Maximizing Your Desktop and Application Virtualization Implementation

Size: px
Start display at page:

Download "Maximizing Your Desktop and Application Virtualization Implementation"

Transcription

1 Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis

2 Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization... 1 Introduction to Hosted Applications... 2 Benefits of Hosted Applications... 2 How Hosted Applications Work with Desktop Virtualization... 3 Key Considerations in Hosted Application Implementation... 3 Summary... 4 Article 2: Desktop and Application Virtualization Management Best Practices... 5 Image Management Best Practices... 5 Desktop and Application Virtualization in BYOD and Physical Environments... 7 Managing and Monitoring Your Environment... 7 Desktop Provisioning Considerations... 9 Summary... 9 Article 3: Considerations for Implementing Desktop as a Service How DaaS Works Benefits of DaaS Essential DaaS Requirements Selecting the Right Desktop and Applications Virtualization Option Summary i

3 Copyright Statement 2014 Realtime Publishers. All rights reserved. This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the Materials ) and this site and any such Materials are protected by international copyright and trademark laws. THE MATERIALS ARE PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. The Materials are subject to change without notice and do not represent a commitment on the part of Realtime Publishers its web site sponsors. In no event shall Realtime Publishers or its web site sponsors be held liable for technical or editorial errors or omissions contained in the Materials, including without limitation, for any direct, indirect, incidental, special, exemplary or consequential damages whatsoever resulting from the use of any information contained in the Materials. The Materials (including but not limited to the text, images, audio, and/or video) may not be copied, reproduced, republished, uploaded, posted, transmitted, or distributed in any way, in whole or in part, except that one copy may be downloaded for your personal, noncommercial use on a single computer. In connection with such use, you may not modify or obscure any copyright or other proprietary notice. The Materials may contain trademarks, services marks and logos that are the property of third parties. You are not permitted to use these trademarks, services marks or logos without prior written consent of such third parties. Realtime Publishers and the Realtime Publishers logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. If you have any questions about these terms, or if you would like information about licensing materials from Realtime Publishers, please contact us via at info@realtimepublishers.com. ii

4 Article 1: Using Hosted Applications with Desktop Virtualization Companies of all sizes have realized the benefits of desktop virtualization, facilitating its rapid adoption. Whether you are one of the enterprises who have already adopted desktop virtualization or you are about to be, you must ensure proper implementation in order to benefit from all the latest innovations. Smart companies are leveraging innovations such as intelligent image management, performance management tools specifically designed for VDI, and access to remote applications for end users. Recently, desktop as a service (DaaS) has entered the picture giving cause for companies to consider when and where to take advantage of it. To make the right choice for your company, you need to be educated about the latest innovations in desktop and application management and delivery. The State of Desktop Virtualization A growing percentage of enterprises today have virtualized end user desktops by using VDI technologies. With VDI, typically each user has his or her own virtual machine and operating system (OS which may be connected to a master image), end user profiles are usually centralized on a file share, and applications may be locally installed or thinly provisioned. The end user accesses this virtual desktop machine, running on a data center server, using a high- performance protocol over a LAN, WAN, or even securely through the Internet. Alternatively, many enterprises are using hosted application technologies. In some cases, a user s entire desktop is hosted or remoted in a shared session environment. In other cases, just their applications are hosted and accessed over the network. Many of these companies, over time, are and will continue to make the move to VDI while continuing to leverage session virtualization and hosted applications. There are also a segment of users who because of their remote location or mobile work requirements need physical computers (desktop or laptop) to do their jobs. These users have only periodic network access or slow network access, making a local image a requirement on their devices. 1

5 Notably, there is no single general solution that all enterprises are immediately moving to; there will continue to be this variety of desktop/application access methods for the foreseeable future. As a result, enterprises need choice and flexibility when it comes to implementing and delivering desktops and applications to end users. Introduction to Hosted Applications For those not familiar with hosted applications, a brief overview is needed: Hosted applications work by installing a single instance of an application on a server. That application instance is installed in such a way that it can be run by multiple users with application and data preferences for each user going to a separate location. With the applications installed properly, they can then be published, using Microsoft s Remote Desktop Session Host (RDSH) with Remote Desktop Protocol (RDP), Remote Desktop Session Host with PCoIP from VMware, or Citrix XenApp with the session virtualization option and HDX. End user devices can be desktops, laptops, or tablet devices that run a compatible remote desktop and application client. Benefits of Hosted Applications If we compare applications installed locally in each VDI virtual machine (VM), physical desktop, or even virtualized application installations, hosted applications have a number of benefits: Specific hosted applications can be consolidated into a single server (or cluster of servers) that runs only that application for every user employing it Hosted applications, when consolidated into a single server/cluster and can be maintained and upgraded as needed from a single point Application owners can be responsible for a particular hosted application, which can be maintained without any effect on other applications Adding and removing an application from an end user desktop, when hosted, is as easy as adding or removing icons from a Windows desktop Users may want to access an application directly without having to launch a full virtual desktop 2

6 How Hosted Applications Work with Desktop Virtualization Today, enterprises need the flexibility to access applications through a variety of methods. Although desktop virtualization is where many companies are moving, there are still companies that have large remote desktop session host environments. To give desktop virtualization users the ultimate flexibility, modern desktop virtualization solutions should allow users to access hosted applications along side local VDI applications. When integrated properly with desktop virtualization solutions, these hosted applications should: Have the same look and feel as local applications Have access to the local client device OS, including the ability to be in the task bar/dock Have the ability to work in shortcuts and application launchers Have start menu integration Have copy/paste integration Figure 1.1: Remote applications seamlessly integrated. Key Considerations in Hosted Application Implementation When it comes to implementing hosted applications in the enterprise, there are key considerations to keep in mind. First, some applications are not compatible with being shared as a remote desktop session remote application. Compatibility depends on how the application stores configuration and user customizations. Thus, not all applications will function as remote desktop session applications. 3

7 Figure 1.2: Full virtual desktops available alongside RDS hosted applications. Second, different companies will have different use cases and that will drive how they implement hosted applications. Depending on the use cases, desktop virtualization may not be used but hosted or published applications will. For example, users who travel and spend much of their time offline won t be able to use hosted applications. Those users will likely employ local Windows OSs with layered single image management and/or virtualized applications. Users who are remote but have network access may use just a handful of hosted applications. In addition, there may be bring your own device (BYOD) users who just need access to run a few hosted applications. Summary With insight into the latest developments in desktop and application management, you can help your company realize the ideal setup for your environment. New desktop and application virtualization solutions are providing administrators the option to support more use cases with both VDI and hosted applications easily and effectively, through a single unified interface. 4

8 Article 2: Desktop and Application Virtualization Management Best Practices The delivery, management, and automation of virtual desktop infrastructure (VDI) can be challenging if the implementation is not well planned and maintained. Desktop virtualization administrators should be prepared to answer the following critical questions as they plan out a desktop implementation. How will the operating system (OS) images be managed in the environment? How will the OS be patched and upgraded when needed? Where will applications be stored, how will they be upgraded, how will they be entitled, and how will they be delivered to end users? What about end user customizations/profiles/personas? How will customizations/profiles/personas from the OS image and applications be separated to ensure that these three distinct pillars of an end user VDI virtual machine (VM) image are siloed? How will performance and capacity be managed? How will you troubleshoot VDI when problems occur? How will you automate the environment to run smoothly and efficiently? Let s look at best practices in these areas to help you answer these critical questions. Image Management Best Practices As part of desktop virtualization delivery, you will need to know what VDI solution you will use, what the end user devices will be, what remoting protocol you will employ to deliver the end user experience, and how you will manage the virtual desktop images that you plan to deliver to your end users. As mentioned earlier, the three distinct pillars of an end user VDI VM image are: OS Applications End user personas 5

9 Taking these one at a time, the OS challenge is usually met with desktop virtualization. To save disk space, a golden image is created and then cloned. Those clones are linked back to the main image such that only the changes from the golden image require disk space. In most cases, the OS is also separate from the applications and end user personas (profiles) so that the OS can be updated as needed without affecting the applications or end user data. The application challenge is handled in a variety of ways, as discussed in the first article. You might install applications inside the VDI image or you might insert links to virtualized versions of your applications (which can be updated independently), you might use an application distribution technology, or you could leverage hosted applications. Finally, end user profiles/personas could be simply stored on a file share or stored separately using your VDI product. Although most VDI products include some form of persona management, many customers choose to leverage a more advanced third- party end user persona management application. No matter what you use, the end result is the same: end user personas are kept separately and can be applied to whatever OS or device to which the end user connects (see Figure 2.1). Figure 2.1: Separation of OS, applications, and personas. 6

10 By separating these three components of the end user VM image with VDI, you can upgrade the OS or applications at any time, without affecting end user personalization, performance, or end user productivity. VDI solutions that allow you to silo the OS, applications, and personas for easy patching and updates are the ideal solution for enterprises of all sizes. Desktop and Application Virtualization in BYOD and Physical Environments More and more companies are moving to a policy where end users are allowed to bring their own device. The Bring Your Own Device (BYOD) policy takes a huge burden off IT to purchase, support, and troubleshoot a variety of devices. However, it also introduces issues, the main concern being security. If BYOD end users were able to access the company s network, applications, and data from their own device and if that device had a virus or contained malware, the virus could spread and/or the malware could access the company data. The way around this challenge is to keep BYOD devices in a secure DMZ (that is, off the relatively unprotected company network) and allow them to access only a VDI desktop or simply the specific the set of applications they need. When the VDI OS, applications, and personas are siloed, the virtualized or remote applications can be delivered independently of the OS to BYOD end users. This solution is optimal for keeping the BYOD OSs from accessing the corporate network. Many companies still have and will continue to have physical desktops or laptops because they have remote or mobile users that don t have full- time network access. As a result, these users have their own local OS image, applications, and personas. However, IT still needs to keep those physical machines up to date. Ideally you could keep them up to date with the same siloed OS image, application images, and end user personas employed in your VDI environment. The latest end user computing solutions are making this possible, providing many of the benefits of VDI to physical devices. When combined with a virtual desktop container on the endpoint, these next- generation image management solutions can also be applied to a BYOD environment with encryption, expiration, and locked down policy controls. Managing and Monitoring Your Environment Although virtualization administrators might be used to managing performance and capacity in virtual server environments, undertaking performance and capacity management in VDI environments is a very different task. VDI has different resource utilization characteristics, such as much heavier storage I/O utilization and very unpredictable storage I/O patterns. 7

11 Thus, desktop virtualization administrators need performance and capacity tools that are designed specifically for desktop and application virtualization environments (see Figure 2.2) Additionally, you don t want performance and capacity tools that provide only statistics such as Input/Output Operations Per Second (IOPS). Although it s important to have access to these types of raw statistics, what is more critical is that your tool gives you complete visibility into the end user environment and provides useful information such as the overall health, performance, and efficiency of your end user environment.,. The tool must be able to optimize the VDI environment to ensure that VMs aren t oversized or undersized as well as be able to quickly identify performance/capacity bottlenecks. Ideally, your performance/capacity tool should be able to prevent problems before they occur. However, when troubleshooting is necessary, you should be able to identify the root cause quickly and have the tool provide recommendations for remediation. Figure 2.2: Virtual infrastructure performance and capacity tool for desktop and application virtualization. End users expect their virtualized desktops and applications to perform as reliably as their physical desktops did. The last thing that you want is your end users having to report their own problems to IT. You must prevent problems before they happen, or at least know about them before the end user does. You need a tool that offers you the fastest time to value for your environment, lowers your overall operational costs, and helps you provide the optimal end user experience. 8

12 Desktop Provisioning Considerations All too often, the last thing enterprises consider is automating desktop provisioning. This is unfortunate because if you can capture your most common tasks and orchestrate and automate them, you can immediately become more efficient. Examples of common tasks that you might consider include: Deploying patches to a company application The workflow associated with requesting and approving new desktops Adding new virtual desktop users Entitling a common application to an existing VDI user Automation and orchestration tools allow you to automate many of the common tasks that you perform for your virtual infrastructure. Large- scale automation tools can take these common automations to a higher level by interfacing with physical infrastructure, cloud services, and other hypervisors while applying company policies and managing the complete lifecycle of VMs and applications. Additionally, these high- level automation tools allow you to deploy any application as a service and/or deliver applications and VMs from a self- service catalog. In the end, orchestration and automation will drive greater IT operational efficiencies and deliver greater return on investment (ROI). Summary No desktop or applications virtualization project can be successful if not planned and maintained well. The reliability, availability, and performance of your environment depend on the proper time investment, upfront and the right tools to keep it running smoothly over time. You must ensure that your performance and capacity tool is well versed in the unique demands of desktop and application virtualization to ensure that you can predict bottlenecks before they happen. Finally, by automating tasks the first time you do them, you won t have to reproduce them. Although it sounds simple, many administrators never invest their time in this automation and orchestration process. The small investment required for automation will result, in the long term, in much greater efficiency for you, as an administrator, and for your company. 9

13 Article 3: Considerations for Implementing Desktop as a Service The design, purchase, implementation, administration, troubleshooting, and ongoing refresh of virtual desktop infrastructure (VDI) environments requires more time and resources than some companies have to invest. Also, some use cases may be better suited for more dynamic deployment mechanisms. More and more, enterprises are considering and making the move to the latest desktop as a service (DaaS) solutions. To realize the greatest success, enterprises must select DaaS solutions that are: Based on proven virtualization technologies Provide integrated security and control Offload their current VDI administrative overhead while still providing their company greater return on investment (ROI) Offer their company greater predictability in costs Ensure they can still integrate with their current enterprise infrastructure How DaaS Works DaaS works by intelligently integrating the following components, offering them as a service in a hosted- form, and pricing them in an affordable and predictable cost model (see Figure 3.1): Server virtualization Desktop and application virtualization Performance and capacity for VDI Secure multi- tenancy Self- service Hybrid cloud connectivity back to your existing enterprise infrastructure 10

14 Figure 3.1: DaaS in use. Benefits of DaaS The benefits of using DaaS over running your own VDI are many. DaaS implementation means there is no need for you to design, plan, build, administer, and troubleshoot your own VDI, freeing you time and saving your company money. Instead, you can leverage the proven knowledge of an expert provider. In addition, DaaS frees the time of IT experts to work on IT projects that leverage technology to increase company profits, and provides your company with a predictable monthly cost model for VDI. Also, DaaS setups enable your company to implement the latest and greatest desktop and application virtualization solution available. 5 Essential DaaS Requirements Let s say that you want to run a DaaS proof- of- concept and then, if successful, implement DaaS at your company. What is required to do so? Minimally, you could subscribe a handful of users to employ DaaS as a test; however, at most companies, implementing DaaS will be done on a larger scale by utilizing a hybrid cloud. In the typical enterprise scenario, the existing enterprise IT infrastructure is connected with a site- to- site VPN or dedicated circuit to the DaaS provider. VDI virtual machine (VM) images are created, applications are installed, applications are linked back to on- premise company applications, and the DaaS infrastructure is connected to the existing directory for authentication. With this design, end users keep their existing devices, use their existing authentication credentials, and run the same applications they have always used. 11

15 Selecting the Right Desktop and Applications Virtualization Option So how do you know when to use DaaS or implement desktop virtualization in- house, on- premises? If you are planning a new desktop or application virtualization implementation, you should seriously consider DaaS. With a predetermined, predictable monthly cost and no initial capital expenditure, DaaS is a smart move for many companies. The only caveat may be that there is a minimum commitment term for most DaaS implementations that you would want to ensure your company could meet. When looking at the financial side of your desktop or application virtualization implementation, the DaaS OPEX model is very appealing, as the model is usually preferable to many CxOs and executives of your company. Summary The way companies deliver desktops and applications to their end users is changing. Many companies have moved or plan to move to some type of desktop virtualization. At the same time, new DaaS options are maturing and becoming more competitive with on- premises desktop and application virtualization implementations. Keep in mind that this strategy is not an either- or situation. Many companies are looking to implement both on- premise and cloud- hosted strategies to address various use cases. Before your company makes a new capital expenditure for more VDI hardware and software, ensure that you perform due diligence and compare the costs and time commitment of running your own on- premises desktop and application virtualization solution with simply subscribing to DaaS in the cloud. 12

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Desktop and Application Virtualization Management Best Practices... 1 Image Management

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Best Practices in Deploying Anti-Malware for Best Performance

Best Practices in Deploying Anti-Malware for Best Performance The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying

More information

Where Do I Start With Virtual Desktops?

Where Do I Start With Virtual Desktops? The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...

More information

Virtual Machine Environments: Data Protection and Recovery Solutions

Virtual Machine Environments: Data Protection and Recovery Solutions The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

How the Software-Defined Data Center Is Transforming End User Computing

How the Software-Defined Data Center Is Transforming End User Computing How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

How Configuration Management Tools Address the Challenges of Configuration Management

How Configuration Management Tools Address the Challenges of Configuration Management Streamlining Configuration Management The Essentials Series How Configuration Management Tools Address the Challenges of Configuration Management sponsored by Introduction to Realtime Publishers by Don

More information

Steps to Migrating to a Private Cloud

Steps to Migrating to a Private Cloud Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime

More information

Why Endpoint Encryption Can Fail to Deliver

Why Endpoint Encryption Can Fail to Deliver Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1

More information

The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage

The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...

More information

Mitigating Risks and Monitoring Activity for Database Security

Mitigating Risks and Monitoring Activity for Database Security The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring

More information

Understanding & Improving Hypervisor Security

Understanding & Improving Hypervisor Security The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1

More information

How the Software-Defined Data Center Is Transforming End User Computing

How the Software-Defined Data Center Is Transforming End User Computing How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis Building the Future of the Desktop on the Software-Defined Data Center... 1 What Is

More information

The Next-Generation Virtual Data Center

The Next-Generation Virtual Data Center The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization

More information

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Best Practices for Log File Management (Compliance, Security, Troubleshooting) Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers

More information

The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authorization. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authorization sponsored by by Richard Siddaway Authorization...1 What Needs to Be Protected?...1 Groups...2 Role-Based Access...2 Heterogeneous

More information

Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery

Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery Managing Your Virtualized Environment: Migration Tools, Backup and Disaster Recovery The Essentials Series sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones, Series Editor For

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to

More information

Non-Native Options for High Availability

Non-Native Options for High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...

More information

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway The Essentials Series: Enterprise Identity and Access Management Authentication sponsored by by Richard Siddaway Authentication...1 Issues in Authentication...1 Passwords The Weakest Link?...2 Privileged

More information

Making Endpoint Encryption Work in the Real World

Making Endpoint Encryption Work in the Real World Endpoint Data Encryption That Actually Works The Essentials Series Making Endpoint Encryption Work in the Real World sponsored by Ma king Endpoint Encryption Work in the Real World... 1 Th e Key: Policy

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems

Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems Solving the Storage Challenge Across Platforms: Transparent Compression for Windows Operating Systems sponsored by Dan Sullivan The Increasing Importance of Compression in the Enterprise... 1 Online Transactions

More information

Collaborative and Agile Project Management

Collaborative and Agile Project Management Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Collaborative and Agile Project Management

Collaborative and Agile Project Management Collaborative and Agile Project Management The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

How to Install SSL Certificates on Microsoft Servers

How to Install SSL Certificates on Microsoft Servers How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting

More information

Data Protection in a Virtualized Environment

Data Protection in a Virtualized Environment The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview

More information

Understanding the Business Benefits of Managed Services

Understanding the Business Benefits of Managed Services The Essentials Series: Managed Application Failover for the SMB Understanding the Business Benefits of Managed Services sponsored by by David Chernicoff Un derstanding the Business Benefits of Managed

More information

Controlling and Managing Security with Performance Tools

Controlling and Managing Security with Performance Tools Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance

More information

How Are Certificates Used?

How Are Certificates Used? The Essentials Series: Code-Signing Certificates How Are Certificates Used? sponsored by by Don Jones Ho w Are Certificates Used?... 1 Web Applications... 1 Mobile Applications... 2 Public Software...

More information

Using Web Security Services to Protect Portable Devices

Using Web Security Services to Protect Portable Devices Using Cloud Services to Improve Web Security The Essentials Series Using Web Security Services to Protect Portable Devices sponsored by Us ing Web Security Services to Protect Portable Devices... 1 Understanding

More information

Administration Challenges

Administration Challenges The Essentials Series: Enterprise Identity and Access Management Administration Challenges sponsored by by Richard Siddaway Administration Challenges...1 Heterogeneous Environments...1 Multiple Directories...1

More information

Matching High Availability Technology with Business Needs

Matching High Availability Technology with Business Needs The Essentials Series: Making High Availability Pay For Itself Matching High Availability Technology with Business Needs sponsored by by Matching High-Availability Tec hnology with Business Needs... 1

More information

Enabling Useful Active Directory Auditing

Enabling Useful Active Directory Auditing The Essentials Series: Tackling Active Directory s Four Biggest Challenges Enabling Useful Active Directory Auditing sponsored by by Greg Shields En abling Useful Active Directory Auditing... 1 The Native

More information

Realizing the IT Management Value of Infrastructure Management

Realizing the IT Management Value of Infrastructure Management The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1

More information

The Definitive Guide to Cloud Acceleration

The Definitive Guide to Cloud Acceleration The Definitive Guide to Cloud Acceleration Dan Sullivan sponsored by Chapter 5: Architecture of Clouds and Content Delivery... 80 Public Cloud Providers and Virtualized IT Infrastructure... 80 Essential

More information

Simplify VDI and RDS Private Clouds for SMBs

Simplify VDI and RDS Private Clouds for SMBs PRODUCT BRIEF Simplify VDI and RDS Private Clouds for SMBs VDI Private Cloud Konect Elite is an application and virtual desktop delivery software that offers the ability to dynamically sync, create, configure,

More information

Becoming Proactive in Application Management and Monitoring

Becoming Proactive in Application Management and Monitoring The Essentials Series: Improving Application Performance Troubleshooting Becoming Proactive in Application Management and Monitoring sponsored by by Becoming Proactive in Application Managem ent and Monitoring...

More information

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation

More information

Replication and Recovery Management Solutions

Replication and Recovery Management Solutions The Essentials Series: Virtualization and Disaster Recovery Replication and Recovery Management Solutions sponsored by by J. Peter Bruzzese Re plication and Recovery Management Solutions... 1 Pricing Models

More information

Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan

Tips and Tricks Guide tm. Windows Administration. Don Jones and Dan Sullivan Tips and Tricks Guide tm To tm Windows Administration Don Jones and Dan Sullivan Tip, Trick, Technique 13: Configuring Server Core in Windows Server 2008 R2... 1 Tip, Trick, Technique 14: What Are Microsoft

More information

The Art of High Availability

The Art of High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments The Art of High Availability by The Art of High Availability... 1 Why Do We Need It?... 1 Downtime Hurts... 1 Critical

More information

10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution

10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series 10 Must-Have Features for Every Virtualization Backup and Disaster Recovery Solution sponsored by Introduction to Realtime

More information

Quickly Recovering Deleted Active Directory Objects

Quickly Recovering Deleted Active Directory Objects The Essentials Series: Tackling Active Directory s Four Biggest Challenges Quickly Recovering Deleted Active Directory Objects sponsored by by Greg Shields Qu ickly Recovering Deleted Active Directory

More information

Dell vworkspace Supports Higher Education s Desktop Virtualization Needs

Dell vworkspace Supports Higher Education s Desktop Virtualization Needs Dell vworkspace Supports Higher Education s Desktop Virtualization Needs Prepared by Chris Lyman, Senior Systems Consultant Dell Cloud Client Computing Solutions Abstract As adoption of desktop virtualization

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Fulfilling HIPAA Compliance by Eliminating

Fulfilling HIPAA Compliance by Eliminating The Essentials Series: Fulfilling Compliance by Eliminating Administrator Rights Fulfilling HIPAA Compliance by Eliminating Administrator Rights sponsored by by Greg Shields Fu lfilling HIPAA Compliance

More information

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual

More information

What Are Cloud Connected Data Protection Services About?

What Are Cloud Connected Data Protection Services About? Protecting Client Data in the Cloud: A Channel Perspective The Essentials Series What Are Cloud-Connected Data Protection Services About? Architectural Advice for Resellers sponsored by Introduction to

More information

How to Use SNMP in Network Problem Resolution

How to Use SNMP in Network Problem Resolution The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

Auditing File and Folder Access

Auditing File and Folder Access The Essentials Series: Fundamentals of Effective File Server Security Auditing File and Folder Access sponsored by by Greg Shields Au diting File and Folder Access... 1 Auditing Considerations... 1 Co

More information

How To Get A Client Side Virtualization Solution For Your Financial Services Business

How To Get A Client Side Virtualization Solution For Your Financial Services Business SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,

More information

How to Install SSL Certificates on Microsoft Servers

How to Install SSL Certificates on Microsoft Servers How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft

More information

How to Install SSL Certificates on Microsoft Servers

How to Install SSL Certificates on Microsoft Servers How to Install SSL Certificates on Microsoft Servers Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens of high quality books

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) VMware Horizon DaaS: Desktop as a Cloud Service (DaaS) 1 43% of workforce using 3+ devices 74% of employees use consumer technologies, due to a lack of alternatives from IT 2010 The year the number of

More information

The Definitive Guide. Cloud Computing. Dan Sullivan

The Definitive Guide. Cloud Computing. Dan Sullivan The Definitive Guide tm To Cloud Computing Ch apter 10: Key Steps in Establishing Enterprise Cloud Computing Services... 185 Ali gning Business Drivers with Cloud Services... 187 Un derstanding Business

More information

Eight Ways Better Software Deployment and Management Can Save You Money

Eight Ways Better Software Deployment and Management Can Save You Money Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by

More information

Eradicating PST Files from Your Network

Eradicating PST Files from Your Network The Essentials Series: Operations Benefits of Email Archiving Eradicating PST Files from Your Network sponsored by by Jim McBee Eradicating PST Files from Your Network...1 Understanding the Disadvantages

More information

Relating High Availability Metrics to Business Value

Relating High Availability Metrics to Business Value The Essentials Series: Making High Availability Pay For Itself Relating High Availability Metrics to Business Value sponsored by by Relating High-Availability Metrics to Business Value... 1 How to Explain

More information

Top 10 Myths of Desktop Virtualization

Top 10 Myths of Desktop Virtualization Top 10 Myths of Desktop Virtualization www.virtualcomputer.com Copyright Virtual Computer, Inc. 2011 Top 10 Myths of Desktop Virtualization The Myths 1. Desktop virtualization is costly and requires big

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

MobiKEY TM with TruOFFICE

MobiKEY TM with TruOFFICE MobiKEY TM with TruOFFICE Virtual Desktop Infrastructure (VDI) SOLUTION February 8, 2011 Copyright 2011 Route1 Inc. All rights reserved. Route1, the Route1 and shield design Logo, SECURING THE DIGITAL

More information

Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2

Pr oactively Monitoring Response Time and Complex Web Transactions... 1. Working with Partner Organizations... 2 Pr oactively Monitoring Response Time and Complex Web Transactions... 1 An atomy of Common Web Transactions... 1 Asking for Decisions... 1 Collecting Information... 2 Providing Sensitive Information...

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

Lowering Costs of Data Protection through Deduplication and Data Reduction

Lowering Costs of Data Protection through Deduplication and Data Reduction The Essentials Series: The Evolving Landscape of Enterprise Data Protection Lowering Costs of Data Protection through Deduplication and Data Reduction sponsored by by Dan Sullivan Lo wering Costs of Data

More information

Boost your VDI Confidence with Monitoring and Load Testing

Boost your VDI Confidence with Monitoring and Load Testing White Paper Boost your VDI Confidence with Monitoring and Load Testing How combining monitoring tools and load testing tools offers a complete solution for VDI performance assurance By Adam Carter, Product

More information

By the Citrix Publications Department. Citrix Systems, Inc.

By the Citrix Publications Department. Citrix Systems, Inc. Licensing: The License Management Console By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS

More information

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com

Intelligent Laptop Virtualization No compromises for IT or end users. VMware Mirage danny.roefflaer@iriscorporate.com Intelligent Laptop Virtualization No compromises for IT or end users VMware Mirage danny.roefflaer@iriscorporate.com Little video to start with... The Problem with Laptops Windows XP support is expiring

More information

MobiKEY. Virtual Desktop Infrastructure (VDI) Integration. September 2012

MobiKEY. Virtual Desktop Infrastructure (VDI) Integration. September 2012 MobiKEY Virtual Desktop Infrastructure (VDI) Integration September 2012 Copyright 2012 Route1 Inc. All rights reserved. Route1, the Route1 and shield design Logo, SECURING THE DIGITAL WORLD, Mobi, MobiSecure,

More information

Isolating Network vs. Application Problems

Isolating Network vs. Application Problems The Essentials Series: Network Troubleshooting and Problem Identification Isolating Network vs. Application Problems sponsored by by Greg Shields Isolating Network vs. Application Problems...1 Common

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

VMware Horizon. VMware Horizon 6. Q. What is VMware Horizon? Central image management is supported for

VMware Horizon. VMware Horizon 6. Q. What is VMware Horizon? Central image management is supported for FREQUENTLY ASKED QUESTIONS VMware Horizon Q. What is VMware Horizon? A. VMware Horizon is a family of desktop and application virtualization solutions designed to deliver Windows and online services from

More information

Reducing Backups with Data Deduplication

Reducing Backups with Data Deduplication The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...

More information

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops

More information

Frequently Asked Questions: Desktone s Offerings and Market

Frequently Asked Questions: Desktone s Offerings and Market Frequently Asked Questions: Desktone s Offerings and Market General Virtualization Q: What is desktop virtualization? A: Desktop virtualization is the separation of a client operating system/environment

More information

Benefits of Using Data Loss Prevention Technology

Benefits of Using Data Loss Prevention Technology The Essentials Series: Email-Centric Data Loss Prevention Benefits of Using Data Loss Prevention Technology sponsored by by Dan Sullivan Benefits of Using Data Loss Prevention Technology...1 Need for Automated

More information

IBM FlashSystem and Atlantis ILIO

IBM FlashSystem and Atlantis ILIO IBM FlashSystem and Atlantis ILIO Cost-effective, high performance, and scalable VDI Highlights Lower-than-PC cost Better-than-PC user experience Lower project risks Fast provisioning and better management

More information

Desktop Virtualization Cloud Partner Training Series

Desktop Virtualization Cloud Partner Training Series Desktop Virtualization Cloud Partner Training Series August 2015 Table of Contents What is it? Benefits Industry Landscape Evolve is Different How we can help you $ucceed Who is a fit? Who is a challenge?

More information

Exchange Storage Meeting Requirements with Dot Hill

Exchange Storage Meeting Requirements with Dot Hill Technology Insight Paper Exchange Storage Meeting Requirements with Dot Hill By Randy Kerns October, 2012 Enabling you to make the best technology decisions Exchange Storage Meeting Requirements with Dot

More information

Business Value of Microsoft System Center 2012 Configuration Manager

Business Value of Microsoft System Center 2012 Configuration Manager Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration

More information

Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies. Terry Lewis Solutions Architect

Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies. Terry Lewis Solutions Architect Simplify the Deployment and Management of Desktop Virtualization & VDI Technologies Terry Lewis Solutions Architect Today s discussion Technology Drivers Desktop and Application Delivery Complexity Which

More information

The Shortcut Guide To

The Shortcut Guide To tm The Shortcut Guide To Securing Your Exchange Server and Unified Communications Infrastructure Using SSL Don Jones Ch apter 3: Best Practices for Securing Your Exchange Server... 32 Business Level Concerns

More information

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows

More information

How To Understand The Difference Between Network Analysis And Network Monitoring

How To Understand The Difference Between Network Analysis And Network Monitoring The Essentials Series: Network Troubleshooting and Problem Identification Bandwidth Monitoring and Traffic Analysis sponsored by by Greg Shields Bandwidth Monitoring and Traffic Analysis...1 Different

More information

VDI Security for Better Protection and Performance

VDI Security for Better Protection and Performance VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments

More information

VMware End User Computing

VMware End User Computing VMware End User Computing Overview 2014 VMware Inc. All rights reserved. Architecture for IT Any Device Business Mobility: Applications Devices Content Any Application Traditional Applications Modern,

More information

(VDI) William Stein, LHRIC. Jim Geueke, MainLine

(VDI) William Stein, LHRIC. Jim Geueke, MainLine Virtual Desktop Infrastructure (VDI) William Stein, LHRIC Jim Geueke, MainLine Why Desktop Virtualization? Central management of desktop images User receives a fresh image every time Easier Windows OS

More information