Delivering Cloud-based Services in a Bring-Your-Own Environment
|
|
- Eustace Nicholson
- 2 years ago
- Views:
Transcription
1 White Paper Intel IT IT Best Practices Cloud Computing and IT Consumerization June 2012 Delivering Cloud-based Services in a Bring-Your-Own Environment Executive Overview By taking advantage of the unique strengths associated with client devices and the cloud, we are systematically building a private enterprise cloud that can determine device attributes and user preferences, and tailor services accordingly. Dave Buchholz Principal Engineer, Intel IT As Intel IT builds cloud infrastructure and enables cloud services, one of the goals is to make those services available to as broad a range of devices as possible. Therefore, we are integrating our cloud computing efforts with our bring-your-own device initiatives, enabling Intel to obtain the maximum business value from both. Several years ago, we determined that addressing the consumerization of IT head-on by formalizing implementation could actually improve enterprise security by eliminating unsecured, unmanaged use of personal devices. With that realization in mind, we are actively integrating employee-owned devices including smartphones, tablets, and PCs into our enterprise environment. We have also been building Intel s enterprise private cloud, and now deliver 80 percent of our enterprise services through that cloud. We plan to increasingly use a mix of private and public cloud-based services, called hybrid cloud. Today, we are implementing foundational capabilities that will eventually create a two-way awareness between cloud and client. We are adapting our communications infrastructure, service delivery model, and application development processes to support a client-aware cloud and cloud-aware clients. To manage, protect, and deliver cloudbased services to a broad range of devices, we have significantly revised our information security model, mobile device management practices, and personal workspace portability capabilities. We provide information about device features and services to employees, which helps guide them in selecting a device that will help them be as productive as possible and have an optimal user experience. We are implementing a data and application virtualization framework that enables us to assemble existing enterprise data and application capabilities and quickly integrate them with new capabilities. By taking advantage of the unique strengths associated with client devices and the cloud, we are systematically building a private enterprise cloud that can determine device attributes and user preferences, and tailor services accordingly. Ed Goldman IT Chief Technology Officer, Intel IT Dennis Morgan Senior Security Strategist, Intel IT Chris Peters Industry Engagement Manager, Intel IT
2 White Paper Delivering Cloud-based Services in a Bring-Your-Own Environment Contents Executive Overview... 1 Background... 2 Solution... 2 Communications Infrastructure Changes... 3 Service Delivery Changes... 4 Application Development Changes... 7 Conclusion... 7 For More Information... 7 Acronyms... 8 The program connects IT professionals around the world with their peers inside our organization sharing lessons learned, methods and strategies. Our goal is simple: Share Intel IT best practices that create business value and make IT a competitive advantage. Visit us today at or contact your local Intel representative if you d like to learn more. Background Intel employees want to be able to use a broad range of companion devices, including personally owned smartphones and tablets, with their Intel-supplied mobile business PCs. They also want to be able to use their personally owned Macs* and PCs. We determined that addressing the consumerization of IT head-on by formalizing implementation could actually improve enterprise security, helping to eliminate unsecured and unmanaged use of personal devices. Intel IT is actively integrating employee-owned devices into our enterprise environment. In early 2010, about 3,000 Intel employees were using personally owned smartphones; by the end of June 2012, this number had increased to 19,000. Also in 2011 some employees began using their personal Apple* computers, and this year we are expanding our bring-your-own-device (BYOD) initiative to include PCs. We are transitioning from the traditional client computing model of a limited number of device types under tight and direct IT control to a future compute continuum model that focuses on a seamless, consistent experience across devices. We see great business value in allowing employees more choice in the devices they can use at work. At the same time, we realized we need to protect Intel information security by maintaining control of the underlying communication infrastructure that supports those devices. There are parallels and interdependencies between IT consumerization, which provides employees with a wider range of choices for compute capability, and the advent of cloud computing, which offers businesses additional options for IT services. At Intel, we have built an extensive private enterprise cloud, and we now deliver 80 percent of our enterprise services through that cloud. We plan to continue moving toward a mix of private and public cloud services, called a hybrid cloud. As we continue to build cloud infrastructure and enable cloud services and applications, it is important that we consider our BYOD initiatives at the same time. This integrated approach will enable Intel to obtain the maximum business value from both BYOD and cloud computing. Solution We have found that the key to delivering cloud-based services to a wide variety of devices, including BYO devices, is to create a two-way awareness between the cloud and the client. Not all client devices have the same capabilities, and the cloud is not always available to a client device. Therefore, a one-size-fits-all service delivery model is not appropriate. A misalignment between the delivery model and the device could negatively affect employee productivity and business functionality, introduce security risk, and invalidate the investment made in developing cloudbased services and applications. By taking advantage of the unique strengths associated with the device and the cloud, we are systematically building a private enterprise cloud that can determine device attributes and user preferences, and tailor services accordingly. Although it will take several years to complete our efforts, we are already working to establish the necessary foundational capabilities over the next few months. 2
3 Delivering Cloud-based Services in a Bring-Your-Own Environment White Paper As illustrated in Figure 1, our intelligent, client-aware cloud will be able to determine the following: Whether an application provides the best user experience if executed locally or remotely Which native features, such as a locationbased service provided by the Global Positioning System or accelerometer, are available on a device How to use predefined user and device profiles to customize services to user preferences and the device s security access level Conversely, we are also establishing foundational capabilities to enable cloudaware client devices. For example, a client device will be able to determine the following: Whether the cloud is available What services are available to the client device at the time Its security level and available bandwidth For example, if the cloud is available, the device stores a document in a cloud-based document repository. But, if the cloud isn t available, the device stores the document locally and possibly automatically uploads the document to the cloud when it becomes possible. Cloud-aware devices can also offload work from the cloud that might be more efficiently done on the device, helping to enhance the quality of service for end users. This type of work might include image and video processing, data compression, and 2D and 3D graphics. The 3rd generation Intel Core processor family with Intel Turbo Boost Technology 2.0 and next-generation graphics facilitate local execution on the device. Taking advantage of local resources in this manner helps reduce both the data center workload and the associated network traffic. We are currently conducting several proofs of concept to evaluate these types of technologies and to establish enterprise usage models. Implementing a client-aware cloud and cloud-aware devices requires changes to the communications infrastructure, service delivery model, and application development processes. Communications Infrastructure Changes Providing cloud-based services to multiple devices and OSs requires several modifications to our communications infrastructure, such as additional firewall controls. These adjustments are necessary because each OS has different security features, and some are more secure than others. To support a broad range of personally owned devices, we are building a communications infrastructure that uses a flexible combination of delivery methods, including workspace and application containers, application and desktop virtualization, remote display technology, HTML5, and web portals, to deliver services to a wide variety of form factors, including PCs, Macs, tablets, and smartphones. To manage, protect, and deliver this flexibility we have made significant enhancements and adjustments to our information security model, mobile device management practices, and personal workspace portability capabilities. Current Status: Bandwidth Processing Power Graphics Capabilities Security Current Status: Bandwidth Processing Power Graphics Capabilities Security Compute remotely Play high-definition (HD) video Medium-security access Current Status: Bandwidth Processing Power Graphics Capabilities Security Compute remotely Play non-hd video Low-security access Cloud Compute locally Play HD video Secure access Cloud-aware Client Client-aware Cloud Figure 1. We are laying the foundation for a bidirectional awareness between the cloud and a client device that will enhance service delivery, user experience, and productivity. 3
4 White Paper Delivering Cloud-based Services in a Bring-Your-Own Environment Information security model We have found that security is of paramount importance in being able to fully embrace cloud computing and BYOD, and to seamlessly deliver services to a broad range of devices. We have radically redesigned our security architecture to enable different degrees of access. Our new security model is based on four pillars. Identity and access management. Intel IT has created a unique integrated trust calculation technology that enables us to support devices with differing levels of security. The system dynamically adjusts users access privileges as their level of risk changes. For example, employees have less access to corporate information from personal smartphones than from corporate laptops. Security business intelligence. As we allow access to enterprise services from more devices, we need improved detection, monitoring, and analysis capabilities. We deployed a dashboard that provides detailed information about infected clients and servers, boosting our ability to intervene quickly and accurately. We also plan to add a predictive engine that will help improve our ability to respond to threats. Data protection. We are implementing technologies that protect data when it is created, stored, and in transit. We expanded the deployment of enterprise rights management software to nearly 20,000 employees, and we implemented data loss prevention technology to better track sensitive data as it moves through Intel. Infrastructure. We implemented secure trust zones within our enterprise private cloud that enable us to virtualize internally and externally facing applications with higher security requirements. As a result, we reduced malware incidents by 30 percent, despite a 50-percent increase in the number of malware detections in Device Management A mobile device management (MDM) solution provides several important benefits with regard to BYOD. By controlling and protecting the data and configuration settings for all mobile devices in the network, MDM helps reduce support costs and business risks, helping to enable the secure delivery of at least a limited set of services. The main functions of an MDM solution are deploying software, including patch deployment and configuration management, enabling remote troubleshooting, and providing the ability to remotely lock and wipe a device. MDM solutions also provide a cost-effective and efficient method for system maintenance, such as the ability to replace a corrupted or failed image with a working image. For example, at the beginning of a training session, an instructor can verify that all the classroom devices are functional and, if necessary, can quickly re-install the image on any nonfunctioning devices. However, because our current MDM solution works only for devices that run mobile OSs and we must use a separate corporate management system for PCs, MDM does not resolve all of Intel s remote device management problems. For example, our MDM remote wipe capability doesn t work on larger form factors such as PCs. For this reason, we currently consider personally owned PCs to be at a lower trust level than some mobile devices, such as tablets and smartphones, unless the device s owner decides to opt in to corporate management capabilities. Workspace Mobility Supporting BYOD devices raises challenges about how to make data available regardless of the user s location whether at work, at home, or traveling and how to deliver a consistent workspace across a user s many devices, whether accessing cloud services or locally installed applications. To support a more portable workspace, we are moving away from our traditional model of locally installed applications to exploring how we can deliver more modular services to many different devices. One approach we have investigated is to separate the layers of the traditional tightly coupled solutions stack, a technique IT architects refer to as abstraction. By using virtualization to divide the platform, OS, application, user data, and user profile layers into separate services, we can set rules individually on each abstracted layer of the service. Using abstraction we can determine whether, based on the type of device, user location, or other criteria, it s appropriate to deliver an optimal service to a particular device. For example, smartphones can access contact lists, calendars, and services only; for tablets, we are investigating the feasibility of delivering an expanded set of businessto-business collaboration tools, such as note-taking and archiving services, instant video collaboration, and instant meetings. Workspace mobility also raises the issue of how to synchronize cloud-based and local data. We are currently exploring how content synchronization may affect backup-andrestore processes. Service Delivery Changes Because our goal is to enable cloud-based services that take advantage of features on employees devices, we need to act as a trusted advisor, providing employees information about a device, whether it s a smartphone, tablet, or PC. We encourage employees to consider how they want to work and where they want to work with each device. We then help them choose the device and OS that is best suited for their situation, helping them to be as productive as possible and to have an optimal user experience. 4
5 Delivering Cloud-based Services in a Bring-Your-Own Environment White Paper Employees can choose among many different devices with varying levels of capabilities. The availability of a diversity of user interfaces and screen sizes affects device and application interaction. Some devices do not have the features necessary to meet the minimum security configuration for even the lowest level of confidential data classification. Other devices can access certain data and services, but not others. A small subset of devices can access corporate data and services, with restriction. With those factors in mind, it isn t possible to deliver a one-size-fits-all service delivery model that delivers the same set of services to every personally owned device. Nor is it practical to support every possible compute model and OS. For example, we limit our mobile device support to five mobile OSs; for BYOD computers, we currently support Macs* and plan to support Microsoft Windows*- based systems in 2012, but we do not plan to support Linux*-based systems. To educate employees about which devices can access which enterprise services and which devices and OSs are best for certain work scenarios, we have created a web portal that provides a wide variety of information to employees enrolling in our BYOD programs. Bring Your Own Phone Table 1 shows a part of our web site that compares smartphone features, helping employees choose the best device for their situation. For example, if an employee s job requires good access to cloud-based business and Internet applications, as well as Wi-Fi* access and access to the Intel intranet, the chart indicates that a smartphone with OS #5 is the best choice. On the other hand, if an employee needs only calendar and contact information, any of the supported smartphones is adequate. Table 1. Intel Employees Can Use the Information on Our Handheld Services Web Portal to Compare Smartphone Features Feature OS 1 OS 2 OS 3 OS 4 OS 5 a a a Additional security software may be required, depending on the supported device Calendar a a a a a Contacts a a a a a Global Positioning System (GPS) a a a a Wi-Fi* Allows you to connect to your home network or public Wi-Fi in airport or coffeeshop, and other areas Varies Varies Varies a a Internet Usability Good Varies Varies Best Best Internet Applications Examples: mapping applications, currency converters, and so on Good Good Good Better Best Intel Intranet Availability Some Available r r r Some Available Business Application Availability Examples: Instant messaging, bridge speed dialer, and so on Battery Life Standby or talk Global Roaming Capability More Available Some Available Some Available Less Available Some Available Best Good Good Good Good Varies by Rate Plan Tethering Connect your phone to your laptop and use the phone as a modem to connect to the Internet (like a wireless data card). Performance varies by phone model and service provider network speed aavailable; r unavailable a Varies by Country or Service Provider 5
6 White Paper Delivering Cloud-based Services in a Bring-Your-Own Environment Bring Your Own Computer If an employee uses a corporate PC, they can expect certain capabilities, such as offline access to data, network connectivity, the ability to store Intel data on the PC, and disk encryption software and management agent software installed on the device. In certain situations, employees prefer to use their own Mac or PC, in which case, there are several options and a considerable number of tradeoffs for the employee to consider. The Participant Usage Model Matrix shown in Table 2 shows how we encourage employees participating in the BYO Mac and PC programs to think about how they will use a device so they can choose the best solution for their work environment. For example, using the chart, an employee who travels frequently and needs to store Intel data on the device can determine that the best choice is either the Intel build or client-hosted virtualization using a Type 2 hypervisor on a personally owned PC. For employees who work mostly onsite and simply need a companion device to quickly access standard applications, a personally owned tablet is sufficient. Table 2. Participant Usage Model Matrix Best Use Case Scenario Works well for those enrolling in both bringyour-own Primary and Companion Tablet I travel a lot and may have low bandwidth connections I usually work on-campus or at home with a broadband connection I frequently use rich media applications at work (video calls, 3D graphics, web-based training) Server-Hosted Virtualization Virtual Application Suite Browser-based Connection to Intel Intel Corporate Layer Installation Special Build on Your PC Server-Hosted Virtualization Desktop in the Cloud Server-hosted Virtual Windows* 7 Desktop Client-Hosted Virtualization Type 2 Hypervisor Local Application on Your PC Secondary Companion Tablet Primary Windows PC Primary Windows PC Primary Windows PC Access to common applications, executed full screen Ability to copy and paste among virtualized applications Use standard applications and require high-speed performance Need a customizable desktop but don t want the Intel build Want to participate in both Companion Tablet and Primary programs a r a r Good Best Not Recommended Better Better Best Better Good Not Recommended Offline Access r a r a Network Connectivity Onsite: Employee hotspot Off-site: Your own broadband service Onsite: Direct connection to Intel network Off-site: Your own broadband service and VPN Onsite: Employee hotspot Off-site: Your own broadband service Intel Data on Device r a r a Disk Encryption Software Installed on Device Management Agent Software Installed on Device Pluses r a r r Yes. If you regularly access and manipulate IRS data, a specific mobile device management (MDM) solution must be installed Need quick access to applications and occasional use Yes. a specific MDM solution must be installed Similar to the standard PC offerings today, but it s your own PC and has the fastest network speed Minuses Only standard applications available Some IT applications installed on your PC aavailable; r unavailable r Not a lot of IT overhead on the PC. Nothing installed on the PC Application performance can be slow Don t want the Intel build but want the ability to access Intel data and applications when not connected to the Internet Onsite: Employee hotspot Off-site: Your own broadband service and VPN r Your PC build remains intact, and the Intel environment runs as its own application on your system Large hard-drive space requirement 6
7 Delivering Cloud-based Services in a Bring-Your-Own Environment White Paper Application Development Changes As more cloud-based software-as-a-service solutions solve more of our business problems, multiple vertical solutions could tend to fragment our core business data. To prevent this from happening, we are implementing a data and application virtualization framework that allows us to decouple our enterprise applications that follow more traditional software development methodology from many of our newer capabilities that demand a faster pace. This allows us to create assemble-to-order, cloudbased solutions by combining the capabilities of existing enterprise data and applications and integrating them with new capabilities. The popularity of consumerization continues apace, with one in every four Intel employees now using smartphones. We are using the new virtualization framework to provide a broader set of business applications specifically designed to work well on mobile devices with small screens and limited features. About 28 applications are in the development pipeline, and seven applications are already in production: onsite navigation, corporate portal, shuttle and conference room scheduling, a speed dialer for dialing in to bridges, and collaboration and sales force productivity tools. The new assemble-to-order application virtualization framework enabled us to deliver six of those seven applications to several mobile OSs in just a few weeks by re-assembling all business, data, and security services into an HTML5 solution. Conclusion There are parallels and interdependencies between IT consumerization, which provides employees with a wider range of choices for compute capability, and the advent of cloud computing, which offers businesses additional options for IT services. Intel IT is coordinating our cloud computing efforts with our BYOD initiatives, to enable Intel to reap maximum business value from both. The availability of a diversity of user interfaces and screen sizes impacts device and application interaction, because not all devices have the same security features and performance capabilities. Therefore, we are moving away from a one-size-fitsall approach to developing and delivering cloud-based services. Instead, we are building foundational capabilities to enable a clientaware cloud as well as cloud-aware clients. A client-aware cloud will be able to tailor services to the security level and performance capabilities of a particular device in a particular context, considering location, type of use, and other criteria. Conversely, cloud-aware client devices will be able to determine if the cloud is available and other information, such as how much bandwidth is available, and tailor client activity accordingly. To bring this vision to reality, we are adapting our communications infrastructure, including redesigning our information security model, improving our mobile device management practices, and enhancing personal workspace portability capabilities. We also act as a trusted advisor, guiding Intel employees in their selection of a BYOD, helping them to select a device that will be able to best consume cloud-based services and enhance their productivity. We are using a new virtualization framework to provide a broader set of business applications specifically designed to work well on mobile devices with small screens and limited features. In these ways, we are systematically building a private enterprise cloud that can determine device attributes and user preferences and optimally deliver services to a broad range of devices including BYO devices. For More Information Visit to find white papers on related topics: Best Practices for Enabling Employeeowned Smartphones in the Enterprise Enabling Emerging Enterprise Usages with Client-Aware Technologies The Future of Enterprise Computing: Preparing for the Compute Continuum Improving Security and Mobility for Personally-Owned Devices Pre-Evaluating Small Devices for Use in the Enterprise Why the Device Matters in a Cloudcentric World For more information on Intel IT best practices, visit 7
8 Acronyms BYOD bring your own device MDM mobile device management This paper is for informational purposes only. THIS DOCUMENT IS PROVIDED AS IS WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Intel disclaims all liability, including liability for infringement of any proprietary rights, relating to use of information in this specification. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted herein. Intel, the Intel logo, and Intel Core are trademarks of Intel Corporation in the U.S. and other countries. * Other names and brands may be claimed as the property of others. Copyright 2013 Intel Corporation. All rights reserved. Printed in USA Please Recycle 0612/JGLU/KC/PDF US
Enabling Device-Independent Mobility with Dynamic Virtual Clients
IT@Intel White Paper Intel Information Technology Mobility November 2009 Enabling Device-Independent Mobility with Dynamic Virtual Clients Executive Overview DIM would enable us to deliver the information
Building a Mobile Application Development Framework
IT@Intel White Paper Intel IT IT Best Practices Cloud Computing and Compute Continuum August 2012 Building a Mobile Application Development Framework Executive Overview With our framework, Intel s development
IT@Intel. Developing an Enterprise Client Virtualization Strategy
White Paper Intel Information Technology Computer Manufacturing Client Virtualization Developing an Enterprise Client Virtualization Strategy Intel IT is investigating virtualization because it has the
Deploying an Enterprise-Ready Content Sync-and-Share Solution
Intel IT Content Sync-and-Share Solutions September 2013 Deploying an Enterprise-Ready Content Sync-and-Share Solution Executive Overview Intel IT is deploying an enterprise-ready content sync-and-share
Evaluating Thin-Client Security in a Changing Threat Landscape
IT@Intel White Paper Intel Information Technology Business Solutions April 2010 Evaluating Thin-Client Security in a Changing Threat Landscape Executive Overview Equivalent security controls can be, and
IT@Intel. Virtualizing the Client PC: A Proof of Concept. White Paper Intel Information Technology Computer Manufacturing Client Virtualization
White Paper Intel Information Technology Computer Manufacturing Client Virtualization Virtualizing the Client PC: A Proof of Concept To determine whether virtualizing client PC operating systems could
Roadmap for Transforming Intel s Business with Advanced Analytics
IT Best Practices Business Intelligence and IT Business Transformation November 2011 Roadmap for Transforming Intel s Business with Advanced Analytics Executive Overview is working in close partnership
Overcoming Security Challenges to Virtualize Internet-facing Applications
Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing
Benefits of Client-Side Virtualization
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
Chrome OS*-Based Devices in the Enterprise
White Paper Client Virtualization Enterprise Mobility Chrome OS*-Based Devices in the Enterprise Being Able to Access Windows* Applications from a Chrome OS Client Significantly Increases their Versatility
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
Exploiting the business potential of BYOD (bring your own device)
WHITE PAPER: EXPLOITING THE BUSINESS POTENTIAL OF BYOD........................................ Exploiting the business potential of BYOD (bring your own device) Who should read this paper This paper addresses
Best Practices for Secure Mobile Access
Best Practices for Secure Mobile Access A guide to the future. Abstract Today, more people are working from more locations using more devices than ever before. Organizations are eager to reap the benefits
Successful ediscovery in a Bring Your Own Device Environment
IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between
Cloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Maintaining Information Security while Allowing Personal Hand-Held Devices in the Enterprise
IT@Intel White Paper Intel IT IT Best Practices Information Security and Employee Productivity November 2010 Maintaining Information Security while Allowing Personal Hand-Held Devices in the Enterprise
Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms
Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual
New Choices in Windows * Device Management
White Paper 4th Generation Intel Core Processors and Intel Atom Processors Intel and Windows 8.1* Mobility New Choices in Windows * Device Management Considerations in Deciding How to Manage Windows Devices
WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them
Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
Empowering BYOD and Mobile Security in the Enterprise. Jeff Baum, APAC Managing Director
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
IT@Intel. Memory Sizing for Server Virtualization. White Paper Intel Information Technology Computer Manufacturing Server Virtualization
White Paper Intel Information Technology Computer Manufacturing Server Virtualization Memory Sizing for Server Virtualization Intel IT has standardized on 16 gigabytes (GB) of memory for dual-socket virtualization
EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices
EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with
7 Things You Need to Know about Virtual Mobile Infrastructure
7 Things You Need to Know about Virtual Mobile Infrastructure Executive Summary Employees are bringing their phones and tablets to work in droves. This tidal wave of unmanaged devices has forced IT departments
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
A number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
Enterprise Video Hosting: Introducing the Intel Video Portal
Enterprise Video Hosting: Introducing the Intel Video Portal August 2013 Sara Browning, Social Collaboration Service Owner, Intel IT Chandan Sardeshmukh, Product Manager, Intel IT Legal Notices This presentation
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
The Holistic Guide to BYOD in Your Business Jazib Frahim
The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020
Document Sharing on Mobile Devices. Securing Productivity on the Go! www.maas360.com
Document Sharing on Mobile Devices Securing Productivity on the Go! www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential
The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER
The BYOD Opportunity Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER Table of Contents Abstract.... 3 Introduction.... 3 A New Approach to BYOD... 3 Positive Results....
Best Practices for Enabling Employee-owned Smart Phones in the Enterprise
IT@Intel White Paper Intel IT IT Best Practices IT Consumerization and Employee Productivity December 2011 Best Practices for Enabling Employee-owned Smart Phones in the Enterprise Executive Overview We
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
An Enterprise Private Cloud Architecture and Implementation Roadmap
IT@Intel White Paper Intel Information Technology Business Solutions June 2010 An Enterprise Private Cloud Architecture and Implementation Roadmap The private cloud is a shared multi-tenant environment
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
Statement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
Real World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
Productive and Secure Enterprise Mobility with Cisco and Citrix
Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers
Peer Research Report Insights on the Current State of BYOD
october 2012 Peer Research Report Insights on the Current State of BYOD Intel s IT Manager Survey Why You Should Read This Document Find out how IT managers across four countries are looking at Bring Your
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Mobile and enterprise access solutions White paper January 2007. Stay connected: A successful mobile device strategy drives productivity.
Mobile and enterprise access solutions White paper January 2007 Stay connected: A successful mobile. Page 2 Contents 2 Introduction 2 Delivering a mobile office that s as productive as the traditional
A number of factors contribute to the diminished regard for security:
TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Extending Enterprise Business Intelligence and Big Data to the Cloud
Intel IT Cloud Big April 2014 Extending Enterprise Business Intelligence and Big to the Cloud Executive Overview Access to multiple BI platforms including cloud BI gives flexible, powerful, affordable
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
BEYOND LIMITATIONS CONNECTING POSSIBILITIES
BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
IT@Intel Integrated Collaboration for the Enterprise
White Paper October 2014 IT@Intel Integrated Collaboration for the Enterprise Intel IT is integrating its collaboration tools with its business processes, providing an end-to-end experience for employees
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
A matter of trust Fujitsu Managed Mobile
Mobility at enterprise level A matter of trust Fujitsu Managed Mobile Worry-free mobility. Take your mobile environment to the next level. Mobility motivates. Mobile devices such as smartphones and tablet
Supporting Workforce Mobility: Best Practices in Enterprise Mobility Management
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
BYOD & Virtualization: Managing Mobile
White Paper 01 Finches Only 02 ViewSonic Only BYOD & Virtualization: Managing Mobile Devices from the Desktop Erik Willey 04.15.2014 SUMMARY: Integrated with Citrix XenMobile, ViewSonic s SD-A245 smart
The flexible workplace: Unlocking value in the bring your own device era
IBM Global Technology Services Thought Leadership White Paper November 2012 The flexible workplace: Unlocking value in the bring your own device era 2 The flexible workplace: Unlocking value in the bring
Hosted Workspaces Demo Guide for Citrix Service Provider Partners
Hosted Workspaces Demo Guide for Citrix Service Provider Partners Deliver a great hosted workspaces customer demo that includes Desktops-as-a-Service, virtual applications, file sharing and sync and Mobile
Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework
Mobile workforce management software solutions Empowering the evolving workforce with an end-to-end framework 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected
Microsoft Office 365 from Vodafone. Do business virtually anywhere
Do business virtually anywhere Now there s an easy way to do business virtually anywhere 2 Microsoft Office 365 from Vodafone is helping to empower people to work the way they want, on their terms, from
IMPLEMENTING YOUR BYOD MOBILITY STRATEGY
IMPLEMENTING YOUR BYOD MOBILITY STRATEGY An IT Checklist and Guide 1.0 Overview In early 2013 Dell Quest Software announced the results of a global survey of IT executives that was conducted to gauge the
Preparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
SECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
Secure Mobile Content Management for the Enterprise
SAP Brief SAP Technology SAP Mobile Documents Objectives Secure Mobile Content Management for the Enterprise Managing mobile content and protecting corporate assets Managing mobile content and protecting
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Peer Research Desktop Virtualization Insights for IT Strategic Planning
SEPTEMBER 2011 Peer Research Desktop Virtualization Insights for IT Strategic Planning Why you should read this document: This report describes key findings from a survey of 200 IT professionals that can
An Oracle White Paper July 2011. Oracle Desktop Virtualization Simplified Client Access for Oracle Applications
An Oracle White Paper July 2011 Oracle Desktop Virtualization Simplified Client Access for Oracle Applications Overview Oracle has the world s most comprehensive portfolio of industry-specific applications
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
The New Workplace: Supporting Bring your own
IBM Global Technology Services Thought Leadership White Paper December 2011 The New Workplace: Supporting Bring your own 2 The New Workplace: Supporting Bring your own Contents 2 Consumerization takes
Dell Bring Your Own Device
Dell Bring Your Own Device 2 easy steps to secure BYOD/PC Jason Moody Jason_Moody@Software.Dell.com The trend: Of BYOD very large businesses said securing corporate data on mobile devices was their most
Welcome to the era of the anywhere worker
Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening
Digital Asset Management
A collaborative digital asset management system for marketing organizations that improves performance, saves time and reduces costs. MarketingPilot provides powerful digital asset management software for
Securing Critical Corporate Data in a Mobile World
Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
BITDEFENDER SECURITY FOR AMAZON WEB SERVICES
BITDEFENDER SECURITY FOR AMAZON WEB SERVICES Beta Version Testing Guide Bitdefender Security for Amazon Web Services Beta Version Testing Guide Publication date 2015.03.04 Copyright 2015 Bitdefender Legal
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
Upgrading Data Center Network Architecture to 10 Gigabit Ethernet
Intel IT IT Best Practices Data Centers January 2011 Upgrading Data Center Network Architecture to 10 Gigabit Ethernet Executive Overview Upgrading our network architecture will optimize our data center
Safely Extend the Enterprise to Personal Mobile Devices
DATASHEET What s Inside 2 Boost Security for Employees and the Enterprise 3 Reduce IT Overhead 3 Encourage Employee Compliance 4 Improve Employee Productivity 4 Minimize Costs 5 F5 Services 5 More Information
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
Back to the Future: Securing your Unwired Enterprise
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
Intel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
The Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Enterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
An Enterprise Private Cloud Architecture and Implementation Roadmap
IT@Intel White Paper Intel Information Technology Business Solutions June 2010 An Enterprise Private Cloud Architecture and Implementation Roadmap The private cloud is a shared multi-tenant environment
Desktop Virtualization Strategy
Choosing the right solution for your needs ABSTRACT Several forms of desktop virtualization can help organizations satisfy users needs for mobility and flexibility, while relieving pressure on information
M a as3 6 0 fo r M o bile D evice s
by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile
Device Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)