Storcom has created this series because we are seeing, just like you, a ton of emails in our inbox on the topic of virtual workspace and remote work options. We felt that it was time to put on a series that was coming from a vendor-agnostic standpoint and really was designed to provide information that you really need to make informed decisions. We hope that we can help cut through the clutter and marketing hype in this series and dig into some of the real questions you need to be asking around any of the topics we are planning to discuss in this series. These seven questions are:
1) How much customization will each employee require?
2) How many applications do my remote users need to have access to?
3) What kind of device will your end-user be utilizing?
4) What do my users need as far as performance to get their work done effectively?
5) Why not choose RDS (remote desktop services)?
6) How are you going to deal with security challenges today?
7) Which financial model do you want to use?
The need for unified endpoint management is imperative as more and more corporations are allowing employees to work remotely and the line between personal and corporate devices becomes blurred. For enterprises, the pressure point is the need to comprehensively manage and track all devices that are connecting to corporate resources. And we’re on point to help you address this challenge.
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
Every chain has its weak link. In any Information Security model it’s us, the users. So how do we strengthen a key area? In this session, we review common challenges and learn the strategies for bridging the gap in a secure but user-friendly way.
Presenter: Reinier van der Drift, Product Manager
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANTMicro Focus
Enterprises spend more than $5 billion every year
on endpoint security solutions but continue to lose
ground to advanced attackers.
Make management of desktops and mobiles a
reality with ZENworks 2017 as a serviced offering. #MFSummit2017
Is workforce mobility presenting new technology challenges?Parallels Inc
Employees today work across an increasing number of devices and locations, needing simple, secure access to their desktop and applications.
Parallels® Remote Application Server provides centralized and secure management of your VDI infrastructure. It enables simplied, protected delivery of virtual applications and desktops to any device, anywhere.
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
Companies today have distributed mobile workforces and employees who are connecting to the corporate network via a large number of devices. These employees are located all over the globe, and they need seamless access to their information.
This creates pressure on IT to figure out how to deliver the right business services and data to users, and to deliver these in a way that is efficient, secure and auditable for IT. Moreover, the experience must be productive for users no matter what device they are using to connect from.
Horizon Workspace 1.5 is uniquely positioned to deliver on these objectives.
A Primer on iOS Management and What's ChangingIvanti
Ivanti UEM is fully integrated with our OS partners including iOS. We provide a seamless and native iOS user experience while also establishing the foundation for customer's zero-trust journey. Join us to learn how Ivanti UEM can help you fully manage iOS devices, capabilities and security features.
hva det betyr at alle tar kontrollen over egen IT-arena? Richard Hayton gir oss innsikt i hva konsekvensene er av at de ansatte definerer sin egen IT-arbeidsplass og hvordan fremtidens klientløsninger skal bygges for å ivareta både ansatte og bedriftens interesser.
The need for unified endpoint management is imperative as more and more corporations are allowing employees to work remotely and the line between personal and corporate devices becomes blurred. For enterprises, the pressure point is the need to comprehensively manage and track all devices that are connecting to corporate resources. And we’re on point to help you address this challenge.
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
Every chain has its weak link. In any Information Security model it’s us, the users. So how do we strengthen a key area? In this session, we review common challenges and learn the strategies for bridging the gap in a secure but user-friendly way.
Presenter: Reinier van der Drift, Product Manager
UNIFIED ENDPOINT MANAGEMENT. WHAT IT IS AND WHY IT’S IMPORTANTMicro Focus
Enterprises spend more than $5 billion every year
on endpoint security solutions but continue to lose
ground to advanced attackers.
Make management of desktops and mobiles a
reality with ZENworks 2017 as a serviced offering. #MFSummit2017
Is workforce mobility presenting new technology challenges?Parallels Inc
Employees today work across an increasing number of devices and locations, needing simple, secure access to their desktop and applications.
Parallels® Remote Application Server provides centralized and secure management of your VDI infrastructure. It enables simplied, protected delivery of virtual applications and desktops to any device, anywhere.
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
Companies today have distributed mobile workforces and employees who are connecting to the corporate network via a large number of devices. These employees are located all over the globe, and they need seamless access to their information.
This creates pressure on IT to figure out how to deliver the right business services and data to users, and to deliver these in a way that is efficient, secure and auditable for IT. Moreover, the experience must be productive for users no matter what device they are using to connect from.
Horizon Workspace 1.5 is uniquely positioned to deliver on these objectives.
A Primer on iOS Management and What's ChangingIvanti
Ivanti UEM is fully integrated with our OS partners including iOS. We provide a seamless and native iOS user experience while also establishing the foundation for customer's zero-trust journey. Join us to learn how Ivanti UEM can help you fully manage iOS devices, capabilities and security features.
hva det betyr at alle tar kontrollen over egen IT-arena? Richard Hayton gir oss innsikt i hva konsekvensene er av at de ansatte definerer sin egen IT-arbeidsplass og hvordan fremtidens klientløsninger skal bygges for å ivareta både ansatte og bedriftens interesser.
The Biggest Mistake you can make with your Data Center LicensesIvanti
IT is spending more on software than ever before. This most likely leaves you looking for ways to make the most of the software licenses you already have. On top of that, increasingly complex data center environments compound spending on software assets. Limited visibility into those assets could expose your most valuable business-critical applications to significant risk and additional cost.
See how data center discovery ninja Matt Reardon, takes an aggressive approach to gain visibility on complex software licenses so you can start making the most of your IT investments.
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
For decades, organisations have relied on the mainframe to be a secure vault holding important data. As our businesses look to utilise this data in new ways to maintain competitive advantage, it’s more important than ever that we know who has access, and how we control it. In this session we’ll explore some of the common mainframe security challenges, and how they can be addressed.
Presenter: Malcolm Trigg, Solution Consultant
End-user computing is not a trend, it's a transformational shiftUni Systems S.M.S.A.
In the new end-user computing environment, people want to stay connected and have access to the best networks and services as a seamless extension of their traditional desktop.
End-user computing is no longer about managing laptops and desktops. Today, we need to support user access to services, applications, and data on any device and in any location.
This revolution promises greater flexibility, productivity enhancements, staff morale improvements, and cost savings.
Your business can benefit from Virtual Desktop Computing.
We live in a mobile world. As a society, we are increasingly becoming more mobile, and our technology is evolving with us. Almost everyone has some form of mobile computer within reach at any given time. Many of us have more than one set of these devices – a personal device and a work device.
The current generation has grown up while being immersed in modern digital technology. The lines between work and personal life are blurred, and this is best shown in how they want to consume technology. The status quo of work devices and personal devices is no longer good enough. The latest generation to enter the workforce wants to be able to work anytime, anywhere, and from any device, and they will expect IT to deliver on this.
In this session, you'll learn how you can deliver an always on workspace that enables the business to work anywhere from any device while keeping security and user experience at the forefront.
The global disruption due to the pandemic has massively impacted organizations and the way they function.
Organizations are shifting towards a virtual environment by adopting cloud and automation to support,
monitor, and deploy exceptional service to their end-users. But how to keep the end-users connected to the
digital workplace securely during disruption is a big challenge
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
Smart phones and tablets are invading the business environment at top speed, with “bring your own device” (BYOD) providing a number of benefits for organisations across all sectors. With the right implementation, and ongoing secure support, performance through technology can be achieved in areas such as employee satisfaction, cost reduction, team work and collaboration and productivity.
Charlie Hales and Nigel Robson cover the important considerations a business should make before implementing an MDM/BYOD strategy, and will consider the ongoing implications of allowing corporate data to be accessed on personal devices ensuring the maximum benefit to businesses, customers and the end users.
Why Should Businesses Deploy DaaS in 2021?vDesk.Works
Modern desktop as a service providers have been focusing on providing a self-service solution to businesses which allows them to gain visibility and control over their current real estate cost of PCs and workspaces. It is possible for them to provision new virtual desktop infrastructure (VDI) quickly without purchasing and prepping the required hardware or software.
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
In the second in the series of seminars Charlie Hales and Nigel Robson will demonstrate how your business could use technologies it may have already invested in, such as System Center Configuration manager (SCCM) and Exchange to enable its Mobile Device Management (MDM) & BYOD strategies.
You may find that simple infrastructure changes result in big benefits such as improved user experience and support functionality; and hardware cost reductions.
Charlie and Nigel will then focus on the functionality Intune can offer when combined with your existing SCCM infrastructure, including management of all devices (PCs and mobile) through one interface.
Ivanti Cloud and Solving User Experience ProblemsIvanti
Learn how Ivanti Cloud can be used to discover and pinpoint user experience problems that are solved by Ivanti’s product portfolio, especially the User Workspace Management products. Ivanti Cloud can identify problems including slow logons, unwanted applications, high CPU load and over-privileged users, all of which have a negative impact on user experience, resource consumption and security. We’ll show you how to easily find those and fix them.
The Biggest Mistake you can make with your Data Center LicensesIvanti
IT is spending more on software than ever before. This most likely leaves you looking for ways to make the most of the software licenses you already have. On top of that, increasingly complex data center environments compound spending on software assets. Limited visibility into those assets could expose your most valuable business-critical applications to significant risk and additional cost.
See how data center discovery ninja Matt Reardon, takes an aggressive approach to gain visibility on complex software licenses so you can start making the most of your IT investments.
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
For decades, organisations have relied on the mainframe to be a secure vault holding important data. As our businesses look to utilise this data in new ways to maintain competitive advantage, it’s more important than ever that we know who has access, and how we control it. In this session we’ll explore some of the common mainframe security challenges, and how they can be addressed.
Presenter: Malcolm Trigg, Solution Consultant
End-user computing is not a trend, it's a transformational shiftUni Systems S.M.S.A.
In the new end-user computing environment, people want to stay connected and have access to the best networks and services as a seamless extension of their traditional desktop.
End-user computing is no longer about managing laptops and desktops. Today, we need to support user access to services, applications, and data on any device and in any location.
This revolution promises greater flexibility, productivity enhancements, staff morale improvements, and cost savings.
Your business can benefit from Virtual Desktop Computing.
We live in a mobile world. As a society, we are increasingly becoming more mobile, and our technology is evolving with us. Almost everyone has some form of mobile computer within reach at any given time. Many of us have more than one set of these devices – a personal device and a work device.
The current generation has grown up while being immersed in modern digital technology. The lines between work and personal life are blurred, and this is best shown in how they want to consume technology. The status quo of work devices and personal devices is no longer good enough. The latest generation to enter the workforce wants to be able to work anytime, anywhere, and from any device, and they will expect IT to deliver on this.
In this session, you'll learn how you can deliver an always on workspace that enables the business to work anywhere from any device while keeping security and user experience at the forefront.
The global disruption due to the pandemic has massively impacted organizations and the way they function.
Organizations are shifting towards a virtual environment by adopting cloud and automation to support,
monitor, and deploy exceptional service to their end-users. But how to keep the end-users connected to the
digital workplace securely during disruption is a big challenge
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
Smart phones and tablets are invading the business environment at top speed, with “bring your own device” (BYOD) providing a number of benefits for organisations across all sectors. With the right implementation, and ongoing secure support, performance through technology can be achieved in areas such as employee satisfaction, cost reduction, team work and collaboration and productivity.
Charlie Hales and Nigel Robson cover the important considerations a business should make before implementing an MDM/BYOD strategy, and will consider the ongoing implications of allowing corporate data to be accessed on personal devices ensuring the maximum benefit to businesses, customers and the end users.
Why Should Businesses Deploy DaaS in 2021?vDesk.Works
Modern desktop as a service providers have been focusing on providing a self-service solution to businesses which allows them to gain visibility and control over their current real estate cost of PCs and workspaces. It is possible for them to provision new virtual desktop infrastructure (VDI) quickly without purchasing and prepping the required hardware or software.
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
In the second in the series of seminars Charlie Hales and Nigel Robson will demonstrate how your business could use technologies it may have already invested in, such as System Center Configuration manager (SCCM) and Exchange to enable its Mobile Device Management (MDM) & BYOD strategies.
You may find that simple infrastructure changes result in big benefits such as improved user experience and support functionality; and hardware cost reductions.
Charlie and Nigel will then focus on the functionality Intune can offer when combined with your existing SCCM infrastructure, including management of all devices (PCs and mobile) through one interface.
Ivanti Cloud and Solving User Experience ProblemsIvanti
Learn how Ivanti Cloud can be used to discover and pinpoint user experience problems that are solved by Ivanti’s product portfolio, especially the User Workspace Management products. Ivanti Cloud can identify problems including slow logons, unwanted applications, high CPU load and over-privileged users, all of which have a negative impact on user experience, resource consumption and security. We’ll show you how to easily find those and fix them.
Cloud Computing Architecture: Components, Importance, and TipsFibonalabs
Now that we know the effectiveness of cloud computing architecture, its importance, and its components, it goes without saying that cloud services and applications are the need of the hour. With a great future ahead, cloud computing has become the top choice for small, medium, and large businesses.
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL
Webinar slides for the End User Computing Webinar on the 19th June. View these slides for an introduction to Microsoft, Citrix and VMware Technologies and how your organisation can start its transition to the Virtualised Modern Desktop.
For more details or to book a Strategy Assessment, please call OCSL on 0845 605 2100 or email marketing@ocsl.co.uk
The Citrix Virtual Desktop Handbook examines the project lifecycle for a desktop virtualization project.
The Handbook provides the methodology, experience and best practices needed to successfully design your own desktop virtualization solution
https://support.citrix.com/article/CTX136546
A Complete Guide to Cloud Computing, Everything You Need To Know.pdfVenpep2
Cloud computing is the use of virtualized systems that are accessed via an internet connection. Cloud-based services can be used by individual users, businesses, governments, and other organizations to improve efficiency.
Designing End-User Experience for Workplace of the Futurestevej7699
This whitepaper highlights how enterprises can use virtualization technologies to design and deliver superior end-user experience for Workplaces of the Future.
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
Scalable enterprise mobility solutions: How to give your employees tools they need without sacrificing user experience and security.
Consumerization of IT and BYOD are here – and it’s a GOOD thing. Today's dynamic workplaces and hyper-competitive markets drive demand for more mobile productivity solutions. Nearly 70% of enterprise employees report making better decisions, being more productive and happier if they are allowed to use mobile devices and cloud-based tools. Yet, IT organizations often resist these trends because of cost and risk associated with multi-platform, multi-device ecosystem having access to corporate data and resources.
In this webinar, product experts from Sencha and Centrify will help your organization embrace BYOD and SaaS in a cost-effective, scalable way. Sencha Space is an advanced platform for securely deploying mobile apps and delivering a consistent, elegant, mobile user experience to end-users. Users can launch any mobile web app, or HTML5 app in a secure, managed environment. Combining Space with secure, Active Directory- or Cloud-Based Identity and Access Management (IAM) from Centrify gives IT visibility and control over mobile platforms and SaaS / in-house apps while improving user experience and reducing security risk.
ONE WORKSPACE. ANY DEVICE. ANYWHERE.
Awingu is a unified workspace that offers a highly secure and audited access to your company files and legacy, web and SaaS applications in a browser-based workspace, accessible via any browser, on any device.
Similar to Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS) (20)
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
1. STORCOM’S REMOTE
WORK READINESS SERIES
PRESENTED BY:
DAVE KLUGER,
CTO, STORCOM
PART 1
Virtual Workspace and Virtual Desktop
Options: Which is right for your organization?
2. Storcom’s Remote Work Readiness
Series
Part 2: Virtual Collaboration
○ Cloud file-sharing and collaboration options: there are so many tools to
choose from, so which is right for your organization?
○ Remote user telephony and video conferencing options.
Part 3: Securing Your Remote Workers
○ How to protect remote and roaming workers: what options are
available?
○ Secure internet access from the home office: how should you deal with
security in this evolving environment?
3. Reasons to Consider VDI & EUC
Simplicity
Simplify VDI deployments
with ways to start small and
easily scale up or scale out
Remote Capabilities
COVID-19 shifted how
businesses viewed a remote
workforce
Quickly Access Data
Remote users have secure, fast
access to the data they need to
keep operations running
smoothly
4. 4
How VDI Supports the New Reality
Provide secure access to
business-critical virtual desktops
and apps on any device
Quickly scale
infrastructure to support
remote work demands
Enable self-service and
provide support as
needed
Can I get a
digital
workspace?
5. Considerations for Virtualization:
Questions to ask yourself
1. How much customization will each employee
require?
2. How many applications do my remote users
need to have access to?
3. What kind of device will my end-user be
utilizing?
4. What do my users need as far as performance
to get their work done effectively?
5. Why not choose RDS (remote desktop
services)?
6. How am I going to deal with security
challenges today?
7. Which financial model do I want to use?
6. WHO IS STORCOM?
Managed Services Solutions Provider
Private, Secure Cloud and Tier 3 Data Centers
Experts in Enabling Remote Workforces
Partnered with the Best Technologies
Including Top Public Cloud Providers
Twenty Years of Experience
7. How Much Customization Will Each
Employee Require?
Persistent or Non-Persistent Workspace?
How many users? =
How many “images”?
Create Matrix of User Base
8. How Many Applications Do My Remote
Users Need to Access?
● Does application publishing make sense?
○ App publishing provides end-users
quick and easy access to all of their
published apps
○ SaaS apps, and mobile apps through a
single, secure unified workspace.
○ Good for small number of needed
applications
9. What Kind of Device Will My End-User Utilize?
Technology Browser Tablets
Nutanix
VMware Horizon
Citrix
Internet Explorer
Chrome
Safari
Firefox
iPad
Android Tablet
Chromebook
10. What Do My Users Need as Far as Performance to
Get Their Work Done Effectively?
You need to re-think what performance
capabilities your employees need…
Light User
● Basic apps
● Non-persistent or
published app
● Customer
service/office
admin
Standard Office User
● MS Office
● Memory + CPU
● High-performance
disk
● Persistent desktop
● Average employee
Power User
● More power req.
● GPU chip
● High-performing
compute
● Engineer/graphic
designer
11. Why Not RDS (remote desktop services)?
Shared Resources
App Incompatibility
No specific resource
allocation
Inefficient protocol
compared to top VDI
solutions
Lower Licensing Costs
Drawbacks
Pros
12. How am I Going to Deal with Security
Challenges Today?
● Authentication
● Secure remote management
● Network security
● Endpoint protection
● Micro-segmentation
13. Which Financial Model Do I Want to Use?
You need to re-think which model you
can use...
Public Cloud
● Costs can spiral
● Consumption-based
model
● Operational
Expense
On-Premises
● Potentially not an
option due to
COVID-19
quarantine
● Capital expenses
Storcom Private Cloud
● Guide you to the
right technology
● Hybrid cloud option
● Operational or
Capital Expense
14. Storcom‘s Methodology
DISCOVERY ROADMAPANALYSIS
● Data Gathering
● Application Classification
● Performance Requirements
● Availability Requirements
● RPO and RTO Requirements
● Growth Planning
● Networking Requirements
● Security Requirements
● Data Protection & Security
● Remote Access
Requirements
● Data Analysis
● Systems Sizing
● Analyzing Workload
● Analyzing Performance
● Evaluating HCI Options
● Analyzing/Evaluating
Growth Options
● Building Solution Options
● Data Protection Options
● Building TCO/ROI
● Present Findings
● Review Solution Options
● Good, Better, Best
Scenarios W/TCO
● Data Protection and Data
Security
● Implement Solution
● Support Solution