SlideShare a Scribd company logo
STORCOM’S REMOTE
WORK READINESS SERIES
PRESENTED BY:
DAVE KLUGER,
CTO, STORCOM
PART 1
Virtual Workspace and Virtual Desktop
Options: Which is right for your organization?
Storcom’s Remote Work Readiness
Series
Part 2: Virtual Collaboration
○ Cloud file-sharing and collaboration options: there are so many tools to
choose from, so which is right for your organization?
○ Remote user telephony and video conferencing options.
Part 3: Securing Your Remote Workers
○ How to protect remote and roaming workers: what options are
available?
○ Secure internet access from the home office: how should you deal with
security in this evolving environment?
Reasons to Consider VDI & EUC
Simplicity
Simplify VDI deployments
with ways to start small and
easily scale up or scale out
Remote Capabilities
COVID-19 shifted how
businesses viewed a remote
workforce
Quickly Access Data
Remote users have secure, fast
access to the data they need to
keep operations running
smoothly
4
How VDI Supports the New Reality
Provide secure access to
business-critical virtual desktops
and apps on any device
Quickly scale
infrastructure to support
remote work demands
Enable self-service and
provide support as
needed
Can I get a
digital
workspace?
Considerations for Virtualization:
Questions to ask yourself
1. How much customization will each employee
require?
2. How many applications do my remote users
need to have access to?
3. What kind of device will my end-user be
utilizing?
4. What do my users need as far as performance
to get their work done effectively?
5. Why not choose RDS (remote desktop
services)?
6. How am I going to deal with security
challenges today?
7. Which financial model do I want to use?
WHO IS STORCOM?
Managed Services Solutions Provider
Private, Secure Cloud and Tier 3 Data Centers
Experts in Enabling Remote Workforces
Partnered with the Best Technologies
Including Top Public Cloud Providers
Twenty Years of Experience
How Much Customization Will Each
Employee Require?
Persistent or Non-Persistent Workspace?
How many users? =
How many “images”?
Create Matrix of User Base
How Many Applications Do My Remote
Users Need to Access?
● Does application publishing make sense?
○ App publishing provides end-users
quick and easy access to all of their
published apps
○ SaaS apps, and mobile apps through a
single, secure unified workspace.
○ Good for small number of needed
applications
What Kind of Device Will My End-User Utilize?
Technology Browser Tablets
Nutanix
VMware Horizon
Citrix
Internet Explorer
Chrome
Safari
Firefox
iPad
Android Tablet
Chromebook
What Do My Users Need as Far as Performance to
Get Their Work Done Effectively?
You need to re-think what performance
capabilities your employees need…
Light User
● Basic apps
● Non-persistent or
published app
● Customer
service/office
admin
Standard Office User
● MS Office
● Memory + CPU
● High-performance
disk
● Persistent desktop
● Average employee
Power User
● More power req.
● GPU chip
● High-performing
compute
● Engineer/graphic
designer
Why Not RDS (remote desktop services)?
Shared Resources
App Incompatibility
No specific resource
allocation
Inefficient protocol
compared to top VDI
solutions
Lower Licensing Costs
Drawbacks
Pros
How am I Going to Deal with Security
Challenges Today?
● Authentication
● Secure remote management
● Network security
● Endpoint protection
● Micro-segmentation
Which Financial Model Do I Want to Use?
You need to re-think which model you
can use...
Public Cloud
● Costs can spiral
● Consumption-based
model
● Operational
Expense
On-Premises
● Potentially not an
option due to
COVID-19
quarantine
● Capital expenses
Storcom Private Cloud
● Guide you to the
right technology
● Hybrid cloud option
● Operational or
Capital Expense
Storcom‘s Methodology
DISCOVERY ROADMAPANALYSIS
● Data Gathering
● Application Classification
● Performance Requirements
● Availability Requirements
● RPO and RTO Requirements
● Growth Planning
● Networking Requirements
● Security Requirements
● Data Protection & Security
● Remote Access
Requirements
● Data Analysis
● Systems Sizing
● Analyzing Workload
● Analyzing Performance
● Evaluating HCI Options
● Analyzing/Evaluating
Growth Options
● Building Solution Options
● Data Protection Options
● Building TCO/ROI
● Present Findings
● Review Solution Options
● Good, Better, Best
Scenarios W/TCO
● Data Protection and Data
Security
● Implement Solution
● Support Solution
Technical
Overview
Example
Q&A
Please feel free to ask any questions that you may have.
Thank You For Your Time!
Tune in next time for Part 2!

More Related Content

What's hot

Blue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central and the world of End User Computing
Blue Central and the world of End User Computing
Blue Central
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
Ivanti
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
Micro Focus
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
Uni Systems S.M.S.A.
 
The digital natives are coming
The digital natives are comingThe digital natives are coming
The digital natives are coming
Sean Massey
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
Happiest Minds Technologies
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
Jonathan Wade
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
mHealth Summit EU 2015
mHealth Summit EU 2015mHealth Summit EU 2015
mHealth Summit EU 2015
3GDR
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
Lai Yoong Seng
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsPete Valentine
 
Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?
vDesk.Works
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
Stephen Rose
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
Waterstons Ltd
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
GWAVA
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
InnoTech
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
Chris Pepin
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
Lai Yoong Seng
 
Ivanti Cloud and Solving User Experience Problems
Ivanti Cloud and Solving User Experience ProblemsIvanti Cloud and Solving User Experience Problems
Ivanti Cloud and Solving User Experience Problems
Ivanti
 

What's hot (20)

Blue Central and the world of End User Computing
Blue Central and the world of End User ComputingBlue Central and the world of End User Computing
Blue Central and the world of End User Computing
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
The digital natives are coming
The digital natives are comingThe digital natives are coming
The digital natives are coming
 
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
GUIDE TO KEEP YOUR END-USERS CONNECTED TO THE DIGITAL WORKPLACE DURING DISRUP...
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
mHealth Summit EU 2015
mHealth Summit EU 2015mHealth Summit EU 2015
mHealth Summit EU 2015
 
Enterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD PremiumEnterprise Mobility Suite- Azure AD Premium
Enterprise Mobility Suite- Azure AD Premium
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
 
Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Micro Focus iPrint
Micro Focus iPrintMicro Focus iPrint
Micro Focus iPrint
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
Ivanti Cloud and Solving User Experience Problems
Ivanti Cloud and Solving User Experience ProblemsIvanti Cloud and Solving User Experience Problems
Ivanti Cloud and Solving User Experience Problems
 

Similar to Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Ahsan Abbasi
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
Andrew Miller
 
Cloud Computing Architecture: Components, Importance, and Tips
Cloud Computing Architecture: Components, Importance, and TipsCloud Computing Architecture: Components, Importance, and Tips
Cloud Computing Architecture: Components, Importance, and Tips
Fibonalabs
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
Lakshika Rasanjali
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
Sana Nasar
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
solarisyourep
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
Gopal Jogdand
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
vijay_m_chaudhary
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
Uni Systems S.M.S.A.
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
IRJET Journal
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
Harish Chander
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
GWAVA
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop Handbook
Nuno Alves
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfA Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
Venpep2
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Future
stevej7699
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Awingu 4.0
Awingu 4.0Awingu 4.0
Awingu 4.0
Karel Van Ooteghem
 

Similar to Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS) (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Citrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & LearnCitrix Flexcast + Assessment Approach Lunch & Learn
Citrix Flexcast + Assessment Approach Lunch & Learn
 
Cloud Computing Architecture: Components, Importance, and Tips
Cloud Computing Architecture: Components, Importance, and TipsCloud Computing Architecture: Components, Importance, and Tips
Cloud Computing Architecture: Components, Importance, and Tips
 
Cloud Computing.pptx
Cloud Computing.pptxCloud Computing.pptx
Cloud Computing.pptx
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era VMworld 2013: Unleashing Productivity in the New Mobile Era
VMworld 2013: Unleashing Productivity in the New Mobile Era
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
Micro Focus Keynote: Vision 2020: The Future of Infrastructure Software and M...
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop Handbook
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfA Complete Guide to Cloud Computing, Everything You Need To Know.pdf
A Complete Guide to Cloud Computing, Everything You Need To Know.pdf
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Future
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Awingu 4.0
Awingu 4.0Awingu 4.0
Awingu 4.0
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)

  • 1. STORCOM’S REMOTE WORK READINESS SERIES PRESENTED BY: DAVE KLUGER, CTO, STORCOM PART 1 Virtual Workspace and Virtual Desktop Options: Which is right for your organization?
  • 2. Storcom’s Remote Work Readiness Series Part 2: Virtual Collaboration ○ Cloud file-sharing and collaboration options: there are so many tools to choose from, so which is right for your organization? ○ Remote user telephony and video conferencing options. Part 3: Securing Your Remote Workers ○ How to protect remote and roaming workers: what options are available? ○ Secure internet access from the home office: how should you deal with security in this evolving environment?
  • 3. Reasons to Consider VDI & EUC Simplicity Simplify VDI deployments with ways to start small and easily scale up or scale out Remote Capabilities COVID-19 shifted how businesses viewed a remote workforce Quickly Access Data Remote users have secure, fast access to the data they need to keep operations running smoothly
  • 4. 4 How VDI Supports the New Reality Provide secure access to business-critical virtual desktops and apps on any device Quickly scale infrastructure to support remote work demands Enable self-service and provide support as needed Can I get a digital workspace?
  • 5. Considerations for Virtualization: Questions to ask yourself 1. How much customization will each employee require? 2. How many applications do my remote users need to have access to? 3. What kind of device will my end-user be utilizing? 4. What do my users need as far as performance to get their work done effectively? 5. Why not choose RDS (remote desktop services)? 6. How am I going to deal with security challenges today? 7. Which financial model do I want to use?
  • 6. WHO IS STORCOM? Managed Services Solutions Provider Private, Secure Cloud and Tier 3 Data Centers Experts in Enabling Remote Workforces Partnered with the Best Technologies Including Top Public Cloud Providers Twenty Years of Experience
  • 7. How Much Customization Will Each Employee Require? Persistent or Non-Persistent Workspace? How many users? = How many “images”? Create Matrix of User Base
  • 8. How Many Applications Do My Remote Users Need to Access? ● Does application publishing make sense? ○ App publishing provides end-users quick and easy access to all of their published apps ○ SaaS apps, and mobile apps through a single, secure unified workspace. ○ Good for small number of needed applications
  • 9. What Kind of Device Will My End-User Utilize? Technology Browser Tablets Nutanix VMware Horizon Citrix Internet Explorer Chrome Safari Firefox iPad Android Tablet Chromebook
  • 10. What Do My Users Need as Far as Performance to Get Their Work Done Effectively? You need to re-think what performance capabilities your employees need… Light User ● Basic apps ● Non-persistent or published app ● Customer service/office admin Standard Office User ● MS Office ● Memory + CPU ● High-performance disk ● Persistent desktop ● Average employee Power User ● More power req. ● GPU chip ● High-performing compute ● Engineer/graphic designer
  • 11. Why Not RDS (remote desktop services)? Shared Resources App Incompatibility No specific resource allocation Inefficient protocol compared to top VDI solutions Lower Licensing Costs Drawbacks Pros
  • 12. How am I Going to Deal with Security Challenges Today? ● Authentication ● Secure remote management ● Network security ● Endpoint protection ● Micro-segmentation
  • 13. Which Financial Model Do I Want to Use? You need to re-think which model you can use... Public Cloud ● Costs can spiral ● Consumption-based model ● Operational Expense On-Premises ● Potentially not an option due to COVID-19 quarantine ● Capital expenses Storcom Private Cloud ● Guide you to the right technology ● Hybrid cloud option ● Operational or Capital Expense
  • 14. Storcom‘s Methodology DISCOVERY ROADMAPANALYSIS ● Data Gathering ● Application Classification ● Performance Requirements ● Availability Requirements ● RPO and RTO Requirements ● Growth Planning ● Networking Requirements ● Security Requirements ● Data Protection & Security ● Remote Access Requirements ● Data Analysis ● Systems Sizing ● Analyzing Workload ● Analyzing Performance ● Evaluating HCI Options ● Analyzing/Evaluating Growth Options ● Building Solution Options ● Data Protection Options ● Building TCO/ROI ● Present Findings ● Review Solution Options ● Good, Better, Best Scenarios W/TCO ● Data Protection and Data Security ● Implement Solution ● Support Solution
  • 16. Q&A Please feel free to ask any questions that you may have.
  • 17. Thank You For Your Time! Tune in next time for Part 2!