Maximizing Your Desktop and Application Virtualization Implementation
|
|
- Clementine Golden
- 8 years ago
- Views:
Transcription
1 Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis
2 Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization... 1 Introduction to Hosted Applications... 2 Benefits of Hosted Applications... 2 How Hosted Applications Work with Desktop Virtualization... 3 Key Considerations in Hosted Application Implementation... 3 Summary... 4 Article 2: Desktop and Application Virtualization Management Best Practices... 5 Image Management Best Practices... 5 Desktop and Application Virtualization in BYOD and Physical Environments... 7 Managing and Monitoring Your Environment... 7 Desktop Provisioning Considerations... 9 Summary... 9 Article 3: Considerations for Implementing Desktop as a Service How DaaS Works Benefits of DaaS Essential DaaS Requirements Selecting the Right Desktop and Applications Virtualization Option Summary i
3 Copyright Statement 2014 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at info@realtimepublishers.com. ii
4 Article 1: Using Hosted Applications with Desktop Virtualization Companies of all sizes have realized the benefits of desktop virtualization, facilitating its rapid adoption. Whether you are one of the enterprises who have already adopted desktop virtualization or you are about to be, you must ensure proper implementation in order to benefit from all the latest innovations. Smart companies are leveraging innovations such as intelligent image management, performance management tools specifically designed for VDI, and access to remote applications for end users. Recently, desktop as a service (DaaS) has entered the picture giving cause for companies to consider when and where to take advantage of it. To make the right choice for your company, you need to be educated about the latest innovations in desktop and application management and delivery. The State of Desktop Virtualization A growing percentage of enterprises today have virtualized end user desktops by using VDI technologies. With VDI, typically each user has his or her own virtual machine and operating system (OS which may be connected to a master image), end user profiles are usually centralized on a file share, and applications may be locally installed or thinly provisioned. The end user accesses this virtual desktop machine, running on a data center server, using a high- performance protocol over a LAN, WAN, or even securely through the Internet. Alternatively, many enterprises are using hosted application technologies. In some cases, a user s entire desktop is hosted or remoted in a shared session environment. In other cases, just their applications are hosted and accessed over the network. Many of these companies, over time, are and will continue to make the move to VDI while continuing to leverage session virtualization and hosted applications. There are also a segment of users who because of their remote location or mobile work requirements need physical computers (desktop or laptop) to do their jobs. These users have only periodic network access or slow network access, making a local image a requirement on their devices. 1
5 Notably, there is no single general solution that all enterprises are immediately moving to; there will continue to be this variety of desktop/application access methods for the foreseeable future. As a result, enterprises need choice and flexibility when it comes to implementing and delivering desktops and applications to end users. Introduction to Hosted Applications For those not familiar with hosted applications, a brief overview is needed: Hosted applications work by installing a single instance of an application on a server. That application instance is installed in such a way that it can be run by multiple users with application and data preferences for each user going to a separate location. With the applications installed properly, they can then be published, using Microsoft s Remote Desktop Session Host (RDSH) with Remote Desktop Protocol (RDP), Remote Desktop Session Host with PCoIP from VMware, or Citrix XenApp with the session virtualization option and HDX. End user devices can be desktops, laptops, or tablet devices that run a compatible remote desktop and application client. Benefits of Hosted Applications If we compare applications installed locally in each VDI virtual machine (VM), physical desktop, or even virtualized application installations, hosted applications have a number of benefits: Specific hosted applications can be consolidated into a single server (or cluster of servers) that runs only that application for every user employing it Hosted applications, when consolidated into a single server/cluster and can be maintained and upgraded as needed from a single point Application owners can be responsible for a particular hosted application, which can be maintained without any effect on other applications Adding and removing an application from an end user desktop, when hosted, is as easy as adding or removing icons from a Windows desktop Users may want to access an application directly without having to launch a full virtual desktop 2
6 How Hosted Applications Work with Desktop Virtualization Today, enterprises need the flexibility to access applications through a variety of methods. Although desktop virtualization is where many companies are moving, there are still companies that have large remote desktop session host environments. To give desktop virtualization users the ultimate flexibility, modern desktop virtualization solutions should allow users to access hosted applications along side local VDI applications. When integrated properly with desktop virtualization solutions, these hosted applications should: Have the same look and feel as local applications Have access to the local client device OS, including the ability to be in the task bar/dock Have the ability to work in shortcuts and application launchers Have start menu integration Have copy/paste integration Figure 1.1: Remote applications seamlessly integrated. Key Considerations in Hosted Application Implementation When it comes to implementing hosted applications in the enterprise, there are key considerations to keep in mind. First, some applications are not compatible with being shared as a remote desktop session remote application. Compatibility depends on how the application stores configuration and user customizations. Thus, not all applications will function as remote desktop session applications. 3
7 Figure 1.2: Full virtual desktops available alongside RDS hosted applications. Second, different companies will have different use cases and that will drive how they implement hosted applications. Depending on the use cases, desktop virtualization may not be used but hosted or published applications will. For example, users who travel and spend much of their time offline won t be able to use hosted applications. Those users will likely employ local Windows OSs with layered single image management and/or virtualized applications. Users who are remote but have network access may use just a handful of hosted applications. In addition, there may be bring your own device (BYOD) users who just need access to run a few hosted applications. Summary With insight into the latest developments in desktop and application management, you can help your company realize the ideal setup for your environment. New desktop and application virtualization solutions are providing administrators the option to support more use cases with both VDI and hosted applications easily and effectively, through a single unified interface. 4
8 Article 2: Desktop and Application Virtualization Management Best Practices The delivery, management, and automation of virtual desktop infrastructure (VDI) can be challenging if the implementation is not well planned and maintained. Desktop virtualization administrators should be prepared to answer the following critical questions as they plan out a desktop implementation. How will the operating system (OS) images be managed in the environment? How will the OS be patched and upgraded when needed? Where will applications be stored, how will they be upgraded, how will they be entitled, and how will they be delivered to end users? What about end user customizations/profiles/personas? How will customizations/profiles/personas from the OS image and applications be separated to ensure that these three distinct pillars of an end user VDI virtual machine (VM) image are siloed? How will performance and capacity be managed? How will you troubleshoot VDI when problems occur? How will you automate the environment to run smoothly and efficiently? Let s look at best practices in these areas to help you answer these critical questions. Image Management Best Practices As part of desktop virtualization delivery, you will need to know what VDI solution you will use, what the end user devices will be, what remoting protocol you will employ to deliver the end user experience, and how you will manage the virtual desktop images that you plan to deliver to your end users. As mentioned earlier, the three distinct pillars of an end user VDI VM image are: OS Applications End user personas 5
9 Taking these one at a time, the OS challenge is usually met with desktop virtualization. To save disk space, a golden image is created and then cloned. Those clones are linked back to the main image such that only the changes from the golden image require disk space. In most cases, the OS is also separate from the applications and end user personas (profiles) so that the OS can be updated as needed without affecting the applications or end user data. The application challenge is handled in a variety of ways, as discussed in the first article. You might install applications inside the VDI image or you might insert links to virtualized versions of your applications (which can be updated independently), you might use an application distribution technology, or you could leverage hosted applications. Finally, end user profiles/personas could be simply stored on a file share or stored separately using your VDI product. Although most VDI products include some form of persona management, many customers choose to leverage a more advanced third- party end user persona management application. No matter what you use, the end result is the same: end user personas are kept separately and can be applied to whatever OS or device to which the end user connects (see Figure 2.1). Figure 2.1: Separation of OS, applications, and personas. 6
10 By separating these three components of the end user VM image with VDI, you can upgrade the OS or applications at any time, without affecting end user personalization, performance, or end user productivity. VDI solutions that allow you to silo the OS, applications, and personas for easy patching and updates are the ideal solution for enterprises of all sizes. Desktop and Application Virtualization in BYOD and Physical Environments More and more companies are moving to a policy where end users are allowed to bring their own device. The Bring Your Own Device (BYOD) policy takes a huge burden off IT to purchase, support, and troubleshoot a variety of devices. However, it also introduces issues, the main concern being security. If BYOD end users were able to access the company s network, applications, and data from their own device and if that device had a virus or contained malware, the virus could spread and/or the malware could access the company data. The way around this challenge is to keep BYOD devices in a secure DMZ (that is, off the relatively unprotected company network) and allow them to access only a VDI desktop or simply the specific the set of applications they need. When the VDI OS, applications, and personas are siloed, the virtualized or remote applications can be delivered independently of the OS to BYOD end users. This solution is optimal for keeping the BYOD OSs from accessing the corporate network. Many companies still have and will continue to have physical desktops or laptops because they have remote or mobile users that don t have full- time network access. As a result, these users have their own local OS image, applications, and personas. However, IT still needs to keep those physical machines up to date. Ideally you could keep them up to date with the same siloed OS image, application images, and end user personas employed in your VDI environment. The latest end user computing solutions are making this possible, providing many of the benefits of VDI to physical devices. When combined with a virtual desktop container on the endpoint, these next- generation image management solutions can also be applied to a BYOD environment with encryption, expiration, and locked down policy controls. Managing and Monitoring Your Environment Although virtualization administrators might be used to managing performance and capacity in virtual server environments, undertaking performance and capacity management in VDI environments is a very different task. VDI has different resource utilization characteristics, such as much heavier storage I/O utilization and very unpredictable storage I/O patterns. 7
11 Thus, desktop virtualization administrators need performance and capacity tools that are designed specifically for desktop and application virtualization environments (see Figure 2.2) Additionally, you don t want performance and capacity tools that provide only statistics such as Input/Output Operations Per Second (IOPS). Although it s important to have access to these types of raw statistics, what is more critical is that your tool gives you complete visibility into the end user environment and provides useful information such as the overall health, performance, and efficiency of your end user environment.,. The tool must be able to optimize the VDI environment to ensure that VMs aren t oversized or undersized as well as be able to quickly identify performance/capacity bottlenecks. Ideally, your performance/capacity tool should be able to prevent problems before they occur. However, when troubleshooting is necessary, you should be able to identify the root cause quickly and have the tool provide recommendations for remediation. Figure 2.2: Virtual infrastructure performance and capacity tool for desktop and application virtualization. End users expect their virtualized desktops and applications to perform as reliably as their physical desktops did. The last thing that you want is your end users having to report their own problems to IT. You must prevent problems before they happen, or at least know about them before the end user does. You need a tool that offers you the fastest time to value for your environment, lowers your overall operational costs, and helps you provide the optimal end user experience. 8
12 Desktop Provisioning Considerations All too often, the last thing enterprises consider is automating desktop provisioning. This is unfortunate because if you can capture your most common tasks and orchestrate and automate them, you can immediately become more efficient. Examples of common tasks that you might consider include: Deploying patches to a company application The workflow associated with requesting and approving new desktops Adding new virtual desktop users Entitling a common application to an existing VDI user Automation and orchestration tools allow you to automate many of the common tasks that you perform for your virtual infrastructure. Large- scale automation tools can take these common automations to a higher level by interfacing with physical infrastructure, cloud services, and other hypervisors while applying company policies and managing the complete lifecycle of VMs and applications. Additionally, these high- level automation tools allow you to deploy any application as a service and/or deliver applications and VMs from a self- service catalog. In the end, orchestration and automation will drive greater IT operational efficiencies and deliver greater return on investment (ROI). Summary No desktop or applications virtualization project can be successful if not planned and maintained well. The reliability, availability, and performance of your environment depend on the proper time investment, upfront and the right tools to keep it running smoothly over time. You must ensure that your performance and capacity tool is well versed in the unique demands of desktop and application virtualization to ensure that you can predict bottlenecks before they happen. Finally, by automating tasks the first time you do them, you won t have to reproduce them. Although it sounds simple, many administrators never invest their time in this automation and orchestration process. The small investment required for automation will result, in the long term, in much greater efficiency for you, as an administrator, and for your company. 9
13 Article 3: Considerations for Implementing Desktop as a Service The design, purchase, implementation, administration, troubleshooting, and ongoing refresh of virtual desktop infrastructure (VDI) environments requires more time and resources than some companies have to invest. Also, some use cases may be better suited for more dynamic deployment mechanisms. More and more, enterprises are considering and making the move to the latest desktop as a service (DaaS) solutions. To realize the greatest success, enterprises must select DaaS solutions that are: Based on proven virtualization technologies Provide integrated security and control Offload their current VDI administrative overhead while still providing their company greater return on investment (ROI) Offer their company greater predictability in costs Ensure they can still integrate with their current enterprise infrastructure How DaaS Works DaaS works by intelligently integrating the following components, offering them as a service in a hosted- form, and pricing them in an affordable and predictable cost model (see Figure 3.1): Server virtualization Desktop and application virtualization Performance and capacity for VDI Secure multi- tenancy Self- service Hybrid cloud connectivity back to your existing enterprise infrastructure 10
14 Figure 3.1: DaaS in use. Benefits of DaaS The benefits of using DaaS over running your own VDI are many. DaaS implementation means there is no need for you to design, plan, build, administer, and troubleshoot your own VDI, freeing you time and saving your company money. Instead, you can leverage the proven knowledge of an expert provider. In addition, DaaS frees the time of IT experts to work on IT projects that leverage technology to increase company profits, and provides your company with a predictable monthly cost model for VDI. Also, DaaS setups enable your company to implement the latest and greatest desktop and application virtualization solution available. 5 Essential DaaS Requirements Let s say that you want to run a DaaS proof- of- concept and then, if successful, implement DaaS at your company. What is required to do so? Minimally, you could subscribe a handful of users to employ DaaS as a test; however, at most companies, implementing DaaS will be done on a larger scale by utilizing a hybrid cloud. In the typical enterprise scenario, the existing enterprise IT infrastructure is connected with a site- to- site VPN or dedicated circuit to the DaaS provider. VDI virtual machine (VM) images are created, applications are installed, applications are linked back to on- premise company applications, and the DaaS infrastructure is connected to the existing directory for authentication. With this design, end users keep their existing devices, use their existing authentication credentials, and run the same applications they have always used. 11
15 Selecting the Right Desktop and Applications Virtualization Option So how do you know when to use DaaS or implement desktop virtualization in- house, on- premises? If you are planning a new desktop or application virtualization implementation, you should seriously consider DaaS. With a predetermined, predictable monthly cost and no initial capital expenditure, DaaS is a smart move for many companies. The only caveat may be that there is a minimum commitment term for most DaaS implementations that you would want to ensure your company could meet. When looking at the financial side of your desktop or application virtualization implementation, the DaaS OPEX model is very appealing, as the model is usually preferable to many CxOs and executives of your company. Summary The way companies deliver desktops and applications to their end users is changing. Many companies have moved or plan to move to some type of desktop virtualization. At the same time, new DaaS options are maturing and becoming more competitive with on- premises desktop and application virtualization implementations. Keep in mind that this strategy is not an either- or situation. Many companies are looking to implement both on- premise and cloud- hosted strategies to address various use cases. Before your company makes a new capital expenditure for more VDI hardware and software, ensure that you perform due diligence and compare the costs and time commitment of running your own on- premises desktop and application virtualization solution with simply subscribing to DaaS in the cloud. 12
Maximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Desktop and Application Virtualization Management Best Practices... 1 Image Management
More informationMaximizing Your Desktop and Application Virtualization Implementation
Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...
More informationReal World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI
More informationReal World Considerations for Implementing Desktop Virtualization
Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationBest Practices in Deploying Anti-Malware for Best Performance
The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying
More informationWhere Do I Start With Virtual Desktops?
The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...
More informationVirtual Machine Environments: Data Protection and Recovery Solutions
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationHow the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application
More informationTips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
More informationManaging for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
More informationHow Configuration Management Tools Address the Challenges of Configuration Management
Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don
More informationSteps to Migrating to a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime
More informationProtecting Data with a Unified Platform
Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationDeveloping a Backup Strategy for Hybrid Physical and Virtual Infrastructures
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime
More informationWhy Endpoint Encryption Can Fail to Deliver
Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1
More informationThe Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
More informationMitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
More informationUnderstanding & Improving Hypervisor Security
The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1
More informationHow the Software-Defined Data Center Is Transforming End User Computing
How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis Building the Future of the Desktop on the Software-Defined Data Center... 1 What Is
More informationThe Next-Generation Virtual Data Center
The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization
More informationBest Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
More informationThe Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous
More informationManaging Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery
Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones, Series Editor For
More informationStreamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
More informationHow Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to
More informationNon-Native Options for High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...
More informationThe Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway
The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged
More informationMaking Endpoint Encryption Work in the Real World
Endpoint Data Encryption That Actually Works The Essentials Series Making Endpoint Encryption Work in the Real World sponsored by Ma king Endpoint Encryption Work in the Real World... 1 Th e Key: Policy
More informationSecuring Endpoints without a Security Expert
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series
More informationSolving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems
Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems sponsored by Dan Sullivan The Increasing Importance of Compression in the Enterprise... 1 Online Transactions
More informationCollaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationCollaborative and Agile Project Management
Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens
More informationThe Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
More informationHow to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
More informationData Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
More informationUnderstanding the Business Benefits of Managed Services
The Essentials Series: Managed Application Failover for the SMB Understanding the Business Benefits of Managed Services sponsored by by David Chernicoff Un derstanding the Business Benefits of Managed
More informationControlling and Managing Security with Performance Tools
Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance
More informationHow Are Certificates Used?
The Essentials Series: Code-Signing Certificates How Are Certificates Used? sponsored by by Don Jones Ho w Are Certificates Used?... 1 Web Applications... 1 Mobile Applications... 2 Public Software...
More informationUsing Web Security Services to Protect Portable Devices
Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding
More informationAdministration Challenges
The Essentials Series: Enterprise Identity and Access Management Administration Challenges sponsored by by Richard Siddaway Administration Challenges...1 Heterogeneous Environments...1 Multiple Directories...1
More informationMatching High Availability Technology with Business Needs
The Essentials Series: Making High Availability Pay For Itself Matching High Availability Technology with Business Needs sponsored by by Matching High-Availability Tec hnology with Business Needs... 1
More informationEnabling Useful Active Directory Auditing
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Enabling Useful Active Directory Auditing sponsored by by Greg Shields En abling Useful Active Directory Auditing... 1 The Native
More informationRealizing the IT Management Value of Infrastructure Management
The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1
More informationThe Definitive Guide to Cloud Acceleration
The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential
More informationSimplify VDI and RDS Private Clouds for SMBs
PRODUCT BRIEF Simplify VDI and RDS Private Clouds for SMBs VDI Private Cloud Konect Elite is an application and virtual desktop delivery software that offers the ability to dynamically sync, create, configure,
More informationBecoming Proactive in Application Management and Monitoring
The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...
More informationMicrosoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering
Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation
More informationReplication and Recovery Management Solutions
The Essentials Series: Virtualization and Disaster Recovery Replication and Recovery Management Solutions sponsored by by J. Peter Bruzzese Re plication and Recovery Management Solutions... 1 Pricing Models
More informationTips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan
Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft
More informationThe Art of High Availability
The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical
More information10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution
Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime
More informationQuickly Recovering Deleted Active Directory Objects
The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory
More informationDell vworkspace Supports Higher Education s Desktop Virtualization Needs
Dell vworkspace Supports Higher Education s Desktop Virtualization Needs Prepared by Chris Lyman, Senior Systems Consultant Dell Cloud Client Computing Solutions Abstract As adoption of desktop virtualization
More informationBeyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
More informationFulfilling HIPAA Compliance by Eliminating
The Essentials Series: Fulfilling Compliance by Eliminating Administrator Rights Fulfilling HIPAA Compliance by Eliminating Administrator Rights sponsored by by Greg Shields Fu lfilling HIPAA Compliance
More informationIntel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms
Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual
More informationWhat Are Cloud Connected Data Protection Services About?
Protecting Client Data in the Cloud: A Channel Perspective The Essentials Series What Are Cloud-Connected Data Protection Services About? Architectural Advice for Resellers sponsored by Introduction to
More informationHow to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
More informationTechnology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
More informationAuditing File and Folder Access
The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co
More informationHow To Get A Client Side Virtualization Solution For Your Financial Services Business
SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,
More informationHow to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft
More informationHow to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books
More informationMalware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
More informationVMware Horizon DaaS: Desktop as a Cloud Service (DaaS)
VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of
More informationThe Definitive Guide. Cloud Computing. Dan Sullivan
The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business
More informationEight Ways Better Software Deployment and Management Can Save You Money
Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by
More informationEradicating PST Files from Your Network
The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages
More informationRelating High Availability Metrics to Business Value
The Essentials Series: Making High Availability Pay For Itself Relating High Availability Metrics to Business Value sponsored by by Relating High-Availability Metrics to Business Value... 1 How to Explain
More informationTop 10 Myths of Desktop Virtualization
Top 10 Myths of Desktop Virtualization www.virtualcomputer.com Copyright Virtual Computer, Inc. 2011 Top 10 Myths of Desktop Virtualization The Myths 1. Desktop virtualization is costly and requires big
More informationThe Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
More informationMobiKEY TM with TruOFFICE
MobiKEY TM with TruOFFICE Virtual Desktop Infrastructure (VDI) SOLUTION February 8, 2011 Copyright 2011 Route1 Inc. All rights reserved. Route1, the Route1 and shield design Logo, SECURING THE DIGITAL
More informationPr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2
Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...
More informationDeployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
More informationLowering Costs of Data Protection through Deduplication and Data Reduction
The Essentials Series: The Evolving Landscape of Enterprise Data Protection Lowering Costs of Data Protection through Deduplication and Data Reduction sponsored by by Dan Sullivan Lo wering Costs of Data
More informationBoost your VDI Confidence with Monitoring and Load Testing
White Paper Boost your VDI Confidence with Monitoring and Load Testing How combining monitoring tools and load testing tools offers a complete solution for VDI performance assurance By Adam Carter, Product
More informationBy the Citrix Publications Department. Citrix Systems, Inc.
Licensing: The License Management Console By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS
More informationIntelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com
Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage danny.roefflaer@iriscorporate.com Little video to start with... The Problem with Laptops Windows XP support is expiring
More informationMobiKEY. Virtual Desktop Infrastructure (VDI) Integration. September 2012
MobiKEY Virtual Desktop Infrastructure (VDI) Integration September 2012 Copyright 2012 Route1 Inc. All rights reserved. Route1, the Route1 and shield design Logo, SECURING THE DIGITAL WORLD, Mobi, MobiSecure,
More informationIsolating Network vs. Application Problems
The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common
More informationWhat Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
More informationVMware Horizon. VMware Horizon 6. Q. What is VMware Horizon? Central image management is supported for
FREQUENTLY ASKED QUESTIONS VMware Horizon Q. What is VMware Horizon? A. VMware Horizon is a family of desktop and application virtualization solutions designed to deliver Windows and online services from
More informationReducing Backups with Data Deduplication
The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...
More informationORACLE VIRTUAL DESKTOP INFRASTRUCTURE
ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops
More informationFrequently Asked Questions: Desktone s Offerings and Market
Frequently Asked Questions: Desktone s Offerings and Market General Virtualization Q: What is desktop virtualization? A: Desktop virtualization is the separation of a client operating system/environment
More informationBenefits of Using Data Loss Prevention Technology
The Essentials Series: Email-Centric Data Loss Prevention Benefits of Using Data Loss Prevention Technology sponsored by by Dan Sullivan Benefits of Using Data Loss Prevention Technology...1 Need for Automated
More informationIBM FlashSystem and Atlantis ILIO
IBM FlashSystem and Atlantis ILIO Cost-effective, high performance, and scalable VDI Highlights Lower-than-PC cost Better-than-PC user experience Lower project risks Fast provisioning and better management
More informationDesktop Virtualization Cloud Partner Training Series
Desktop Virtualization Cloud Partner Training Series August 2015 Table of Contents What is it? Benefits Industry Landscape Evolve is Different How we can help you $ucceed Who is a fit? Who is a challenge?
More informationExchange Storage Meeting Requirements with Dot Hill
Technology Insight Paper Exchange Storage Meeting Requirements with Dot Hill By Randy Kerns October, 2012 Enabling you to make the best technology decisions Exchange Storage Meeting Requirements with Dot
More informationBusiness Value of Microsoft System Center 2012 Configuration Manager
Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration
More informationSimplify the Deployment and Management of Desktop Virtualization & VDI Technologies. Terry Lewis Solutions Architect
Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies Terry Lewis Solutions Architect Today s discussion Technology Drivers Desktop and Application Delivery Complexity Which
More informationThe Shortcut Guide To
tm The Shortcut Guide To Securing Your Exchange Server and Unified Communications Infrastructure Using SSL Don Jones Ch apter 3: Best Practices for Securing Your Exchange Server... 32 Business Level Concerns
More informationIntroducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland
Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows
More informationHow To Understand The Difference Between Network Analysis And Network Monitoring
The Essentials Series: Network Troubleshooting and Problem Identification Bandwidth Monitoring and Traffic Analysis sponsored by by Greg Shields Bandwidth Monitoring and Traffic Analysis...1 Different
More informationVDI Security for Better Protection and Performance
VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments
More informationVMware End User Computing
VMware End User Computing Overview 2014 VMware Inc. All rights reserved. Architecture for IT Any Device Business Mobility: Applications Devices Content Any Application Traditional Applications Modern,
More information(VDI) William Stein, LHRIC. Jim Geueke, MainLine
Virtual Desktop Infrastructure (VDI) William Stein, LHRIC Jim Geueke, MainLine Why Desktop Virtualization? Central management of desktop images User receives a fresh image every time Easier Windows OS
More information