SlideShare a Scribd company logo
1 of 37
Download to read offline
Unified Endpoint Management in Scale:
What’s New with Horizon Mirage
Issy Ben-Shaul, VMware
Hanan Stein, VMware
EUC5629
#EUC5629
2
Agenda
 Core product overview
 New features and capabilities
 Demo
 Customer testimonial – global enterprise deployment
 Future directions
3
App compatibility
problems
Why is Windows Endpoint Management so Hard?
Mobile usersHardware failuresPatch
Tuesday
Physical, virtual,
mobile
4
Horizon Mirage in a Nutshell
 A system for management and recovery of Windows endpoints
 Unique: centralized images with local execution and quick synch
 Empower end users with a personalized desktop experience
 Supports both physical and virtual, local and central devices
5
Centralized Images
Mirage Server
Optimized Synchronization
and Desktop Delivery
Core Image
Manage Centrally Execute Locally
Local Copies
Mirage Client
How does Horizon Mirage Work?
Patented differentiated technology
• Desktop streaming
• Network de-dup & compression
• Storage de-dup
• Branch caching of images
6
Layered Image Management
Machine Identity
User/PCLM Installed Apps
User Data & Profile
Base Image
(OS, Infra. SW, core apps)
Driver Library
• Zero touch (re) provisioning
• no need for external boot
• No isolation/runtime redirection
• Image merged at endpoint
• Preserves UIA & PCLM apps
• Modular recovery/migration
App Layer 1
App Layer 2
App Layer n
Mirage
Managed
Mirage
Protected
Managing both Base Image & Apps
(“image virtualization”)
7
Mirage Primary Use Cases
Image
Management
OS & HW
Migration
Repair & DR
8
Image Management, Provisioning, Migration
Reference Machine
Reference
CVD
Base Image
CVD2
CVD1
Laptops w/
Mirage Client
Base Image is captured
from the Reference CVD
Base image
merged with endpoint UIA
Mirage™
Server
CVD3
Branch
Reflector
Base Image downloaded Branch
Reflector
• Zero touch: no PXE, no OS/apps installation
• Personalized apps and profiles migrated/preserved
• WAN optimized -- BR, de-dup
• Minimal end-user downtime
• Safety net: Can revert to previous snapshot quickly
9
WAN
OS
Content
Apps
Fully managed / synchronized
Full access to PC image on central
VM via PCoIP/RDP
• Migrate full image (CVD) into data center
• Access CVD files through File portal
• Mount CVD onto VM for universal access
• Restore CVD onto a new device
OS for VM
Content
Apps
VM Pool
Re-base CVD
onto VM
VMware
Mirage™
Server
OS
Content
Apps
Desktop Repair, Backup, DR
Dell
Stream CVD to new device HP
Access PC files via Web-based
File portal
10
Agenda
 Core product overview
 New features and capabilities
 Demo
 Customer testimonial – global enterprise deployment
 Future directions
11
New: App Layering
12
App Layering Concept and Semantics
Desktop Layers
Machine Identity
User/PCLM Installed Apps
User Data & Profile
Base Image
(OS, Infra. SW, core apps)
Driver Library
• Extends Base Image with
managing business apps
• Install once, record “delta” and
apply many endpoints – No
installation at the endpoints
• No app limitations: supports
kernel drivers, shell plug-ins, etc.
• No isolation – resulting image is
standard (no runtime redirection)
• OEM apps can be captured in an
app layer (enhance HW refresh)
App Layer 1
App Layer 2
App Layer n
Mirage
Managed
Mirage
Protected
13
• Native experience
• Applications with drivers
• Inter-app communication
• No App compat issues (e.g., shell plug-ins)
Horizon™ Mirage Application LayersVMware ThinApp Package
• Isolation
• Cross-Platform
• Multi-version support
• Agentless Deployment
• UPL is now a citizen in consumerized IT
• User installed and updated apps
• Personalization preserved
Horizon™ Mirage User Personalization Layer
Base Layer Assigned
Horizon™ Mirage: App layers and ThinApp
14
Centrally managed
Windows images deployed
locally on devices
Datacenter hosted
virtual desktops
Horizon™
View
Horizon™
Mirage
Security
Remote &
Roaming Access
Offline Flexibility
Native Performance
Synchronization
Thin/zero clients Tablets PCs Laptops Macs
15
New: Image Management for View
16
Traditional Image Deployment and Management for View
 Floating pools
• Identical images – all apps and drivers installed centrally
• Stateless – pristine image on each log-on
• Storage efficiency via Linked Clone
• Image managed by View Composer
Only viable when all workers use identical apps/peripherals
 Dedicated pools
• Individualized images with user-specific and departmental apps
• Stateful – Images persist across sessions
• Full Clones or Linked Clones with space reclamation (New in View 5.2)
• However, Composer cannot be used (due to personalized images)
No effective image management tool
17
 Initial base Image is linked cloned or fully cloned
 Subsequent updates to base and app layer performed by Mirage
 Profile and user-installed apps protected and preserved by Mirage
 For Linked clones, delta disks growth contained by SE Sparse (5.2)
Note: Parent VMs for floating pools can also be managed by Mirage
View Dedicated Pools Managed by Mirage
Mirage™Server
Provision desktops
(Linked or Full clones)
Base Image
App Layer 1
App Layer 2
Desktop VM
Virtual Disk
(linked/full clone)
user-installed &
PCLM apps
Update Base layer
User Profile
Provision App layerUpdate App layer
18
View Dedicated Pools Managed by Mirage
 Initial base Image is linked cloned or fully cloned
 Subsequent updates to base and app layer performed by Mirage
 Profile and user-installed apps protected and preserved by Mirage
 Delta disks growth contained by SE Sparse technology
Note: Parent VMs for floating pools can also be managed by Mirage
Mirage™Server
Provision desktops
(Linked or Full clones)
Base Image
App Layer 1
App Layer 2
Desktop VM
Virtual Disk
(linked/full clone)
user-installed &
PCLM apps
Update Base layer
User Profile
Provision App layerUpdate App layer
19
Roadmap: Mirage Mass Restore of Personalized Images
 When Needed ?
• Rebalance – when adding hosts to ESX or adding LUNs
• DR – Failure of ESX host/storage
• Recompose – Cost-effective re-provisioning (e.g. major image updates)
 Mirage restores personalized part of the image
Mirage™
Server
Refresh/Rebalance/
Recompose
User installed &
PCLM Apps
User Profile
Base Layer
App Layer 1
App Layer 2
Desktop VM
Virtual Disk
(linked clone)
Restore apps,
profile
20
New: Scale and Performance
Enhancements
21
Scale and Performance Enhancements
 Reduced amount of IOPS by 35%
• Reduced number of file “pointers” in Single Instance Store by 35%
• Extensive in-memory caching of metadata and signatures for popular data
 Offline De-duplication
• Server based de-dup continues after client gets disconnected
 Improved resume time by order of magnitude (10X)
• Persistent resume state across server restarts & server fail over
 Consensus Based Upload
• Do not scan data of known files (e.g., System files)
• Average 40% reduction in scan time
22
Centralization and Migration Calculators
23
Agenda
 Core product overview
 New features and capabilities
 Demo
 Customer testimonial – global enterprise deployment
 Future directions
Customer Case Study:
Global Mirage Deployment
Yoni Kaplansky, IT Operations
Director
Paul Navarro, IT Operations Service
Delivery and PMO Manager
Amdocs IT, North America
August 2013
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs25
#1 in Telecom Software
Market Share
Amdocs wins
2012 Outsourcing
Excellence Award
A leader in 2012
Integrated Revenue
and Customer
Management (IRCM)
Magic Quadrant
About Amdocs
● Leader in Telecom Customer Experience Systems and Services
● $3.2 billion revenue in 2012
● 20,000 professionals
● Serving customers in more than 60 countries
● Listed on the New York Stock Exchange (DOX)
Information Security Level 1 – Confidential
© 2013 – Proprietary and Confidential Information of Amdocs25
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs26
Why Amdocs Selected Horizon Mirage
Many Challenges with managing & protecting laptops
● Majority of laptops offsite  more difficult to manage and protect
● Experienced many support cases and SLA expirations
● Had a backup solution that was very limited
● Challenging for remote workers – unpredictable restore, PSTs
● Backup only, no solution for Hardware refresh, image mgmt, break-fix,
● Decentralized system (20 servers) complex to manage/support
● Considered VDI, but not applicable for remote users that work ‘offline’
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs26
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs27
Business Benefits of Using Mirage
● Loss, theft, or damage  Restore full CVD to replacement hardware
● DRP & Business Continuity Strategy – Restore to VM on VDI
● Break-fix for helpdesk support, minimal IT time & end-user downtime
● Base image management – Compliance, provisioning, HW refresh
● OS and App layering – On-going updates, distribution to remote sites
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs27
Support category IT cost savings
w/ Mirage
Productivity
savings w/ Mirage
Hardware problems 27% 79%
Software problems 40% 63%
Restore (from backup) 90% 96%
Settings & Configuration 60% 61%
Software Install (core apps) 42% 53%
Weighted Average 40% 59%
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs28
Technical Advantages of Mirage
● Centralized architecture
● Increase in successful number of full backups from remote sites/users
● Transparent – non disruptive backups and restores
● Revert to snapshot (break-fix) preserves user data. Impact to OS and
installed apps only. Plus for developers and testers.
● Right-Click Fingertip access to file version history and restore options.
● Increased confidence in PST file backup and restore
● Product Support and Engineering team – committed, available, and
does what it takes to remedy any challenges
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs28
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs29
Deployment Architecture and Stats
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs29
 3 Sites
• AMER – 3500 laptops
• EMEA – 4000 laptops
• APAC – 3000 laptops
 Each site hosts
• ~5 Mirage servers, F5 clustered
• ~75-100 TB NAS
• ~15000 IOPS per site
• QoS defined over WAN links
 Steady state stats
• Upload per desktop – 1-2 hrs
• Upload delta ~20MB (de-duped)
• No impact on user experience
 Centralization stats (Apr – Aug 2013)
• 1000 laptops per month
• Average CE per laptop ~20 hrs (5 days)
• Average image size – 50GB (25 unique)
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs30
Success Stories
● Business Continuity
● Employee relocated from Israel to Canada. A couple of weeks after
relocation, laptop drive failed.
● PC tech performed full restore of 52 GB over low bandwidth SSL VPN
● Image streamed to end user, within hours could resume work
● Full image was recovered – employee resumed from where left off
● Break-Fix
● Employee had broken Internet Explorer plugins for finance apps
● PC tech tried to manually repair IE without success
● OS restore option would not proceed either
● PC tech used Mirage “revert to snapshot” – less than 10 minutes to IT
● Without Mirage, IT would need to re-image the computer – huge effort to IT
and long downtime
Information Security Level 2 – Sensitive
© 2013 – Proprietary and Confidential Information of Amdocs30
31
Where are We Heading?
 Advanced bare metal provisioning and restore
 Mirage DMZ Edge Gateway
 Self-service App delivery and integration with license management
 Multi-site, scalable management
 New OS platforms: Windows 8, Windows Server, Windows Embedded
 Image management for View in scale
 Self service restore of PC on central VM for universal access
 Central policy management for Fusion Pro
32
Unified Image Management
View
VDI Image
VDI
Off-Network BYOD Macs
Off-Network BYOD Win Laptops
BYOD
Local
execution
In VM
Central
execution
Efficient
Remote
Protocol
Thin/Zero-Clients
Networked Mobile Devices
Networked BYOD Laptops
Physical
Local
execution
Corp Owned Laptops
Power-User Workstations
CAPEX Sensitive Desktops
Efficient
WAN
Streaming &
Caching
Mirage
Centralized Image
33
Thank You!
Questions?
34
Other VMware Activities Related to This Session
 HOL:
HOL-MBL-1309
Horizon Mirage - Manage Physical Desktops
 Group Discussions:
EUC1000-GD; EUC1004-GD
Mirage with Daniel Beveridge or Mark Ewert
 Breakout Sessions:
EUC5507
Vmware Mirage storage and network de-duplication demystified
 EUC5587
Horizon Mirage image deployment deep dive
 EUC4608
Mirage 201
 EUC4815
• Demystifying VMware Mirage: tips and tricks for success
THANK YOU
Unified Endpoint Management in Scale:
What’s New with Horizon Mirage
Issy Ben-Shaul, VMware
Hanan Stein, VMware
EUC5629
#EUC5629

More Related Content

What's hot

Microsoft system center 2012 r2 configuration manager
Microsoft system center 2012 r2 configuration managerMicrosoft system center 2012 r2 configuration manager
Microsoft system center 2012 r2 configuration managerapponix1
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationShahab Al Yamin Chawdhury
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewAmit Gatenyo
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012JasonCondo
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013C/D/H Technology Consultants
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pMicrosoft Singapore
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerDigicomp Academy AG
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overviewfannaq786
 
System Center Orchestrator 2012 Overview
System Center Orchestrator 2012 OverviewSystem Center Orchestrator 2012 Overview
System Center Orchestrator 2012 OverviewAmit Gatenyo
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-labDPA
 
Operations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 OverviewOperations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 OverviewAmit Gatenyo
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Abdelslam Elsobky
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
Got Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterGot Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterC/D/H Technology Consultants
 
The Business Value of System Center 2012
The Business Value of System Center 2012The Business Value of System Center 2012
The Business Value of System Center 2012jmustac
 
Enterprise Desktop Architecture 5 Year View
Enterprise Desktop Architecture   5 Year ViewEnterprise Desktop Architecture   5 Year View
Enterprise Desktop Architecture 5 Year ViewJeff Fisher
 

What's hot (20)

Microsoft system center 2012 r2 configuration manager
Microsoft system center 2012 r2 configuration managerMicrosoft system center 2012 r2 configuration manager
Microsoft system center 2012 r2 configuration manager
 
scom
scomscom
scom
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Installation
InstallationInstallation
Installation
 
Microsoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 InstallationMicrosoft System Center Configuration Manager 2012 R2 Installation
Microsoft System Center Configuration Manager 2012 R2 Installation
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012
 
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013SCOM: The Unsung Hero of the System Center Suite April 24, 2013
SCOM: The Unsung Hero of the System Center Suite April 24, 2013
 
Riding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_pRiding the wave towards customer centricity aziz amirali 3_p
Riding the wave towards customer centricity aziz amirali 3_p
 
Overview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration ManagerOverview of System Center 2012 R2 Configuration Manager
Overview of System Center 2012 R2 Configuration Manager
 
2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview2011 11-28 sccm-2012_technical_overview
2011 11-28 sccm-2012_technical_overview
 
System Center Orchestrator 2012 Overview
System Center Orchestrator 2012 OverviewSystem Center Orchestrator 2012 Overview
System Center Orchestrator 2012 Overview
 
Sccm hands-on-lab
Sccm hands-on-labSccm hands-on-lab
Sccm hands-on-lab
 
Operations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 OverviewOperations Manager (SCOM) 2007 R2 Overview
Operations Manager (SCOM) 2007 R2 Overview
 
Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012Automated Operating System Deployment Using SCCM 2012
Automated Operating System Deployment Using SCCM 2012
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
Got Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System CenterGot Personally-Owned Devices? Manage Them with System Center
Got Personally-Owned Devices? Manage Them with System Center
 
The Business Value of System Center 2012
The Business Value of System Center 2012The Business Value of System Center 2012
The Business Value of System Center 2012
 
Enterprise Desktop Architecture 5 Year View
Enterprise Desktop Architecture   5 Year ViewEnterprise Desktop Architecture   5 Year View
Enterprise Desktop Architecture 5 Year View
 
Sccm 2016 training
Sccm 2016 trainingSccm 2016 training
Sccm 2016 training
 

Similar to VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Horizon Mirage

VMworld 2013: VMware Mirage 201
VMworld 2013: VMware Mirage 201VMworld 2013: VMware Mirage 201
VMworld 2013: VMware Mirage 201VMworld
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk Corporation
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5solarisyougood
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application VirtualizationAmit Gatenyo
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneUnidesk Corporation
 
Vmware evaluate-windows-migration-tools-whitepaper
Vmware evaluate-windows-migration-tools-whitepaperVmware evaluate-windows-migration-tools-whitepaper
Vmware evaluate-windows-migration-tools-whitepaperAnimesh Dixit
 
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep DiveVMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep DiveVMworld
 
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment Manager
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment ManagerVMworld 2015: Managing Users: A Deep Dive into VMware User Environment Manager
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment ManagerVMworld
 
VMware Workspace ONE a synergie s Microsoftem
VMware Workspace ONE a synergie s MicrosoftemVMware Workspace ONE a synergie s Microsoftem
VMware Workspace ONE a synergie s MicrosoftemMarketingArrowECS_CZ
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2Norman Mayes
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint ProtectionScientia Groups
 
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success VMworld
 
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...eG Innovations
 
How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?eG Innovations
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMJerry Bishop
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementQuest
 

Similar to VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Horizon Mirage (20)

VMworld 2013: VMware Mirage 201
VMworld 2013: VMware Mirage 201VMworld 2013: VMware Mirage 201
VMworld 2013: VMware Mirage 201
 
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
Unidesk and VMware Customer Webinar: Ohio Department of Developmental Disabil...
 
Presentation technical deep dive of horizon 6 and mirage 5
Presentation   technical deep dive of horizon 6 and mirage 5Presentation   technical deep dive of horizon 6 and mirage 5
Presentation technical deep dive of horizon 6 and mirage 5
 
Best of Microsoft Management Summit 2012
Best of Microsoft Management Summit 2012Best of Microsoft Management Summit 2012
Best of Microsoft Management Summit 2012
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
Make VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for EveryoneMake VDI Personal, Make VDI for Everyone
Make VDI Personal, Make VDI for Everyone
 
Vmware evaluate-windows-migration-tools-whitepaper
Vmware evaluate-windows-migration-tools-whitepaperVmware evaluate-windows-migration-tools-whitepaper
Vmware evaluate-windows-migration-tools-whitepaper
 
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep DiveVMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
VMworld 2013: VMware Horizon Mirage Image Deployment Deep Dive
 
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment Manager
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment ManagerVMworld 2015: Managing Users: A Deep Dive into VMware User Environment Manager
VMworld 2015: Managing Users: A Deep Dive into VMware User Environment Manager
 
VMware Workspace ONE a synergie s Microsoftem
VMware Workspace ONE a synergie s MicrosoftemVMware Workspace ONE a synergie s Microsoftem
VMware Workspace ONE a synergie s Microsoftem
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
Resume_Padmaja
Resume_PadmajaResume_Padmaja
Resume_Padmaja
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
 
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
VMworld 2013: Demystifying VMware Mirage: Tips and Tricks for Success
 
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
 
How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?How to Get the Fastest Possible Citrix Logon Times?
How to Get the Fastest Possible Citrix Logon Times?
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
 
Desktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCMDesktop Management Using Microsoft SCCM
Desktop Management Using Microsoft SCCM
 
Ensuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint ManagementEnsuring Rock-Solid Unified Endpoint Management
Ensuring Rock-Solid Unified Endpoint Management
 

More from VMworld

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld
 

More from VMworld (20)

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep Dive
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep Dive
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations!
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts Panel
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way!
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SAN
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
 

Recently uploaded

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

VMworld 2013: Unified Endpoint Management in Scale: What’s New with VMware Horizon Mirage

  • 1. Unified Endpoint Management in Scale: What’s New with Horizon Mirage Issy Ben-Shaul, VMware Hanan Stein, VMware EUC5629 #EUC5629
  • 2. 2 Agenda  Core product overview  New features and capabilities  Demo  Customer testimonial – global enterprise deployment  Future directions
  • 3. 3 App compatibility problems Why is Windows Endpoint Management so Hard? Mobile usersHardware failuresPatch Tuesday Physical, virtual, mobile
  • 4. 4 Horizon Mirage in a Nutshell  A system for management and recovery of Windows endpoints  Unique: centralized images with local execution and quick synch  Empower end users with a personalized desktop experience  Supports both physical and virtual, local and central devices
  • 5. 5 Centralized Images Mirage Server Optimized Synchronization and Desktop Delivery Core Image Manage Centrally Execute Locally Local Copies Mirage Client How does Horizon Mirage Work? Patented differentiated technology • Desktop streaming • Network de-dup & compression • Storage de-dup • Branch caching of images
  • 6. 6 Layered Image Management Machine Identity User/PCLM Installed Apps User Data & Profile Base Image (OS, Infra. SW, core apps) Driver Library • Zero touch (re) provisioning • no need for external boot • No isolation/runtime redirection • Image merged at endpoint • Preserves UIA & PCLM apps • Modular recovery/migration App Layer 1 App Layer 2 App Layer n Mirage Managed Mirage Protected Managing both Base Image & Apps (“image virtualization”)
  • 7. 7 Mirage Primary Use Cases Image Management OS & HW Migration Repair & DR
  • 8. 8 Image Management, Provisioning, Migration Reference Machine Reference CVD Base Image CVD2 CVD1 Laptops w/ Mirage Client Base Image is captured from the Reference CVD Base image merged with endpoint UIA Mirage™ Server CVD3 Branch Reflector Base Image downloaded Branch Reflector • Zero touch: no PXE, no OS/apps installation • Personalized apps and profiles migrated/preserved • WAN optimized -- BR, de-dup • Minimal end-user downtime • Safety net: Can revert to previous snapshot quickly
  • 9. 9 WAN OS Content Apps Fully managed / synchronized Full access to PC image on central VM via PCoIP/RDP • Migrate full image (CVD) into data center • Access CVD files through File portal • Mount CVD onto VM for universal access • Restore CVD onto a new device OS for VM Content Apps VM Pool Re-base CVD onto VM VMware Mirage™ Server OS Content Apps Desktop Repair, Backup, DR Dell Stream CVD to new device HP Access PC files via Web-based File portal
  • 10. 10 Agenda  Core product overview  New features and capabilities  Demo  Customer testimonial – global enterprise deployment  Future directions
  • 12. 12 App Layering Concept and Semantics Desktop Layers Machine Identity User/PCLM Installed Apps User Data & Profile Base Image (OS, Infra. SW, core apps) Driver Library • Extends Base Image with managing business apps • Install once, record “delta” and apply many endpoints – No installation at the endpoints • No app limitations: supports kernel drivers, shell plug-ins, etc. • No isolation – resulting image is standard (no runtime redirection) • OEM apps can be captured in an app layer (enhance HW refresh) App Layer 1 App Layer 2 App Layer n Mirage Managed Mirage Protected
  • 13. 13 • Native experience • Applications with drivers • Inter-app communication • No App compat issues (e.g., shell plug-ins) Horizon™ Mirage Application LayersVMware ThinApp Package • Isolation • Cross-Platform • Multi-version support • Agentless Deployment • UPL is now a citizen in consumerized IT • User installed and updated apps • Personalization preserved Horizon™ Mirage User Personalization Layer Base Layer Assigned Horizon™ Mirage: App layers and ThinApp
  • 14. 14 Centrally managed Windows images deployed locally on devices Datacenter hosted virtual desktops Horizon™ View Horizon™ Mirage Security Remote & Roaming Access Offline Flexibility Native Performance Synchronization Thin/zero clients Tablets PCs Laptops Macs
  • 16. 16 Traditional Image Deployment and Management for View  Floating pools • Identical images – all apps and drivers installed centrally • Stateless – pristine image on each log-on • Storage efficiency via Linked Clone • Image managed by View Composer Only viable when all workers use identical apps/peripherals  Dedicated pools • Individualized images with user-specific and departmental apps • Stateful – Images persist across sessions • Full Clones or Linked Clones with space reclamation (New in View 5.2) • However, Composer cannot be used (due to personalized images) No effective image management tool
  • 17. 17  Initial base Image is linked cloned or fully cloned  Subsequent updates to base and app layer performed by Mirage  Profile and user-installed apps protected and preserved by Mirage  For Linked clones, delta disks growth contained by SE Sparse (5.2) Note: Parent VMs for floating pools can also be managed by Mirage View Dedicated Pools Managed by Mirage Mirage™Server Provision desktops (Linked or Full clones) Base Image App Layer 1 App Layer 2 Desktop VM Virtual Disk (linked/full clone) user-installed & PCLM apps Update Base layer User Profile Provision App layerUpdate App layer
  • 18. 18 View Dedicated Pools Managed by Mirage  Initial base Image is linked cloned or fully cloned  Subsequent updates to base and app layer performed by Mirage  Profile and user-installed apps protected and preserved by Mirage  Delta disks growth contained by SE Sparse technology Note: Parent VMs for floating pools can also be managed by Mirage Mirage™Server Provision desktops (Linked or Full clones) Base Image App Layer 1 App Layer 2 Desktop VM Virtual Disk (linked/full clone) user-installed & PCLM apps Update Base layer User Profile Provision App layerUpdate App layer
  • 19. 19 Roadmap: Mirage Mass Restore of Personalized Images  When Needed ? • Rebalance – when adding hosts to ESX or adding LUNs • DR – Failure of ESX host/storage • Recompose – Cost-effective re-provisioning (e.g. major image updates)  Mirage restores personalized part of the image Mirage™ Server Refresh/Rebalance/ Recompose User installed & PCLM Apps User Profile Base Layer App Layer 1 App Layer 2 Desktop VM Virtual Disk (linked clone) Restore apps, profile
  • 20. 20 New: Scale and Performance Enhancements
  • 21. 21 Scale and Performance Enhancements  Reduced amount of IOPS by 35% • Reduced number of file “pointers” in Single Instance Store by 35% • Extensive in-memory caching of metadata and signatures for popular data  Offline De-duplication • Server based de-dup continues after client gets disconnected  Improved resume time by order of magnitude (10X) • Persistent resume state across server restarts & server fail over  Consensus Based Upload • Do not scan data of known files (e.g., System files) • Average 40% reduction in scan time
  • 23. 23 Agenda  Core product overview  New features and capabilities  Demo  Customer testimonial – global enterprise deployment  Future directions
  • 24. Customer Case Study: Global Mirage Deployment Yoni Kaplansky, IT Operations Director Paul Navarro, IT Operations Service Delivery and PMO Manager Amdocs IT, North America August 2013
  • 25. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs25 #1 in Telecom Software Market Share Amdocs wins 2012 Outsourcing Excellence Award A leader in 2012 Integrated Revenue and Customer Management (IRCM) Magic Quadrant About Amdocs ● Leader in Telecom Customer Experience Systems and Services ● $3.2 billion revenue in 2012 ● 20,000 professionals ● Serving customers in more than 60 countries ● Listed on the New York Stock Exchange (DOX) Information Security Level 1 – Confidential © 2013 – Proprietary and Confidential Information of Amdocs25
  • 26. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs26 Why Amdocs Selected Horizon Mirage Many Challenges with managing & protecting laptops ● Majority of laptops offsite  more difficult to manage and protect ● Experienced many support cases and SLA expirations ● Had a backup solution that was very limited ● Challenging for remote workers – unpredictable restore, PSTs ● Backup only, no solution for Hardware refresh, image mgmt, break-fix, ● Decentralized system (20 servers) complex to manage/support ● Considered VDI, but not applicable for remote users that work ‘offline’ Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs26
  • 27. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs27 Business Benefits of Using Mirage ● Loss, theft, or damage  Restore full CVD to replacement hardware ● DRP & Business Continuity Strategy – Restore to VM on VDI ● Break-fix for helpdesk support, minimal IT time & end-user downtime ● Base image management – Compliance, provisioning, HW refresh ● OS and App layering – On-going updates, distribution to remote sites Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs27 Support category IT cost savings w/ Mirage Productivity savings w/ Mirage Hardware problems 27% 79% Software problems 40% 63% Restore (from backup) 90% 96% Settings & Configuration 60% 61% Software Install (core apps) 42% 53% Weighted Average 40% 59%
  • 28. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs28 Technical Advantages of Mirage ● Centralized architecture ● Increase in successful number of full backups from remote sites/users ● Transparent – non disruptive backups and restores ● Revert to snapshot (break-fix) preserves user data. Impact to OS and installed apps only. Plus for developers and testers. ● Right-Click Fingertip access to file version history and restore options. ● Increased confidence in PST file backup and restore ● Product Support and Engineering team – committed, available, and does what it takes to remedy any challenges Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs28
  • 29. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs29 Deployment Architecture and Stats Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs29  3 Sites • AMER – 3500 laptops • EMEA – 4000 laptops • APAC – 3000 laptops  Each site hosts • ~5 Mirage servers, F5 clustered • ~75-100 TB NAS • ~15000 IOPS per site • QoS defined over WAN links  Steady state stats • Upload per desktop – 1-2 hrs • Upload delta ~20MB (de-duped) • No impact on user experience  Centralization stats (Apr – Aug 2013) • 1000 laptops per month • Average CE per laptop ~20 hrs (5 days) • Average image size – 50GB (25 unique)
  • 30. Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs30 Success Stories ● Business Continuity ● Employee relocated from Israel to Canada. A couple of weeks after relocation, laptop drive failed. ● PC tech performed full restore of 52 GB over low bandwidth SSL VPN ● Image streamed to end user, within hours could resume work ● Full image was recovered – employee resumed from where left off ● Break-Fix ● Employee had broken Internet Explorer plugins for finance apps ● PC tech tried to manually repair IE without success ● OS restore option would not proceed either ● PC tech used Mirage “revert to snapshot” – less than 10 minutes to IT ● Without Mirage, IT would need to re-image the computer – huge effort to IT and long downtime Information Security Level 2 – Sensitive © 2013 – Proprietary and Confidential Information of Amdocs30
  • 31. 31 Where are We Heading?  Advanced bare metal provisioning and restore  Mirage DMZ Edge Gateway  Self-service App delivery and integration with license management  Multi-site, scalable management  New OS platforms: Windows 8, Windows Server, Windows Embedded  Image management for View in scale  Self service restore of PC on central VM for universal access  Central policy management for Fusion Pro
  • 32. 32 Unified Image Management View VDI Image VDI Off-Network BYOD Macs Off-Network BYOD Win Laptops BYOD Local execution In VM Central execution Efficient Remote Protocol Thin/Zero-Clients Networked Mobile Devices Networked BYOD Laptops Physical Local execution Corp Owned Laptops Power-User Workstations CAPEX Sensitive Desktops Efficient WAN Streaming & Caching Mirage Centralized Image
  • 34. 34 Other VMware Activities Related to This Session  HOL: HOL-MBL-1309 Horizon Mirage - Manage Physical Desktops  Group Discussions: EUC1000-GD; EUC1004-GD Mirage with Daniel Beveridge or Mark Ewert  Breakout Sessions: EUC5507 Vmware Mirage storage and network de-duplication demystified  EUC5587 Horizon Mirage image deployment deep dive  EUC4608 Mirage 201  EUC4815 • Demystifying VMware Mirage: tips and tricks for success
  • 36.
  • 37. Unified Endpoint Management in Scale: What’s New with Horizon Mirage Issy Ben-Shaul, VMware Hanan Stein, VMware EUC5629 #EUC5629