SlideShare a Scribd company logo
Unleashing Productivity in the New Mobile Era
Ben Goodman, VMware
Andrew Hawthorn, VMware
EUC5843
#EUC5843
2
• Purpose of this Session:
• Education / Thought Leadership
• Not a Sales Pitch
• Agenda:
• Market Snapshot
• Nirvana
• The VMware Approach
• An Example
• Your Questions
3
The Requirements We Used to Have…
Change is hard and
highly managed
Software implemented
from the center out
Difficult to adjust to
users needs
Control Through OwnershipPeople you employ
Using a network you
own to connect to…
Using software you own
on a Windows desktop
you own
An application you own,
running on a server you
own
4
What the World Wants Now…
Control & Governance are
Becoming More Challenging
Inability to track, control or
secure information assets
Can not remove access
you didn’t grant
Serious compliance concerns
Apps live in many
clouds and are easily
procured without IT
Always connected, via
3G, 4G and public or
personal wifi
Non-owned devices and
multiple non-Windows
OSs
Employees, contractors
outsourcers, partners
citizens, students
5
IT Management Processes are Not Optimized
Ownership
Devices
Connection
Apps
PAST
90%
Windows Apps2
Ethernet
IT
Owned
1
Desktop
TODAY
50%
Non-Windows Apps2
3G/4G
33%
Industry average
BYOD adoption1
10%
of Enterprises are
completely mobile
and laptop4
FUTURE
4:1
Ratio of Mobile apps to
Windows Apps3
Public/
Always On
60%
of Enterprises will
be completely
mobile and laptop4
85%
of Enterprises with
BYOD programs1
STAGE IT IS
OPTIMIZED FOR
All citations are from Gartner, Inc. and are used with permission. Specifics are included in the footnotes.
7
2013 Smartphones Global Trends
OS
In million
of units
Android 178
iOS 32
Microsoft 7
BlackBerry 6
All Others 2
TOTAL 722,4
79%
14%
3% 3%
1%
Android
iOS
Microsoft
BlackBerry
Others
Smartphones worldwide
shipment Q2 2013
Source: Gartner 2013
Market share Q2 2013
8
OS Trends – Things Change Fast
9
Android Landscape
Security
• Perception is that
Android is not secure
• Google Play is ‘wild
wild west’
• Enterprise features
(eg: MDM) weak
Fragmentation Lack of control
• No two devices are the
same in terms of
capabilities or UI
• Hard for IT to support
diverse environment
• OS upgrades are
controlled by
carrier/OEM
• Security patches not
pushed out in a timely
manner
Not much traction in enterprise segment
Widely popular in developing countries
• Lots of choice – screen size, price, capabilities, etc.
10
Android Fragmentation
11
Android in the Enterprise
 The enterprise isn’t Google’s priority
• MDM APIs 3 years behind Apple’s MDM APIs
• 3LM founded by Android team members frustrated with Google
• Motorola bought 3LM
• Google bought Motorola and got 3LM on a platter
• Google kills 3LM and lays off the team
 So OEMs starting to add Enterprise capabilities
• Samsung added SAFE MDM APIs
• LG has its own MDM APIs
• Motorola and HTC don’t have anything yet
12
iOS Landscape
Increasing support
for enterprise
features
in every hardware and
software release
Security Fragmentation
• Perception is that iOS
is more secure than
Android
• App Store is curated
• Strong enterprise
features (encryption,
MDM, etc.)
• Different screen sizes
but not capabilities so
perception is that there
is no fragmention in the
Apple world
In tune with enterprise opportunity and have great traction
Popular in North America, Western Europe and
other richer geographical pockets
• Price rules them out in many developing countries
13
But There are More Important Things Than Shipments…
14
And Android Peaked in the U.S. in 2011
15
BlackBerry Landscape
 Was good standard in enterprise market
 Missed BYOD trend completely and lost traction
 BB 10 has new functionality
• BlackBerry Balance – built in dual persona solution
• Small market share and not growing
 Loyal BB shops that didn’t already switch will
likely stay with BB
 Most customers already started switching to a
more strategic platform
• Don’t view BB as strategic anymore
• Migrating to iOS or Android or both
16
Windows Landscape
 Windows Phone and Windows 8 are still early
• Windows Phone – more consumer oriented
• Windows Tablet seems to be more enterprise friendly
and will likely get more traction that Windows
phones in 2014
 MSFT has deep pockets and will likely become
the third dominant mobile platform
• Distant third….
17
More Apps, More Devices, More Users…. No Help
What has been the impact of mobile devices on your IT helpdesk
over the last two years?
Did not add Helpdesk
staff in response to
increased workload
No increased
workload
Source: Gartner N=392
62%
19%
15%
4%
Added Helpdesk staff
Not sure
18
Common Responses Only Mask Problem
Buy a Point Solution Does not scale, increases cost
Creates a management mess
Lock It Down
Unhappy workforce
IT is viewed the “bad guy”
Ignore It Poor IT Control
Security and compliance risk
19
Mobile Management Is Evolving
USER OWNED
UNMANAGED
IT OWNED
MANAGED
Unrestricted
Personal Device
Corporate-Owned
Devices
Bring Your Own
Devices (BYOD)
Corporate-Owned
Personally Enabled (COPE)
of workers believe
their smartphones
should be enabled for
work and personal
92%Manage
Corporate
Workspace
Only
Device
Apps & Data
Corporate
Apps &
Data
20
What Is Nirvana?
Deliver the right business apps and data to
user devices in a way that is efficient and
secure for IT and productive for the end user
21
Five Steps to Address the Mobility Challenge
Manage
users, not
devices
Embrace
co-ownership
Architect for
change and
continual
improvement
Prioritize
end user
experience
Treat mobile
as a first-
class citizen
22
Manage Only What You Need To
Horizon
Secure: The workspace is completely enterprise-
owned and controlled
• Support for corporate security, compliance and
privacy policies
• Corporate data is fully encrypted
• Jailbreak and Root’ed detection
• Complete separation of personal and corporate
data
Customizable: Ability to provision, manage and
remove corporate data and applications on
employees’ devices
Productive: Key apps for employee productivity are
pre-installed (Email, Calendar, Secure Browser, Files)
Horizon Secure Mobile Workspace
23
VMware Horizon is the Platform for Workforce Mobility
Broker: Manage & secure centrally
and broker services to your
workforce by policy
Transform: Transform
desktops, diverse apps and
data into centralized services
Deliver: Empower your workforce
with flexible access across devices,
locations and connectivity
24
The Perfect End-User Experience…
Instantiate anywhere – any device, everywhere
Where possible, must be cached and offline
UI attractive and easy to use
Context aware – what I need, when I need it
25
The Perfect End-User Experience…
Launch every type of app
Access every type of data repository
Variable editing mode (Xenapp or VDI)
26
While…
Secure with on-prem deployment, remote wipe, block copy & paste
Audit for compliance, risk, security
Strong authentication
27
While…
Self-protecting – notices certain behavior, it can poison-pill itself
APIs for interconnectivity
Heavy reporting
28
Secure File Sharing
with Internal or
External Users
Centralized Access to Data,
SaaS Applications and View
Desktops
Unified Management
Platform for Managing
and Securing the
Workspace
Extensible via APIs
Policy
Engine
Entitlement
Management
AD
Integration
Reporting/Audi
t
Compliance
App
Catalog
Single Sign-
On
Corporate
Secure Workspace
Personal
Horizon Workspace At-a-Glance (Markitecture)
On ANY
Device
Secure Workspace Separating
Personal and Corporate Data
Data Containment
Remote Wipe
At-Rest Encryption
Enterprise Passcode
In-Transit
Encryption
Enterprise
Authorized
User
29
VMware Horizon Workspace Serves Both IT and End Users
Get access to a secure workspace that
contains the user’s files, apps, and
Windows desktops on any device
END USERS
Provision, populate, manage and
secure the workspace remotely
across all users and devices
IT ADMINS
30
VMware Horizon Workspace Serves Both IT and End Users
Get access to a secure workspace that
contains the user’s files, apps, and
Windows desktops on any device
END USERS
Provision, populate, manage and
secure the workspace remotely
across all users and devices
IT ADMINS
31
 Persistent and centralized identity
 Integrated with directory services (AD)
 Single sign on (SaaS, View)
 Enterprise application catalog
 Apps customized for the device platform
 Access to View desktops
 File sync and sharing
 Sync across devices
 Sharing with internal and external users
 Consistent experience across devices
 Isolation and security
What’s Inside the Workspace for End Users
Single Hub for Accessing All Business
Apps, Files and Windows Desktops
Any Device
FilesApps Desktop
Security + Policy
32
 SSL-secured portal for
accessing apps and data
on any web browser
 Desktop agents integrated
with the file directory on
Macs and Windows
Desktop
 Provide a virtualized
operating system runs a
corporate workspace that is
controlled and managed by
IT
Android
 Leverage iOS7 to create a
container of apps that is
managed and secured by
IT
iOS
Deliver a Secure Workspace on Every Device
33
VMware Horizon Workspace Serves Both IT and End Users
Get access to a secure workspace that
contains the user’s files, apps, and
Windows desktops on any device
END USERS
Provision, populate, manage and
secure the workspace remotely
across all users and devices
IT ADMINS
34
Provision, Manage and Secure the Workspace
 Provision, manage and secure the
workspace remotely
 Deliver a custom workspace with the
right services
 Gain visibility, conduct audits and
capacity planning through dashboards,
usage reports, etc.
 Future-proof/preserve existing
investment in apps and file shares
 Easily scale to support new app and
device platforms
Centralized Management Based on User’s
Policy, Identity and Context
Security + Policy
=
Service
Catalog
Policy Context
Identity
Custom Workspace
FilesApps Desktop
35
The Challenges – How Big Was the Problem?
VMware
IT
15kEmployees
28kPartners
2+Devices Per
Employee
50+Internal/
Custom Apps
15kLogins
Per Day
4+File
Repositories
80+SaaS
Apps
• Siloed access management
• Multiple file repositories lacks
agility and mobility
• Heterogeneous application portfolio
• Audit & compliance
• Weak security
• Manual provisioning
• Lack of multiple device support
• Increased license costs
• Huge support costs
Problems
36
How VMware Is Using Horizon Workspace
 Rolled out to 15,000 employees
 Production 3 weeks after GA
 VMware employees are accessing over 72
applications, 6000 virtual desktops, and 4 TB of
data through Horizon Workspace clients on iOS,
Android, Windows and Mac OS devices
Results
Benefits
 End-users have one AD password and a single
place to access, sync and share data
 Strong authentication if outside network
 Single administrative dashboard
 Single place to de-provision when employee
leaves the company
405
50
January February March April May
Oracle EBS Service Tickets
Introduction of Horizon
“Nearly 90% drop in service tickets and that’s just one of
72 applications. Each of those tickets is an average of 30
minutes of helpdesk time. That’s an annual savings of
$63k—just for one application.”
Thirumalesh Reddy-IT Deployment Manager
37
VMware Horizon Is the Platform for Workforce Mobility
Broker: Manage & secure
centrally and broker services
to your workforce by policy
300Transform: Transform
desktops, diverse apps and
data into centralized
services
Deliver: Empower your
workforce with flexible access
across devices, locations and
connectivity
38
Q&A
39
Other VMware Activities Related to This Session
 Additional Sessions:
EUC5004
Horizon Workspace at Scale
• Wednesday 11:30 Moscone West 2006
• Thursday 10:30 Moscone West 2014
 HOL:
HOL-MBL-1304
Horizon Workspace - Explore and Deploy
 Group Discussions:
EUC1005-GD
Workspace with Rasmus Jensen
THANK YOU
Unleashing Productivity in the New Mobile Era
Ben Goodman, VMware
Andrew Hawthorn, VMware
EUC5843
#EUC5843

More Related Content

What's hot

Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Dell World
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementation
Larry Covert
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Conference_by_EVRY
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
Guilherme Maia
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
Citrix
 
BYOD
BYODBYOD
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Citrix
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
Jay McLaughlin
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
C/D/H Technology Consultants
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
Northernstar
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless Experience
Citrix
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
Modis
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
Windows intune
Windows intuneWindows intune
Windows intune
Iron Cove Solutions
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
Diego Alberto Tamayo
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
k33a
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
Leena N
 
Better than BYOD: Lenovo Services & Devices Give IT 5 Ways to Win
Better than BYOD: Lenovo Services & Devices Give IT 5 Ways to WinBetter than BYOD: Lenovo Services & Devices Give IT 5 Ways to Win
Better than BYOD: Lenovo Services & Devices Give IT 5 Ways to WinLenovo Business
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Citrix
 

What's hot (20)

Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
Covert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementationCovert asae tech 13 mdm implementation
Covert asae tech 13 mdm implementation
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Gerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCMGerenciamento de dispositivos móveis com Intune e SCCM
Gerenciamento de dispositivos móveis com Intune e SCCM
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
BYOD
BYODBYOD
BYOD
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Windows intune screenshots
Windows intune screenshotsWindows intune screenshots
Windows intune screenshots
 
Windows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless ExperienceWindows Apps on Chromebooks: Deliver a Seamless Experience
Windows Apps on Chromebooks: Deliver a Seamless Experience
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Windows intune
Windows intuneWindows intune
Windows intune
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
Better than BYOD: Lenovo Services & Devices Give IT 5 Ways to Win
Better than BYOD: Lenovo Services & Devices Give IT 5 Ways to WinBetter than BYOD: Lenovo Services & Devices Give IT 5 Ways to Win
Better than BYOD: Lenovo Services & Devices Give IT 5 Ways to Win
 
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI So...
 

Viewers also liked

VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld
 
VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...
VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...
VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...
VMworld
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld
 
VMworld 2013: Getting BYOD Right
VMworld 2013: Getting BYOD Right VMworld 2013: Getting BYOD Right
VMworld 2013: Getting BYOD Right
VMworld
 
VMworld 2013: Extreme Performance Series: Storage in a Flash
VMworld 2013: Extreme Performance Series: Storage in a Flash VMworld 2013: Extreme Performance Series: Storage in a Flash
VMworld 2013: Extreme Performance Series: Storage in a Flash
VMworld
 
VMworld 2013: How to Customize Your vCenter Operations Management Deployment ...
VMworld 2013: How to Customize Your vCenter Operations Management Deployment ...VMworld 2013: How to Customize Your vCenter Operations Management Deployment ...
VMworld 2013: How to Customize Your vCenter Operations Management Deployment ...
VMworld
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld
 
VMworld 2013: Performance and Capacity Management of DRS Clusters
VMworld 2013: Performance and Capacity Management of DRS Clusters VMworld 2013: Performance and Capacity Management of DRS Clusters
VMworld 2013: Performance and Capacity Management of DRS Clusters
VMworld
 
VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld
 
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
VMworld
 
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
VMworld
 
VMworld 2013: vSphere Web Client - Technical Walkthrough
VMworld 2013: vSphere Web Client - Technical WalkthroughVMworld 2013: vSphere Web Client - Technical Walkthrough
VMworld 2013: vSphere Web Client - Technical Walkthrough
VMworld
 
VMworld 2013: Socialcast: Accelerate Innovation, Improve Collaboration, and A...
VMworld 2013: Socialcast: Accelerate Innovation, Improve Collaboration, and A...VMworld 2013: Socialcast: Accelerate Innovation, Improve Collaboration, and A...
VMworld 2013: Socialcast: Accelerate Innovation, Improve Collaboration, and A...
VMworld
 
VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld
 
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld
 
VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack
VMworld
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld
 
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the HoodVMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
VMworld
 
Journée ASIT VD 2014 - session 2
Journée ASIT VD 2014 - session 2Journée ASIT VD 2014 - session 2

Viewers also liked (20)

VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
 
VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...
VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...
VMworld 2013: How to Troubleshoot VM Performance Issues Across Applications, ...
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
 
VMworld 2013: Getting BYOD Right
VMworld 2013: Getting BYOD Right VMworld 2013: Getting BYOD Right
VMworld 2013: Getting BYOD Right
 
VMworld 2013: Extreme Performance Series: Storage in a Flash
VMworld 2013: Extreme Performance Series: Storage in a Flash VMworld 2013: Extreme Performance Series: Storage in a Flash
VMworld 2013: Extreme Performance Series: Storage in a Flash
 
VMworld 2013: How to Customize Your vCenter Operations Management Deployment ...
VMworld 2013: How to Customize Your vCenter Operations Management Deployment ...VMworld 2013: How to Customize Your vCenter Operations Management Deployment ...
VMworld 2013: How to Customize Your vCenter Operations Management Deployment ...
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
VMworld 2013: Performance and Capacity Management of DRS Clusters
VMworld 2013: Performance and Capacity Management of DRS Clusters VMworld 2013: Performance and Capacity Management of DRS Clusters
VMworld 2013: Performance and Capacity Management of DRS Clusters
 
VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2013: Virtualized Network Services Model with VMware NSX
 
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
VMworld 2013: Low-Cost, High-Performance Storage for VMware Horizon Desktops
 
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
VMworld 2013: Troubleshooting VXLAN and Network Services in a Virtualized Env...
 
VMworld 2013: vSphere Web Client - Technical Walkthrough
VMworld 2013: vSphere Web Client - Technical WalkthroughVMworld 2013: vSphere Web Client - Technical Walkthrough
VMworld 2013: vSphere Web Client - Technical Walkthrough
 
VMworld 2013: Socialcast: Accelerate Innovation, Improve Collaboration, and A...
VMworld 2013: Socialcast: Accelerate Innovation, Improve Collaboration, and A...VMworld 2013: Socialcast: Accelerate Innovation, Improve Collaboration, and A...
VMworld 2013: Socialcast: Accelerate Innovation, Improve Collaboration, and A...
 
VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization VMworld 2013: Deploying VMware NSX Network Virtualization
VMworld 2013: Deploying VMware NSX Network Virtualization
 
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
VMworld 2013: Deploying vSphere with OpenStack: What It Means to Your Cloud E...
 
VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack VMworld 2013: VMware NSX Integration with OpenStack
VMworld 2013: VMware NSX Integration with OpenStack
 
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Operational Best Practices for NSX in VMware Environments
 
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the HoodVMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
 
Journée ASIT VD 2014 - session 2
Journée ASIT VD 2014 - session 2Journée ASIT VD 2014 - session 2
Journée ASIT VD 2014 - session 2
 

Similar to VMworld 2013: Unleashing Productivity in the New Mobile Era

MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013Ashish Jain
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
solarisyourep
 
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual WorkspaceVMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
Jürgen Ambrosi
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Nordic Infrastructure Conference
 
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Heidi Hoff
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
MobileWorxs
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
Jürgen Ambrosi
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
MobileWorxs
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
Dell EMC World
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
Withum
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile SecurityArrow ECS UK
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on IT
CloudIDSummit
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
Waterstons Ltd
 
AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...
Peter Daalmans
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
Blueboxer2014
 

Similar to VMworld 2013: Unleashing Productivity in the New Mobile Era (20)

MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual WorkspaceVMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
VMworld 2013: Directions in VMware EUC & the Multi-Device, Virtual Workspace
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
Wally Mead - Managing mobile devices with system center 2012 r2 configuration...
 
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
Remote Work Readiness Part 1: VDI and Remote Desktop Services (RDS)
 
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
Secure Android Mobile Device: SOTI MobiControl and Android Plus technology
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Webinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft CloudWebinar: Securing Remote Workforce on the Microsoft Cloud
Webinar: Securing Remote Workforce on the Microsoft Cloud
 
Symantec Mobile Security
Symantec Mobile SecuritySymantec Mobile Security
Symantec Mobile Security
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
CIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on ITCIS13: Impact of Mobile Computing on IT
CIS13: Impact of Mobile Computing on IT
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...AppManagEvent: Application deployment across several devices with ConfigMgr 2...
AppManagEvent: Application deployment across several devices with ConfigMgr 2...
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 

More from VMworld

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
VMworld
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
VMworld
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
VMworld
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations!
VMworld
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6
VMworld
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
VMworld
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SAN
VMworld
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld
 

More from VMworld (20)

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep Dive
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep Dive
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations!
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts Panel
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way!
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SAN
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 

VMworld 2013: Unleashing Productivity in the New Mobile Era

  • 1. Unleashing Productivity in the New Mobile Era Ben Goodman, VMware Andrew Hawthorn, VMware EUC5843 #EUC5843
  • 2. 2 • Purpose of this Session: • Education / Thought Leadership • Not a Sales Pitch • Agenda: • Market Snapshot • Nirvana • The VMware Approach • An Example • Your Questions
  • 3. 3 The Requirements We Used to Have… Change is hard and highly managed Software implemented from the center out Difficult to adjust to users needs Control Through OwnershipPeople you employ Using a network you own to connect to… Using software you own on a Windows desktop you own An application you own, running on a server you own
  • 4. 4 What the World Wants Now… Control & Governance are Becoming More Challenging Inability to track, control or secure information assets Can not remove access you didn’t grant Serious compliance concerns Apps live in many clouds and are easily procured without IT Always connected, via 3G, 4G and public or personal wifi Non-owned devices and multiple non-Windows OSs Employees, contractors outsourcers, partners citizens, students
  • 5. 5 IT Management Processes are Not Optimized Ownership Devices Connection Apps PAST 90% Windows Apps2 Ethernet IT Owned 1 Desktop TODAY 50% Non-Windows Apps2 3G/4G 33% Industry average BYOD adoption1 10% of Enterprises are completely mobile and laptop4 FUTURE 4:1 Ratio of Mobile apps to Windows Apps3 Public/ Always On 60% of Enterprises will be completely mobile and laptop4 85% of Enterprises with BYOD programs1 STAGE IT IS OPTIMIZED FOR All citations are from Gartner, Inc. and are used with permission. Specifics are included in the footnotes.
  • 6. 7 2013 Smartphones Global Trends OS In million of units Android 178 iOS 32 Microsoft 7 BlackBerry 6 All Others 2 TOTAL 722,4 79% 14% 3% 3% 1% Android iOS Microsoft BlackBerry Others Smartphones worldwide shipment Q2 2013 Source: Gartner 2013 Market share Q2 2013
  • 7. 8 OS Trends – Things Change Fast
  • 8. 9 Android Landscape Security • Perception is that Android is not secure • Google Play is ‘wild wild west’ • Enterprise features (eg: MDM) weak Fragmentation Lack of control • No two devices are the same in terms of capabilities or UI • Hard for IT to support diverse environment • OS upgrades are controlled by carrier/OEM • Security patches not pushed out in a timely manner Not much traction in enterprise segment Widely popular in developing countries • Lots of choice – screen size, price, capabilities, etc.
  • 10. 11 Android in the Enterprise  The enterprise isn’t Google’s priority • MDM APIs 3 years behind Apple’s MDM APIs • 3LM founded by Android team members frustrated with Google • Motorola bought 3LM • Google bought Motorola and got 3LM on a platter • Google kills 3LM and lays off the team  So OEMs starting to add Enterprise capabilities • Samsung added SAFE MDM APIs • LG has its own MDM APIs • Motorola and HTC don’t have anything yet
  • 11. 12 iOS Landscape Increasing support for enterprise features in every hardware and software release Security Fragmentation • Perception is that iOS is more secure than Android • App Store is curated • Strong enterprise features (encryption, MDM, etc.) • Different screen sizes but not capabilities so perception is that there is no fragmention in the Apple world In tune with enterprise opportunity and have great traction Popular in North America, Western Europe and other richer geographical pockets • Price rules them out in many developing countries
  • 12. 13 But There are More Important Things Than Shipments…
  • 13. 14 And Android Peaked in the U.S. in 2011
  • 14. 15 BlackBerry Landscape  Was good standard in enterprise market  Missed BYOD trend completely and lost traction  BB 10 has new functionality • BlackBerry Balance – built in dual persona solution • Small market share and not growing  Loyal BB shops that didn’t already switch will likely stay with BB  Most customers already started switching to a more strategic platform • Don’t view BB as strategic anymore • Migrating to iOS or Android or both
  • 15. 16 Windows Landscape  Windows Phone and Windows 8 are still early • Windows Phone – more consumer oriented • Windows Tablet seems to be more enterprise friendly and will likely get more traction that Windows phones in 2014  MSFT has deep pockets and will likely become the third dominant mobile platform • Distant third….
  • 16. 17 More Apps, More Devices, More Users…. No Help What has been the impact of mobile devices on your IT helpdesk over the last two years? Did not add Helpdesk staff in response to increased workload No increased workload Source: Gartner N=392 62% 19% 15% 4% Added Helpdesk staff Not sure
  • 17. 18 Common Responses Only Mask Problem Buy a Point Solution Does not scale, increases cost Creates a management mess Lock It Down Unhappy workforce IT is viewed the “bad guy” Ignore It Poor IT Control Security and compliance risk
  • 18. 19 Mobile Management Is Evolving USER OWNED UNMANAGED IT OWNED MANAGED Unrestricted Personal Device Corporate-Owned Devices Bring Your Own Devices (BYOD) Corporate-Owned Personally Enabled (COPE) of workers believe their smartphones should be enabled for work and personal 92%Manage Corporate Workspace Only Device Apps & Data Corporate Apps & Data
  • 19. 20 What Is Nirvana? Deliver the right business apps and data to user devices in a way that is efficient and secure for IT and productive for the end user
  • 20. 21 Five Steps to Address the Mobility Challenge Manage users, not devices Embrace co-ownership Architect for change and continual improvement Prioritize end user experience Treat mobile as a first- class citizen
  • 21. 22 Manage Only What You Need To Horizon Secure: The workspace is completely enterprise- owned and controlled • Support for corporate security, compliance and privacy policies • Corporate data is fully encrypted • Jailbreak and Root’ed detection • Complete separation of personal and corporate data Customizable: Ability to provision, manage and remove corporate data and applications on employees’ devices Productive: Key apps for employee productivity are pre-installed (Email, Calendar, Secure Browser, Files) Horizon Secure Mobile Workspace
  • 22. 23 VMware Horizon is the Platform for Workforce Mobility Broker: Manage & secure centrally and broker services to your workforce by policy Transform: Transform desktops, diverse apps and data into centralized services Deliver: Empower your workforce with flexible access across devices, locations and connectivity
  • 23. 24 The Perfect End-User Experience… Instantiate anywhere – any device, everywhere Where possible, must be cached and offline UI attractive and easy to use Context aware – what I need, when I need it
  • 24. 25 The Perfect End-User Experience… Launch every type of app Access every type of data repository Variable editing mode (Xenapp or VDI)
  • 25. 26 While… Secure with on-prem deployment, remote wipe, block copy & paste Audit for compliance, risk, security Strong authentication
  • 26. 27 While… Self-protecting – notices certain behavior, it can poison-pill itself APIs for interconnectivity Heavy reporting
  • 27. 28 Secure File Sharing with Internal or External Users Centralized Access to Data, SaaS Applications and View Desktops Unified Management Platform for Managing and Securing the Workspace Extensible via APIs Policy Engine Entitlement Management AD Integration Reporting/Audi t Compliance App Catalog Single Sign- On Corporate Secure Workspace Personal Horizon Workspace At-a-Glance (Markitecture) On ANY Device Secure Workspace Separating Personal and Corporate Data Data Containment Remote Wipe At-Rest Encryption Enterprise Passcode In-Transit Encryption Enterprise Authorized User
  • 28. 29 VMware Horizon Workspace Serves Both IT and End Users Get access to a secure workspace that contains the user’s files, apps, and Windows desktops on any device END USERS Provision, populate, manage and secure the workspace remotely across all users and devices IT ADMINS
  • 29. 30 VMware Horizon Workspace Serves Both IT and End Users Get access to a secure workspace that contains the user’s files, apps, and Windows desktops on any device END USERS Provision, populate, manage and secure the workspace remotely across all users and devices IT ADMINS
  • 30. 31  Persistent and centralized identity  Integrated with directory services (AD)  Single sign on (SaaS, View)  Enterprise application catalog  Apps customized for the device platform  Access to View desktops  File sync and sharing  Sync across devices  Sharing with internal and external users  Consistent experience across devices  Isolation and security What’s Inside the Workspace for End Users Single Hub for Accessing All Business Apps, Files and Windows Desktops Any Device FilesApps Desktop Security + Policy
  • 31. 32  SSL-secured portal for accessing apps and data on any web browser  Desktop agents integrated with the file directory on Macs and Windows Desktop  Provide a virtualized operating system runs a corporate workspace that is controlled and managed by IT Android  Leverage iOS7 to create a container of apps that is managed and secured by IT iOS Deliver a Secure Workspace on Every Device
  • 32. 33 VMware Horizon Workspace Serves Both IT and End Users Get access to a secure workspace that contains the user’s files, apps, and Windows desktops on any device END USERS Provision, populate, manage and secure the workspace remotely across all users and devices IT ADMINS
  • 33. 34 Provision, Manage and Secure the Workspace  Provision, manage and secure the workspace remotely  Deliver a custom workspace with the right services  Gain visibility, conduct audits and capacity planning through dashboards, usage reports, etc.  Future-proof/preserve existing investment in apps and file shares  Easily scale to support new app and device platforms Centralized Management Based on User’s Policy, Identity and Context Security + Policy = Service Catalog Policy Context Identity Custom Workspace FilesApps Desktop
  • 34. 35 The Challenges – How Big Was the Problem? VMware IT 15kEmployees 28kPartners 2+Devices Per Employee 50+Internal/ Custom Apps 15kLogins Per Day 4+File Repositories 80+SaaS Apps • Siloed access management • Multiple file repositories lacks agility and mobility • Heterogeneous application portfolio • Audit & compliance • Weak security • Manual provisioning • Lack of multiple device support • Increased license costs • Huge support costs Problems
  • 35. 36 How VMware Is Using Horizon Workspace  Rolled out to 15,000 employees  Production 3 weeks after GA  VMware employees are accessing over 72 applications, 6000 virtual desktops, and 4 TB of data through Horizon Workspace clients on iOS, Android, Windows and Mac OS devices Results Benefits  End-users have one AD password and a single place to access, sync and share data  Strong authentication if outside network  Single administrative dashboard  Single place to de-provision when employee leaves the company 405 50 January February March April May Oracle EBS Service Tickets Introduction of Horizon “Nearly 90% drop in service tickets and that’s just one of 72 applications. Each of those tickets is an average of 30 minutes of helpdesk time. That’s an annual savings of $63k—just for one application.” Thirumalesh Reddy-IT Deployment Manager
  • 36. 37 VMware Horizon Is the Platform for Workforce Mobility Broker: Manage & secure centrally and broker services to your workforce by policy 300Transform: Transform desktops, diverse apps and data into centralized services Deliver: Empower your workforce with flexible access across devices, locations and connectivity
  • 38. 39 Other VMware Activities Related to This Session  Additional Sessions: EUC5004 Horizon Workspace at Scale • Wednesday 11:30 Moscone West 2006 • Thursday 10:30 Moscone West 2014  HOL: HOL-MBL-1304 Horizon Workspace - Explore and Deploy  Group Discussions: EUC1005-GD Workspace with Rasmus Jensen
  • 40.
  • 41. Unleashing Productivity in the New Mobile Era Ben Goodman, VMware Andrew Hawthorn, VMware EUC5843 #EUC5843