2 Wie bediene ich meine BYOD oder Mobile Zielgruppe? Martin Rohde
3 Common trends Bring Your Own PC Road Warriors Contract workers My work force is on the road all the time. My executives want to use Macs. But we only know Windows. We re OK if employees bring Macs but don t know how to manage them. My knowledge workers can t use a managed desktop. We need a standard application set in a secure, isolated environment. 4
5 How Big is the Opportunity? Macs are growing including in the enterprise! Source: Gartner. 6
6 How Big is the Opportunity? Temporary Workers in the US are increasing Source: Bureau Labor Statistics. 7
7 What is the Solution?
8 New Solution in EUC Desktop Portfolio Horizon Desktop and app delivery from private cloud Horizon Air Desktop and app delivery from public cloud Horizon FLEX Desktop and apps delivered locally on Macs and PCs Private Cloud Public Cloud Local 9
9 Key Benefits of VMware Horizon FLEX Embrace BYO and Macs in the Enterprise Easily deliver local virtual desktops to Mac or PC users with incredible flexibility Simplify Desktop Management with Desktop Containers Easily entitle, control and secure the Windows virtual desktops for your Mac users, contractors and road-warriors Work From Anywhere, Even When Disconnected Get access to a rich desktop experience through our industry leading clients and ensure productivity, even when on the road or disconnected from the network. Easily Update the Content of Your Virtual Desktops Manage, backup or patch Windows virtual desktops using the Mirage for Horizon FLEX layering technology or continue to use your own Windows image management tools Reduce Costs by Decreasing Training Needs and Eliminating Provisioning of Physical Laptops 10
10 Key Horizon FLEX Use Cases Bring Your Own Macs in the Enterprise Road-warriors Contractors 11
11 Horizon FLEX Packaging 200 per device Control Clients Image Mngmt Horizon FLEX FLEX Policy Server FLEX Client (Mac & PC) Mirage 12
12 Endpoint Recovery and Continuity Stream CVD to new device Dell Fully managed / synchronized Content Apps OS VMware Mirage Server WAN Re-base CVD onto VM Access files via Web portal HP VM Pool Content Apps OS for VM Access PC on central VM via PCoIP/RDP/HTML5 1. Migrate full image (CVD) into data center 2. Access CVD files through Wanova portal 3. Mount CVD onto VM for universal access 4. Restore CVD onto a new device
13 Horizon FLEX Offers Centralized Control with Local Execution Central Control FLEX policy management server Local Productivity Horizon FLEX Client (Fusion Pro on the Mac / Player Pro on the PC) 1 4
14 Horizon FLEX Policies Horizon FLEX control points: - Time limit (expiration) - Grace period (disconnected use time-out) - Poll frequency (for policy updates) - Remote lock (revoke access) - USB device access (on/off) - Data copying (Drag & Drop, copy & paste) - Limit access to virtual machine settings Horizon FLEX deployment: - Virtual machine entitlement (individual or group) - Virtual machine distribution (via network or USB Key) 15
15 Best of Class Clients for Simple Local Execution 16
16 Competition Moka 5 licenses Fusion & Player on the client side Citrix Desktop Player licenses Virtual Box on the client side Fusion / Player are far superior solutions We control our destiny, they don t. Moka 5 Citrix Desktop Player 17
17 How Does Horizon FLEX Work?
18 Connect to the FLEX Server 20
19 Download the Virtual Machine 21
20 All VMs are Encrypted and Password Protected 22
21 Get Access to a Full Windows Desktop 23
22 Get a Rich User Experience 24
23 Virtual Machines can be Remote-Locked 25
24 BYOD Horst Hamrik
25 Unternehmensdaten Mitarbeiter 150 Länder 17 Sprachen 11 globale Standorte Q Q Kunden Kunden und und weiter weiter wachsend wachsend Q Q Q Q Q Q Q Q Unsere Mission: Unternehmensmobilität vereinfachen.
28 Build: Custom BYOD Program MDM OR AirWatch Inbox AirWatch Secure Content Locker AirWatch Browser AirWatch App Catalog AirWatch Workspace Wrapped Calendar Wrapped Map AirWatch TV
29 What Does Security Mean to AirWatch? Protecting sensitive information App whitelists/blacklists FIPS-140 compliance Device restrictions Certificate-based access Data loss prevention Device and app-level policies Compliance monitoring 256-bit SSL encryption Built-in security features Remote commands Multi-factor authentication Compromised device detection Secure access to corporate resources
VMware Horizon 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Introducing XenDesktop, built on the Avalon platform Citrix XenDesktop transforms Windows apps and desktops into a secure, mobile service for any user, any device, anywhere. 2 Citrix XenDesktop enables
Data Sheet Symantec TM Workspace Streaming 6.1 Workspace Management: Simplify IT Organizations Overview As IT organizations today face the reality of managing an increasingly complex mix of desktops, laptops,
Optimizing with Citrix NetScaler White Paper Three keys to building the best front-end network for virtual desktop delivery www.citrix.com Executive summary Motivated by the compelling benefits virtual
Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The
Citrix Enterprise Mobility more than just device management (MDM) Fabian.Kienle@citrix.com Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
Insight-eSeminar zum Thema BYOD, 2012-09-20 Bernhard Kammerstetter Client Technical Professional für IEM in ALPS (CH, FL und AT) Email: Bernhard_Kammerstetter@at.ibm.com Telefon: +43 1 21145 3392 Private
Release Version 3 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
vshield Manager 5.0.1 vshield App 5.0.1 vshield Edge 5.0.1 vshield Endpoint 5.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Exam : 70-688 Title : Managing and Maintaining Windows 8 Version : Demo 1 / 19 1.DRAG DROP Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not
F5 BIG-IP DATASHEET What s Inside: 2 Improved User Experience 3 Network Access 5 Application Access Secure Access to Specific Applications 6 Portal Access Proxy-Based Access to Web Applications, Files,
10 must-haves for secure enterprise mobility White Paper The 10 musthaves for secure enterprise mobility A security framework and evaluators checklist 2 Becoming a mobile enterprise means new opportunities
BROCHURE MITEL MiCOLLAB KEEPING PEOPLE CONNECTED AND PRODUCTIVE ANYTIME, ANYWHERE, ON ANY DEVICE Effective collaboration among employees, partners and customers is a critical driver of any organization
Symantec Backup Exec 12 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Today s small businesses
In-Depth Look at Capabilities: Samsung KNOX and Android for Work Silent Install Using the Samsung KNOX Workspace Mobile Device Management (MDM) APIs, IT admins can install and enable applications automatically.
INDUSTRY OUTLOOK M AY 2 0 1 2 The Virtual Office: The Next-Generation Workplace INDUSTRY OUTLOOK 2012: THE VIRTUAL OFFICE Enabling mobile access to corporate applications drives workforce productivity,
Succeeding in your BYOD initiative with the MicroStrategy Mobile App Platform Bryan Kolburn, Sr. Director, Mobile Service Line MicroStrategy firstname.lastname@example.org The Mobile Service Line A commitment
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
BEST PRACTICES WHITE PAPER A path to improving the end-user experience By David Williams, Vice President of Strategy, Office of the CTO, BMC Software TABLE OF CONTENTS EXECUTIVE SUMMARY...............................................
ProfileUnity with FlexApp Technology Help Manual Introduction This guide has been authored by experts at Liquidware Labs in order to provide information and guidance concerning ProfileUnity with FlexApp.
What ios 7 Means for the Enterprise Introduction 3 1. ios 7 Mobile Application Management Enhancements 4 Enhancements to Accelerate Enterprise Application Development and Use 5 Enterprise Application Single
OpenScape Business The all-in-one Unified Communications solution for SMBs. Improve your performance and take your business to the next level with Unified Communications. Amplifying opportunities The success
WHITE PAPER: LICENSE MANAGEMENT........................................ Symantec Workspace Streaming: Enabling the Dynamic Management of Software Licenses Who should read this paper IT organizations that
VMware vsphere with Operations Management and VMware vsphere Licensing, Pricing and Packaging WHITE PAPER Table of Contents Executive Summary.... 3 VMware vsphere with Operations Management Overview....