standard Users – Home Use
MICROSOFT VDI LICENSING
My company has 100 employees who are the primary users of 100 thin clients covered
under Windows VDA. These employees occasionally work from home and access the
corporate VMs via VDI.
License: Windows VDA licenses extend roaming rights for the
primary (―named‖) user of a company-owned device covered
under Windows VDA, and hence no additional licenses for home
PCs are required in this scenario.
3434CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 5: 100% Home Users
MICROSOFT VDI LICENSING
My company has 100 workers who work from home and access Windows
client VMs via VDI from their home PCs.
License: The employee-owned PCs will have to be licensed
with Windows VDA, and hence 100 Windows VDA licenses are
required.
3535CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 6: Roaming Users
MICROSOFT VDI LICENSING
I have 300 thin clients throughout my company and only 100 users who
roam from station to station.
License: Windows VDA is a device–based license so 300
thin clients must be licensed with Windows VDA. If the
devices are PCs covered with SA, then no additional
licensing is required.
3636CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 7: Contractor-Owned PCs
MICROSOFT VDI LICENSING
My company has 100 contractors who are working for six months, and we
will engage 100 different contractors the other six months of the year.
License: Assuming each contractor accesses the environment
with one unique device, 100 Windows VDA licenses are required
for the contractors to access the VDI environment. You can
transfer the Windows VDA licenses to the second set of
contractors after a period of 90 days of first assignment.
3737CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
• Microsoft Windows Software Assurance provides the ability for
the covered device and its primary user to access the VDI
environment
• Without Software Assurance, a VDA license is necessary to
access the VDI environment
• Microsoft Windows VDI licensing is DEVICE based – it is not
based on concurrent usage
• Licensing can be transferred once every 90 days
• Roaming usage for the license ―Primary User‖ of the device is
permitted
LICENSING SUMMARY
VDI LANDSCAPE
Who are the players
3939CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI PROVIDERS
Major Players Niche Players
4040CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATION
• 59% reported that their client virtualization goals are equally
or more important than their server virtualization goals
• Respondents who have implemented client virtualization and
track ROI report that they are saving slightly more than 20%
of their total IT budget
• 91 percent of those considering or implementing client
virtualization (82% of all respondents) plan to implement
within the next 12-24 months
CDW surveyed 200 IT managers at medium and large businesses to understand
what is driving client virtualization, how it is being used in data centers, and to
identify the key roadblocks to success.
CDW STUDY JANUARY 2011
4141CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATON
• 37% have completed an up-front inventory
analysis of client devices in preparation for
implementation and 44% plan to complete an
analysis in the near future
CDW STUDY JANUARY 2011
4242CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATION
97% noted experiencing challenges with implementation
―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis,
education and testing to enable businesses to take full advantage of client virtualization”
CDW STUDY JANUARY 2011
4343CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VIRTUALIZATION REALITY
• Virtualization is revolutionary
» An Important Paradigm shift
» Largest change to address IT industry since change from Main-
Frame to Distributed Computing (1990s)
• It is not a panacea
» Virtualization is not magic – but can solve complex problems
» Still requires effort, planning, and management
» Many false claims in the industry about virtualization benefits
• Planning & Management are Critical
» Virtualization needs careful planning and control to succeed
» Not everything can be virtualized
- Physical still needs to be managed
- Virtual also needs to be managed
- Management strategies have to account for hybrid environments
4444CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATION
97% noted experiencing challenges with implementation
―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis,
education and testing to enable businesses to take full advantage of client virtualization”
Recommendations:
• Identify Goals
• Do Your Research
• Prep, Test & Prepare
• Measure the Savings
• Find Out More
Full report available at
http://newsroom.cdw.com/features/feature-01-04-11.html
CDW STUDY JANUARY 2011
4545CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
ADDITIONAL RESOURCES
• For more information about Microsoft VDA, please visit:
http://www.microsoft.com/vdi
• For more information about Microsoft Virtualization, please
visit: http://www.microsoft.com/virtualization
• For more information about Microsoft System Center, please
visit: http://www.microsoft.com/systemcenter
• For more information about Windows Server 2008 R2,
please visit: http://www.microsoft.com/windowsserver2008
• For more information about Remote Desktop Services,
please visit: http://www.microsoft.com/rds
4646CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
QUESTIONS
Derrek Kim
Solution Architect – MS Virtualization
derrek.kim@cdw.com
(616) 813-7137
(847) 371-2835

More Related Content

What's hot

Horizon 8 + Instant Clones
Horizon 8 + Instant ClonesHorizon 8 + Instant Clones
Horizon 8 + Instant Clones
MarketingArrowECS_CZ
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
Yogeshwaran R
 
Types Of VDI Solutions
Types Of VDI SolutionsTypes Of VDI Solutions
Types Of VDI Solutions
Ace Cloud Hosting
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
eG Innovations
 
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxVeeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptx
Prince Joseph
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
Mark Wilson
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
Private cloud with vmware
Private cloud with vmwarePrivate cloud with vmware
Private cloud with vmware
Anton An
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
Edureka!
 
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentCitrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Huy Pham
 
Vmware overview
Vmware overviewVmware overview
Vmware overview
Syed Zeeshan
 
Windows virtual desktop l100 presentation
Windows virtual desktop l100 presentationWindows virtual desktop l100 presentation
Windows virtual desktop l100 presentation
kiefter
 
Nutanix
NutanixNutanix
Nutanix
rosslili
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
Lai Yoong Seng
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overview
koesteruk22
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short Presentation
Barcamp Cork
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
Md Yousup Faruqu
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu Introduction
VMware Tanzu
 
virtualization (Hyper-V)
virtualization (Hyper-V)virtualization (Hyper-V)
virtualization (Hyper-V)
Mohamed Hesham
 

What's hot (20)

Horizon 8 + Instant Clones
Horizon 8 + Instant ClonesHorizon 8 + Instant Clones
Horizon 8 + Instant Clones
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
 
Types Of VDI Solutions
Types Of VDI SolutionsTypes Of VDI Solutions
Types Of VDI Solutions
 
VDI Best Practices
VDI Best PracticesVDI Best Practices
VDI Best Practices
 
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxVeeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptx
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
Private cloud with vmware
Private cloud with vmwarePrivate cloud with vmware
Private cloud with vmware
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
 
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentCitrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
 
Vmware overview
Vmware overviewVmware overview
Vmware overview
 
Windows virtual desktop l100 presentation
Windows virtual desktop l100 presentationWindows virtual desktop l100 presentation
Windows virtual desktop l100 presentation
 
Nutanix
NutanixNutanix
Nutanix
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
VMware vSphere
VMware vSphereVMware vSphere
VMware vSphere
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overview
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short Presentation
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu Introduction
 
virtualization (Hyper-V)
virtualization (Hyper-V)virtualization (Hyper-V)
virtualization (Hyper-V)
 

Similar to VDI for Business - Beyond the Hype

VDA brochure
VDA brochureVDA brochure
VDA brochure
Kumton Suttiraksiri
 
Windows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized DesktopWindows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized Desktop
Louis Göhl
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
Aruj Thirawat
 
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPSBUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
vDesk.Works
 
SMARTSTATION
SMARTSTATION SMARTSTATION
SMARTSTATION
Nirav Ambani
 
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lac Viet Computing Corporation
 
Desktop virtualization scott calvet
Desktop virtualization   scott calvetDesktop virtualization   scott calvet
Desktop virtualization scott calvet
Nathan Winters
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
ALAMGIR HOSSAIN
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
Kavaskar Ganesan
 
vDesk Overview
vDesk OverviewvDesk Overview
vDesk Overview
Doug Dooley
 
10 zig
10 zig10 zig
10 zigdvmug1
 
Hybrid cloud availability strategy with Veeam & Microsoft Azure
Hybrid cloud availability strategy with Veeam & Microsoft AzureHybrid cloud availability strategy with Veeam & Microsoft Azure
Hybrid cloud availability strategy with Veeam & Microsoft Azure
Ingram Micro
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Netgear Italia
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
Icomm Technologies
 
VMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid CloudVMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid Cloud
VMworld
 
A Citrix Masterclass
A Citrix MasterclassA Citrix Masterclass
A Citrix Masterclassbluechipper
 
Desktop virtualisation
Desktop virtualisationDesktop virtualisation
Desktop virtualisationBlueChipICT
 
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data CenterHBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
davehill99
 

Similar to VDI for Business - Beyond the Hype (20)

VDA brochure
VDA brochureVDA brochure
VDA brochure
 
Windows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized DesktopWindows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized Desktop
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
 
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPSBUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
 
SMARTSTATION
SMARTSTATION SMARTSTATION
SMARTSTATION
 
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
 
Desktop virtualization scott calvet
Desktop virtualization   scott calvetDesktop virtualization   scott calvet
Desktop virtualization scott calvet
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
vDesk Overview
vDesk OverviewvDesk Overview
vDesk Overview
 
10 zig
10 zig10 zig
10 zig
 
Hybrid cloud availability strategy with Veeam & Microsoft Azure
Hybrid cloud availability strategy with Veeam & Microsoft AzureHybrid cloud availability strategy with Veeam & Microsoft Azure
Hybrid cloud availability strategy with Veeam & Microsoft Azure
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
VMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid CloudVMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid Cloud
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
Vdi
VdiVdi
Vdi
 
A Citrix Masterclass
A Citrix MasterclassA Citrix Masterclass
A Citrix Masterclass
 
Desktop virtualisation
Desktop virtualisationDesktop virtualisation
Desktop virtualisation
 
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data CenterHBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
 

More from JAX Chamber IT Council

Year up JAX IT Council - February 2016
Year up   JAX IT Council - February 2016Year up   JAX IT Council - February 2016
Year up JAX IT Council - February 2016
JAX Chamber IT Council
 
The Internet of Things Drives Business Transformation
The Internet of Things Drives Business TransformationThe Internet of Things Drives Business Transformation
The Internet of Things Drives Business Transformation
JAX Chamber IT Council
 
CA Technologies Survive and Thrive in the Application Economy- August 2014
CA Technologies   Survive and Thrive in the Application Economy- August 2014CA Technologies   Survive and Thrive in the Application Economy- August 2014
CA Technologies Survive and Thrive in the Application Economy- August 2014
JAX Chamber IT Council
 
Tom Morgan - July 29, 2014 - From Chaos to Collaborative Communities
Tom Morgan - July 29, 2014 -  From Chaos to Collaborative CommunitiesTom Morgan - July 29, 2014 -  From Chaos to Collaborative Communities
Tom Morgan - July 29, 2014 - From Chaos to Collaborative Communities
JAX Chamber IT Council
 
Agile Implementations - Tim FitzGerald - US Assure
Agile Implementations - Tim FitzGerald - US AssureAgile Implementations - Tim FitzGerald - US Assure
Agile Implementations - Tim FitzGerald - US AssureJAX Chamber IT Council
 
City of Jacksonville Technology Story
City of Jacksonville Technology StoryCity of Jacksonville Technology Story
City of Jacksonville Technology Story
JAX Chamber IT Council
 
QA Center Of Excellence (TCoE)
QA Center Of Excellence (TCoE)QA Center Of Excellence (TCoE)
QA Center Of Excellence (TCoE)
JAX Chamber IT Council
 
The Cultural Challenge of Technology
The Cultural Challenge of TechnologyThe Cultural Challenge of Technology
The Cultural Challenge of Technology
JAX Chamber IT Council
 
The Industry-University Interface: An Academic Administrator’s View
The Industry-University Interface:An Academic Administrator’s ViewThe Industry-University Interface:An Academic Administrator’s View
The Industry-University Interface: An Academic Administrator’s View
JAX Chamber IT Council
 
Securing a Moving Target
Securing a Moving TargetSecuring a Moving Target
Securing a Moving Target
JAX Chamber IT Council
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take Over
JAX Chamber IT Council
 
If companies are not careful, "Big Data" will become "Big Dilbert"
If companies are not careful, "Big Data" will become "Big Dilbert"If companies are not careful, "Big Data" will become "Big Dilbert"
If companies are not careful, "Big Data" will become "Big Dilbert"
JAX Chamber IT Council
 

More from JAX Chamber IT Council (12)

Year up JAX IT Council - February 2016
Year up   JAX IT Council - February 2016Year up   JAX IT Council - February 2016
Year up JAX IT Council - February 2016
 
The Internet of Things Drives Business Transformation
The Internet of Things Drives Business TransformationThe Internet of Things Drives Business Transformation
The Internet of Things Drives Business Transformation
 
CA Technologies Survive and Thrive in the Application Economy- August 2014
CA Technologies   Survive and Thrive in the Application Economy- August 2014CA Technologies   Survive and Thrive in the Application Economy- August 2014
CA Technologies Survive and Thrive in the Application Economy- August 2014
 
Tom Morgan - July 29, 2014 - From Chaos to Collaborative Communities
Tom Morgan - July 29, 2014 -  From Chaos to Collaborative CommunitiesTom Morgan - July 29, 2014 -  From Chaos to Collaborative Communities
Tom Morgan - July 29, 2014 - From Chaos to Collaborative Communities
 
Agile Implementations - Tim FitzGerald - US Assure
Agile Implementations - Tim FitzGerald - US AssureAgile Implementations - Tim FitzGerald - US Assure
Agile Implementations - Tim FitzGerald - US Assure
 
City of Jacksonville Technology Story
City of Jacksonville Technology StoryCity of Jacksonville Technology Story
City of Jacksonville Technology Story
 
QA Center Of Excellence (TCoE)
QA Center Of Excellence (TCoE)QA Center Of Excellence (TCoE)
QA Center Of Excellence (TCoE)
 
The Cultural Challenge of Technology
The Cultural Challenge of TechnologyThe Cultural Challenge of Technology
The Cultural Challenge of Technology
 
The Industry-University Interface: An Academic Administrator’s View
The Industry-University Interface:An Academic Administrator’s ViewThe Industry-University Interface:An Academic Administrator’s View
The Industry-University Interface: An Academic Administrator’s View
 
Securing a Moving Target
Securing a Moving TargetSecuring a Moving Target
Securing a Moving Target
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take Over
 
If companies are not careful, "Big Data" will become "Big Dilbert"
If companies are not careful, "Big Data" will become "Big Dilbert"If companies are not careful, "Big Data" will become "Big Dilbert"
If companies are not careful, "Big Data" will become "Big Dilbert"
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

VDI for Business - Beyond the Hype

  • 1. 800.800.4239 | CDW.com/PeopleWhoGetIT VDI FOR BUSINESS Derrek Kim - Technical Specialist BEYOND THE HYPE
  • 2. 22CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. How do I manage costs? How do I take advantage of virtualization? Should we go with Rich Clients or Thin Clients? How do I keep my mobile users productive? Should I embrace cloud services? How do I keep my data safe and applications secure? VIRTUAL DESKTOP INFRASTRUCTURE
  • 3. 33CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. THE NEED FOR A DESKTOP STRATEGY
  • 4. 44CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. APPLICATION CONSIDERATIONS Provide access from anywhere Know which applications you have Manage application lifecycle
  • 5. 55CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Challenges OPERATING SYSTEM AND BROWSER CONSIDERATIONS Access from anywhere Image management Operating System migration
  • 6. 66CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. DATA & USER SETTINGS CONSIDERATIONS Data Protection & Compliance Anywhere access to data & user settings Ever-increasing volume of data from multiple sources
  • 7. 77CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Challenges HARDWARE CONSIDERATIONS Handling the growing mobility of end users Addressing consumerization Managing the Hardware Lifecycle
  • 8. 88CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VIRTUAL DESKTOP INFRASTRUCTURE • What is VDI • Use cases • Components • Licensing considerations • VDI Technology landscape
  • 10. 1010CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. BASICS OF VDI VDI defines a broad range of technologies which enable end user desktop computing processes to be run on remote computing resources or locally in a manner which provides isolation from the primary end user OS.
  • 11. 1111CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. REASONS FOR VDI • Standardization , Stable • External Users – Non-Corporate resource • React to changes quickly • Maintain Intellectual Property • Data Protection – Proximity/Backup • Comply with Global Export rules (Regulatory Compliance) • D/R Pandemic – What if 40% of workforce force to work from home • Mandates for quick security patches • Need for extremely Quick Application updates • Support volatile Client device environment
  • 12. 1212CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. REASONS FOR VDI • Applications need client OS (specific environment) • Users need a customizable environment • Policy against a shared computing model • BYOC • Local/Off line usage • Device independence
  • 13. 1313CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. REASONS AGAINST VDI • Cost • Application Performance - Video • Complexity • Local device access
  • 14. 1414CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. • Open a branch office • Start an offshore project • On-board a new employee • Move a dept from building A to Z • Add, delete & update apps • Apply security patches • Implement ‗BYOC‘
  • 15. 1515CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VIRTUALIZATION REALITY • VDI can be beneficial for EVERY organization However… • VDI is NOT for every application
  • 16. VDI USAGE? Where does it really make sense
  • 17. 1717CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. HIGH IMPACT USER Premium knowledge worker Sensitive / Secure Information Examples: Healthcare, Military
  • 18. 1818CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. HIGH VOLUME TASK WORKER Task oriented Important / Secure Information Examples: Tax prep, Call Center, Remote/At-Home worker • Limited access to local storage • Standardized Desktop and Apps • Non-company (personal) computer
  • 19. 1919CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. NOT RECOMMENDED Mobility/Flexibility/Performance Anywhere access to Information Examples: Knowledge worker, Media Creation/Editing, Sales
  • 20. 2020CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. • What is VDI • Where does it make sense to use it CHECKPOINT
  • 21. TECHNICAL COMPONENTS What‘s needed to implement VDI VDI EXPLAINED
  • 22. 2222CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform TECHNOLOGY IN USE
  • 23. 2323CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform • Microsoft Hyper-V • VMware vSphere • Citrix XenServer TECHNOLOGY IN USE
  • 24. 2424CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform • MS Windows VDA Licensing • MS Windows VL w/SA Windows VDA is required for ALL VDI implementations that use a non-SA device to access a Windows VDI desktop, regardless of the VDI infrastructure vendor TECHNOLOGY IN USE
  • 25. 2525CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform • Template VMs/Thin Provisioning • Microsoft App-V • Citrix XenApp • Microsoft RDS • Profile Tools • Other… TECHNOLOGY IN USE
  • 26. 2626CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform • Citrix XenDesktop • Citrix Provisioning Server • Microsoft RD Broker • Microsoft SCVMM • VMware View TECHNOLOGY IN USE
  • 27. 2727CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. TYPES OF VDI • One to one relationship • Highest costStatic • One to Many relationship • Pools must be maintainedPooled • One to Many • Elasticity • System Managed Pools Dynamic
  • 28. 2828CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. ESSENTIAL COMPONENTS Factors that need to be accounted for when deploying a Virtualized Desktop Infrastructure • Folder Redirection • Profiles Availability • Application Installation • App Virtualization • Remote Application Access • Image Management • Image Deployment • Session Management • User Connectivity Data & User Settings Applications Operating System
  • 29. WINDOWS LICENSING Licensing Windows in a VDI Environment
  • 30. 3030CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 1:Standard Users MICROSOFT VDI LICENSING My company has 100 PCs and 100 users that access Windows® client Operating System (OS) (―Windows Client OS‖ implies one of the following operating systems: Windows XP, Windows Vista®, Windows 7) running on virtual machines (VMs) using VDI. However, only 50 VMs are running at any one time. License: If the PCs are covered under Software Assurance (SA), then no additional licensing is required, as Software Assurance contains rights to Windows VDI desktops.
  • 31. 3131CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 2: Shift Workers MICROSOFT VDI LICENSING My company has 100 PCs with 300 workers accessing these PCs in shifts. At any time, 150 Windows client OS VMs are being accessed using VDI. License: If the PCs are covered under Software Assurance, then no additional licensing is required, as Software Assurance contains rights to Windows VDI desktops.
  • 32. 3232CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 3: Mixed Desktop Hardware MICROSOFT VDI LICENSING My company has 100 PCs under SA and 100 thin clients (running a minimal OS such as Windows FLP or Windows Embedded for purposes of accessing a VDI). We have 100 Windows client VMs. License: For the 100 PCs covered under SA, no additional licensing is required. Each of the 100 thin clients would need a Windows Virtual Desktop Access (VDA) license, and hence a total of 100 Windows VDA licenses are required.
  • 33. 3333CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 4: Standard Users – Home Use MICROSOFT VDI LICENSING My company has 100 employees who are the primary users of 100 thin clients covered under Windows VDA. These employees occasionally work from home and access the corporate VMs via VDI. License: Windows VDA licenses extend roaming rights for the primary (―named‖) user of a company-owned device covered under Windows VDA, and hence no additional licenses for home PCs are required in this scenario.
  • 34. 3434CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 5: 100% Home Users MICROSOFT VDI LICENSING My company has 100 workers who work from home and access Windows client VMs via VDI from their home PCs. License: The employee-owned PCs will have to be licensed with Windows VDA, and hence 100 Windows VDA licenses are required.
  • 35. 3535CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 6: Roaming Users MICROSOFT VDI LICENSING I have 300 thin clients throughout my company and only 100 users who roam from station to station. License: Windows VDA is a device–based license so 300 thin clients must be licensed with Windows VDA. If the devices are PCs covered with SA, then no additional licensing is required.
  • 36. 3636CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 7: Contractor-Owned PCs MICROSOFT VDI LICENSING My company has 100 contractors who are working for six months, and we will engage 100 different contractors the other six months of the year. License: Assuming each contractor accesses the environment with one unique device, 100 Windows VDA licenses are required for the contractors to access the VDI environment. You can transfer the Windows VDA licenses to the second set of contractors after a period of 90 days of first assignment.
  • 37. 3737CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. • Microsoft Windows Software Assurance provides the ability for the covered device and its primary user to access the VDI environment • Without Software Assurance, a VDA license is necessary to access the VDI environment • Microsoft Windows VDI licensing is DEVICE based – it is not based on concurrent usage • Licensing can be transferred once every 90 days • Roaming usage for the license ―Primary User‖ of the device is permitted LICENSING SUMMARY
  • 38. VDI LANDSCAPE Who are the players
  • 39. 3939CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI PROVIDERS Major Players Niche Players
  • 40. 4040CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. CLIENT VIRTUALIZATION • 59% reported that their client virtualization goals are equally or more important than their server virtualization goals • Respondents who have implemented client virtualization and track ROI report that they are saving slightly more than 20% of their total IT budget • 91 percent of those considering or implementing client virtualization (82% of all respondents) plan to implement within the next 12-24 months CDW surveyed 200 IT managers at medium and large businesses to understand what is driving client virtualization, how it is being used in data centers, and to identify the key roadblocks to success. CDW STUDY JANUARY 2011
  • 41. 4141CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. CLIENT VIRTUALIZATON • 37% have completed an up-front inventory analysis of client devices in preparation for implementation and 44% plan to complete an analysis in the near future CDW STUDY JANUARY 2011
  • 42. 4242CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. CLIENT VIRTUALIZATION 97% noted experiencing challenges with implementation ―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis, education and testing to enable businesses to take full advantage of client virtualization” CDW STUDY JANUARY 2011
  • 43. 4343CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VIRTUALIZATION REALITY • Virtualization is revolutionary » An Important Paradigm shift » Largest change to address IT industry since change from Main- Frame to Distributed Computing (1990s) • It is not a panacea » Virtualization is not magic – but can solve complex problems » Still requires effort, planning, and management » Many false claims in the industry about virtualization benefits • Planning & Management are Critical » Virtualization needs careful planning and control to succeed » Not everything can be virtualized - Physical still needs to be managed - Virtual also needs to be managed - Management strategies have to account for hybrid environments
  • 44. 4444CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. CLIENT VIRTUALIZATION 97% noted experiencing challenges with implementation ―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis, education and testing to enable businesses to take full advantage of client virtualization” Recommendations: • Identify Goals • Do Your Research • Prep, Test & Prepare • Measure the Savings • Find Out More Full report available at http://newsroom.cdw.com/features/feature-01-04-11.html CDW STUDY JANUARY 2011
  • 45. 4545CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. ADDITIONAL RESOURCES • For more information about Microsoft VDA, please visit: http://www.microsoft.com/vdi • For more information about Microsoft Virtualization, please visit: http://www.microsoft.com/virtualization • For more information about Microsoft System Center, please visit: http://www.microsoft.com/systemcenter • For more information about Windows Server 2008 R2, please visit: http://www.microsoft.com/windowsserver2008 • For more information about Remote Desktop Services, please visit: http://www.microsoft.com/rds
  • 46. 4646CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. QUESTIONS Derrek Kim Solution Architect – MS Virtualization derrek.kim@cdw.com (616) 813-7137 (847) 371-2835