Deploying and Managing Thin Clients. A white paper by Wyse Technology Inc.

Size: px
Start display at page:

Download "Deploying and Managing Thin Clients. A white paper by Wyse Technology Inc."

Transcription

1 Deploying and Managing Thin Clients A white paper by Wyse Technology Inc.

2 Abstract In this article, we will consider some of the requirements for a large-scale thin client deployment. We will cover the following topics: Enterprise Security User Experience and Mobility Network Scalability and Interoperability Asset Management and Health Monitoring We will also review the key features of Wyse Device Manager (WDM), for addressing these requirements. 1

3 Table of Contents INTRODUCTION CONSIDERATIONS FOR LARGE-SCALE DEPLOYMENTS THIN CLIENT MANAGEMENT WITH WYSE DEVICE MANAGER CONCLUSION APPENDIX A ABOUT WYSE TECHNOLOGY INC

4 INTRODUCTION By some estimation, each day 10-million enterprise users access their corporate network and applications through thin clients. Thin clients run simplified versions of Operating Systems (ex: Windows XP Embedded, Linux, Windows CE, or vendor-specific OS like Wyse Thin OS) and a limited set of applications. The combined solution provides just enough hardware and software resources to connect to remote back-end infrastructures such as Citrix Application Delivery, Microsoft Terminal Services or Hyper-V, and VMware Virtual Desktop Infrastructure (VDI). All corporate applications and resources reside within these back-end environments. What is a thin client? It is a client computer in clientserver architecture networks, which depends primarily on the central server for processing activities, and mainly focuses on conveying input and output between the user and the remote server. Their reduced complexity makes thin clients the ideal front-end computing platform for VDI and other client virtualization environments. Organizations of all size are able to realize the following benefits: Lower TCO Lower energy consumption Reliability of mission-critical operations Increased data security While traditional PCs work well with virtual desktops, they are too power hungry, have redundant resources and management needs, therefore cost more. Besides, they offer little compelling functionality in exchange for the added complexity they bring. 3

5 Figure 1: Thin clients are ideal for VmWare VDI Architecture (picture from wmware.com) Thin clients, on the other hand, are cost-effective, and have just enough resources. But they also allow IT challenges to be aggregated to corporate datacenters where dedicated staff can provide much faster, higher quality of service and realize economies of scale in terms of energy savings, storage optimization, and server virtualization. CONSIDERATIONS FOR LARGE-SCALE DEPLOYMENTS There have been numerous studies about the cost advantage and other benefits of thin clients. In this article, we want to discuss some important, but often understated, remote management aspects for deploying thin clients. To illustrate how critical remote management can be, consider the following question: What do you do when a reservation agent in Honolulu airport notifies your IT department in Chicago that his computer screen is black? The implied requirement is the ability to automatically manage and to seamlessly interact with thin clients, regardless of their geographical location. The speed of remedial actions will have a big impact on the end-user experience, employee productivity, and reliability of mission-critical operations. 4

6 The example above highlights only one of several issues, which you need to foresee for a large-scale deployment. In a broad sense, the challenges can be grouped into the following categories: Enterprise Security User Experience and Mobility Network Scalability and Interoperability Asset Management and Health Monitoring Enterprise Security Often thin clients exist in networks that carry sensitive business information, such as in a branch office of a bank, connected to a server in the headquarters through a remote connection protocol. In an environment like this, it is imperative that thin clients operate according to well-defined policies and all customizations or local applications be installed through the central IT department to minimize voluntary or involuntary security breaches. Most importantly, all communications between thin clients and backend servers must be fully encrypted. While thin clients offer significant security benefits over traditional PCs, highest levels of security require that there is no clear text data flowing through the corporate network. Otherwise, attacks like man-in-the-middle where a malicious 3rd party intercepting a software download and interjecting a Trojan horse is possible Note that financial companies are not the only organizations grappling with these risks. Take a Health-Care institution that has to secure patient information, or a retail business that has to process VISA transactions. Most organizations must secure their network with industry-standard encrypted HTTPS protocol. In short, without full encryption, any large-scale deployment across multiple geographies, particularly with any network topology that has to traverse the Public IP Network represents a potential risk to the organization. User Experience and Mobility One size does not fit all, and neither does one network! Traditionally thin clients were confined to ticket counters in Airports or tellers in bank branches. The industry term for these use-cases is task-based computing. However, with the rapid proliferation of 5

7 Client Virtualization technology, more and more mainstream users, often referred to as knowledge workers are adopting thin clients. The mainstream users bring along a new set of experience requirements that must be addressed. They want to be able to roam across public IP networks and they demand to have a personalized computing experience. As a trend, more and more organizations are embracing the next generation of Virtualization based thin computing, for the following reasons: Ability to roam in a campus Ability to work from SOHO Ability to travel while working with highly-sensitive information (ex: Airport, Automobile) In many instances, these devices will be located across the public IP network, behind residential gateways or other network elements. Without the right network architecture planning and necessary remote access capabilities, securing and managing these devices will be difficult. The remote management solution has to work across multiple IP networks, architected to provide the right balance of security and accessibility. Furthermore, it should provide a wealth of policy creation and enforcement features to allow for various device configurations and user customizations. When a user travels to Hong Kong from London with his/her portable thin client, the geography and time zone based management policies should gracefully adapt to user mobility. Reaching out to mainstream users also requires a special attention to their unique experience needs. A strong pushback from the end-users may create resistance in your organization and put deployment plans in jeopardy. While there have been advances in desktop virtualization technologies, there are still a number of technical issues that can only be dealt at the thin client side. "Which local printer do you connect to? What USB mouse did you plugin? What was the monitor resolution size you chose? Can your PDA synchup with your outlook calendar / contact information running on the backend server? How do you remember the SSID/Password for the Wi-Fi net work?" In addition, users may want to install applications, particularly on Windows XP Embedded and Linux based thin clients. What should be the policy towards these local 6

8 customization attempts and how do you enforce these policies? Network Scalability and Interoperability Compared to PCs, thin clients have significantly extended life cycle. According to customers, an average thin client is fully operational for 7 years, whereas a PC would have to be replaced every 3 years. The net result is additional cost-savings. But on the flipside, the thin client base operating system and local applications may have to upgraded on an ongoing basis to ensure seamless functionality over a longer period of time. Many thin clients, particularly Windows XP Embedded based devices, require up 250 Mbytes or more memory for the operating system and applications. Imagine you have found a critical security hole in your thin client operating system and all devices must be updated immediately. What is your strategy for upgrading 10,000 thin clients around the world with the latest OS and Applications, with download sizes exceeding 250 Mbytes? The network scalability plan should include remote software repositories so that updates can be propagated to geographically disperse locations in the most efficient and automated manner. In addition, the remote management capabilities should include features for managing remote thin client policies. Remote repositories can be great assets to optimize your network traffic. However, they may not be suitable for every location. A Point-of-Sales terminal in a small store in a shopping mall will be better served with a direct connection to a regional software repository. In cases like that, it is important that the management software provide adequate bandwidth-throttling to handle network limitations. With proper planning and adequate policy enforcements previously mentioned, thin clients should operate flawlessly. However, plans are never perfect and unforeseen problems do arise. As an example, thin clients store their software on Flash Memory. In a few instances, like power interruptions during software upgrades, images may become corrupted, rendering thin clients nonoperational, also known as bricked device. The remedial action is to reimage or de-brick the device across the network. A common practice is to use Pre-Boot Execution (PXE) capabilities, provided by device BIOS, to initiate a software upgrade (a.k.a imaging ) over the network. Ease of de-bricking a remote device, or lack thereof, will impact your Total Cost of Ownership Unfortunately, PXE boot requires specially configured DHCP servers and does not work well across WANs and not at all across the public IP networks. When a thin client OS is 7

9 corrupted and the required action is to de-brick the device, there should be a non- PXE solution, that is, a solution that doesn t require PXE setups on the network. Asset Management and Health Monitoring We have covered many useful features for fixing thin clients when they break. But the best strategy to maximize your Return-On-Investment is to prevent these problems before they occur. Policy management is an important methodology to ensure the healthy operations of thin clients. By creating various user and device policies, you can ensure the proper usage of the company assets, therefore eliminate most, if not all, problems that stem from improper customizations, incompatible peripherals, undesired local applications, and so on. While a simplistic approach of locking-down the device or one-profile for everyone may be okay for some organizations, there are many instances where this generic approach is not adequate. The device policy and security management should give System Administrators the flexibility to customize these policies based on various factors like user-profile, location, time-zone, job-function, and so on. It may be midnight in San Francisco, but that doesn't mean that traders in an investment bank should see their devices reboot and update their software at 9:00 A.M. in Frankfurt. Another important consideration is extensive asset reporting and tracking. Through tracking and reporting, IT staff can ensure that that right users have the right environment to maximize their productivity. A trading-desk agent might have a dual-screen with a Bloomberg key board, whereas a senior executive may like to have a rather minimalistic device on his desk. IT teams can proactively resolve issues if the system provides real-time asset management and reporting. For instance, when a new operating system or application update is provided, or when a device configuration is changed, the system should be able to gather reports from the thin clients, comparing these reports to a reference, and flag any discrepancies, or better yet, take automated action to remedy any problem ensuring that the end-user experience is consistent with the desired policies. These advanced asset management and health-monitoring data constitute a critical part of business operations and must be stored in a sophisticated, distributed and/or clustered, relational database, such as SQL or Oracle DB. Any flat-file based information 8

10 storage solution may appear straightforward in a Lab or a proof-of-concept but in the end will not scale for a large-scale deployment. THIN CLIENT MANAGEMENT WITH WYSE DEVICE MANAGER 4.7 In planning a large-scale thin client deployment, the key considerations are Enterprise Security, User Experience and Mobility, Network Scalability and Interoperability, and Asset Management and Health-Monitoring. While there are many solutions targeted for PC management, WDM is purpose-built for thin clients. We believe that a generic management solution is not adequate simply because: Thin clients run a diverse set of Embedded OS s, not just Windows Thin clients require very strong profile based policy enforcement for task-based computing Thin clients are imaged / provisioned through the network Thin clients require specific Asset Database for tracking and fast remote diag nosis Thin clients require tight-integration with ancillary network assets like remote software repositories Wyse designed WDM 4.7 to address all these challenges and to make a large-scale thin client deployment as straightforward as possible. We will use the following simplified network topology (Figure 2) to outline the features that make WDM the industry s most advanced thin client Management Software. In this example, there are multiple sites, including telecommuters in a SOHO setup or end-users in branch offices, while there is also a large thin client installation within the corporate network. WDM is installed as a distributed architecture. Branch offices have NAT/Gateways and Remote software Repositories. Asset Database is a SQL 2005 server cluster and multiple Administration GUIs allow segregation of Administrative duties for various sub-groups. These groups can be based on geography, network topology, device configuration, user profile, and so on. 9

11 Figure 2: Network architecture for large-scale thin client deployment Enterprise Security For ensuring the highest level of security, all communications between various network elements, like the thin clients, WDM Server, Remote software Repositories are based on full HTTPS encryption. Furthermore, to reduce deployment cost, the HTTPS certificates are self-signed and thin clients have the necessary logic to authenticate the WDM Server component. For the first time in thin client management, IT teams have the option to fully encrypt their network traffic and disable almost all server ports (except for HTTP/S, typically port 80/443) to ensure a higher-level of security. Besides security, full encryption allows IT staff to deploy additional techniques like compression to increase network efficiency. 10

12 WDM 4.7 supports the following features to make it the Industry s most-secure thin client management software. HTTPS based Server-Client Communication HTTPS based Server-Remote software Repository Communication HTTPS based Device Software Imaging Ability to authenticate self-signed HTTPS Certifications Server Client paired encrypted key for pairing clients with genuine manage ment server Ability to separate the Asset Database from the WDM server for DMZ installa tions User Experience and Mobility Next, let us take a look at enabling User Experience and Mobility where thin clients are connected to the public IP networks. To make WDM services like remote imaging shadowing, firmware upgrade and real-time asset tracking accessible, at least a portion of the WDM components must be installed in corporate DMZ network. However, the risk of exposing the Asset Database on a DMZ is simply unacceptable for many organizations. So, instead of running all the components in DMZ, we will simply attach WDM to an SQL 2005 server running inside the secure corporate networks. Alternatively, we can install and start a new SQL service inside the network. WDM has a very powerful device policy management module, called Default Device Configurations. By creating the right groupings, we will make sure that roaming users get all the proper updates and other policy enforcements, without being impacted by geography glitches. WDM 4.7 offers: DMZ friendly component installation for managing roaming or telecommuting end-users Powerful and flexible user configuration / policy management through Default Device Configuration (DDC) Extensive customization, device personalization and peripheral connection 1 1 In conjunction with Wyse TCX Multimedia Acceleration and USB Virtualization Features 11

13 Network Scalability and Interoperability WDM ensures that high-latency downloads occur only between the Master and Remote software Repositories. All device image updates should occur through the local / nearest Remote software Repository. Remote repositories act as local mirrors of the Master Software Repository and they automatically synch with the Master Repository. Furthermore, the new Non-PXE boot capabilities in WDM 4.7 provide seamless Network Interoperability. Windows and Linux based Remote Software Repositories Dealing with large images through distributed software download locations Adjusting to remote location bandwidth limitations through bandwidth-throt tling Imaging / Remote management over public IP networks: Non-PXE Boot HTTP / HTTPS based software imaging Asset Management and Health Monitoring WDM 4.7 has industry leading policy management tools. Different types of configurations, based on location, subnet, device type, and so on, can be created with up to 90 levels of hierarchy. These configuration policies are called Default Device Configuration (DDC) and ensure that a particular device belonging to a particular DDC group behaves exactly the way intended. Administration delegation is another powerful technique that is available in WDM and is integrated with Microsoft Active Directory services. This allows Administrators to set up restricted views and designate sub-group Administrators to manage a subset of thin clients, based on the policies set by the root administrators. WDM also supports remote GUI connections so those delegate Administrators can connect to the WDM sever and the Asset Database. 12

14 WDM comes packed with powerful scripts and queries for Asset Tracking and Reporting. In addition, Administrators have full access to the powerful relational Database, MS SQL, which contains the Asset data. Any comprehensive Asset Management and Health- Monitoring solution must rely on an industry-standard Relational Database. Powerful and flexible Default Device Configuration (this feature is worth men tioning a second time) Administration Delegation MS SQL Relational Database for Asset Tracking CONCLUSION In this white paper, we have reviewed some of the considerations for a large-scale thin client deployment program and discussed how to design and manage a thin client computing infrastructure with Wyse Device Manager, (WDM). This has shown that while thin client management may appear straightforward at the outset, a sophisticated management such as Wyse WDM is required to deliver the full benefits of a thin computing solution. WDM 4.7 is an advanced, purpose-built, thin client management software that provides superior security, better accommodation for end-user experience and mobility, additional logic and features for network scalability and interoperability and finally a world-class asset management and health-monitoring feature-set. 13

15 Appendix A About Wyse Technology Inc. Wyse Technology is the global leader in thin computing. Wyse and its partners deliver the hardware, infrastructure software, and services that comprise thin computing, allowing people to access the information they need using the applications they want, with better security, manageability, and at a much lower total cost of ownership than a PC. Thin computing allows CIOs and senior IT professionals to reduce costs, manage risk, and deliver access to information. Wyse partners closely with industry leaders Microsoft, Citrix, VMware, and others to achieve this objective. Wyse is headquartered in San Jose, California, with offices worldwide. For more information, visit the Wyse web site at or call GET-WYSE 2008 Wyse Technology Inc. The Wyse logo and Wyse are trademarks of Wyse Technology Inc. Other product names mentioned herein are for identification purposes only and may be trademarks and/or registered trademarks of their respective companies. Specifications subject to change without notice. Some features require support by server operating system and protocol.. 09/ Rev. A Wyse Technology Inc North First Street San Jose, CA Wyse Sales: 800 GET WYSE ( ) Sales: Wyse Customer Service Center: WYSE ( ) Or send to: sales@wyse.com Visit our website at:

Wyse Device Manager TM

Wyse Device Manager TM Wyse Device Manager TM Secure, flexible and effective thin client management software All youneed toknow.here. An introduction to Wyse Device Manager TM Minimize your desktop support costs. Maximize desktop

More information

Release Version 3 The 2X Software Server Based Computing Guide

Release Version 3 The 2X Software Server Based Computing Guide Release Version 3 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

Release Version 4.1 The 2X Software Server Based Computing Guide

Release Version 4.1 The 2X Software Server Based Computing Guide Release Version 4.1 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

Only Athena provides complete command over these common enterprise mobility needs.

Only Athena provides complete command over these common enterprise mobility needs. Mobile devices offer great potential for making your enterprise run faster, smarter, and more profitably. However, mobile devices can create considerable challenges for your IT organization, since they

More information

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and

More information

Dell Wyse cloud client device management

Dell Wyse cloud client device management Wyse Dell Wyse cloud client device management This interactive PDF is best viewed in Adobe Acrobat 9 or above. Dell Wyse cloud client device management. All you need to know, here: Dell Wyse device management

More information

WDM Security Guidelines

WDM Security Guidelines WYSE TECHNOLOGY INC. WDM Security Guidelines Whitepaper v1.0 This document provides details on configuring Wyse Device Manager (WDM) to securely manage your Wyse cloud clients and zero clients. It provides

More information

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide

Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Citrix MetaFrame Presentation Server 3.0 and Microsoft Windows Server 2003 Value Add Feature Guide Advanced Functionality Basic Functionality Feature MANAGEMENT Microsoft Management Console Enhanced Connection

More information

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services What You Will Learn Windows Server on WAAS reduces the cost and complexity

More information

2X ThinClientServer: How it works An introduction to 2X ThinClientServer, its features and components

2X ThinClientServer: How it works An introduction to 2X ThinClientServer, its features and components 2X ThinClientServer: How it works An introduction to 2X ThinClientServer, its features and components 2X ThinClientServer provides a complete solution for the central deployment, configuration and management

More information

VMware View 4 with PCoIP I N F O R M AT I O N G U I D E

VMware View 4 with PCoIP I N F O R M AT I O N G U I D E VMware View 4 with PCoIP I N F O R M AT I O N G U I D E Table of Contents VMware View 4 with PCoIP................................................... 3 About This Guide........................................................

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Desktop Virtualization: A Buyer s Guide

Desktop Virtualization: A Buyer s Guide Desktop Virtualization Buyer s Guide Desktop Virtualization: A Buyer s Guide Published: May, 2008 TABLE OF CONTENTS INTRODUCTION... 2 A BRIEF OVERVIEW OF THE DESKTOP DELIVERY APPROACH... 3 User experience

More information

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation

More information

WhitePaper CHOOSING THE RIGHT THIN CLIENT DEVICES, OS & MANAGEMENT SOFTWARE. What to look out for when buying thin client software and hardware

WhitePaper CHOOSING THE RIGHT THIN CLIENT DEVICES, OS & MANAGEMENT SOFTWARE. What to look out for when buying thin client software and hardware CHOOSING THE RIGHT THIN CLIENT DEVICES, OS & MANAGEMENT SOFTWARE What to look out for when buying thin client software and hardware CHOOSING THE RIGHT THIN CLIENT DEVICES, OS & MANAGEMENT SOFTWARE Server

More information

Desktop Virtualization Technologies and Implementation

Desktop Virtualization Technologies and Implementation ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method

More information

Cisco UCS Central Software

Cisco UCS Central Software Data Sheet Cisco UCS Central Software Cisco UCS Manager provides a single point of management for an entire Cisco Unified Computing System (Cisco UCS) domain of up to 160 servers and associated infrastructure.

More information

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Windows 2000. NCD ThinPATH

Windows 2000. NCD ThinPATH O S E N V I R O N M E N T Thin Client Computing: Windows 2000 and NCD ThinPATH By Blaine Branchik Terminal Services is an integral part of Windows 2000 that, through server-based applications and centralized

More information

Desktop Virtualization Solutions Simplified Appliance

Desktop Virtualization Solutions Simplified Appliance Desktop Virtualization Solutions Simplified Appliance Seizing opportunities in today s mobile and social world Today s business models and customer engagements are increasingly real-time, dynamic and contextual.

More information

CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS Number: 1Y0-A16 Passing Score: 550 Time Limit: 165 min File Version: 37.5 http://www.gratisexam.com/ CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS Exam Name: Architecting

More information

Cisco WAAS Optimized for Citrix XenDesktop

Cisco WAAS Optimized for Citrix XenDesktop White Paper Cisco WAAS Optimized for Citrix XenDesktop Cisco Wide Area Application Services (WAAS) provides high performance delivery of Citrix XenDesktop and Citrix XenApp over the WAN. What ou Will Learn

More information

White Paper. Optimizing your Microsoft application and infrastructure investments with Citrix CloudBridge. citrix.com

White Paper. Optimizing your Microsoft application and infrastructure investments with Citrix CloudBridge. citrix.com White Paper Optimizing your Microsoft application and infrastructure investments with Citrix CloudBridge Businesses of all types and sizes worldwide rely on a variety of Microsoft solutions, from key productivity

More information

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper Enterprise-class desktop virtualization with NComputing Clear the hurdles that block you from getting ahead Whitepaper Introduction Enterprise IT departments are realizing virtualization is not just for

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

Rapport Administrative Software for Compaq Thin Clients

Rapport Administrative Software for Compaq Thin Clients White Paper May 2001 Prepared by Thin Client Product Marketing Compaq Computer Corporation Contents Introduction...3 Features...3 Benefits...3 Rapport Versions...4 Power Functionality...5 Familiar Windows

More information

Windows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration

Windows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration Windows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration Windows Embedded Technical Article Summary: Microsoft RemoteFX is a new Windows Server 2008 R2 SP1 feature that enables

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

How To Use A Vmware View For A Patient Care System

How To Use A Vmware View For A Patient Care System Delivering Epic Hyperspace Through VMware View Using Kiosk Mode and Zero Clients Reference Implementation for a VMware Point-of-Care Solution WHITE PAPER About VMware Reference Implementations VMware Reference

More information

Choosing the right thin client devices, OS & management software

Choosing the right thin client devices, OS & management software Choosing the right thin client devices, OS & management software What to look out for when buying thin client software and hardware Server Based Computing is a must for any company wanting to control spiraling

More information

Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software

Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software FAST, RELIABLE, & JUST WORKS! White Paper Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software Proxy Networks, Inc. 877-PROXY-US or 617-453-2700 www.proxynetworks.com

More information

PROPALMS TSE 6.0 March 2008

PROPALMS TSE 6.0 March 2008 PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...

More information

How Using V3 Appliances Virtual Desktop Total Cost of Ownership (TCO) is Reduced: A Superior Desktop Experience For Less Money

How Using V3 Appliances Virtual Desktop Total Cost of Ownership (TCO) is Reduced: A Superior Desktop Experience For Less Money How Using V3 Appliances Virtual Desktop (TCO) is Reduced: A Superior Desktop Experience For Less Money www. ipro-i nc.com/i t Contents VDI Overview...3 Introduction...3 Examining V3 s VDI...3 General Benefits

More information

Business Value of Microsoft System Center 2012 Configuration Manager

Business Value of Microsoft System Center 2012 Configuration Manager Business Value of Microsoft System Center 2012 Configuration Manager Sponsored by: Microsoft Corporation Publish date: February 2013 Abstract: Microsoft System Center 2012 Configuration Manager ( Configuration

More information

Virtual Client Solution: Desktop Virtualization

Virtual Client Solution: Desktop Virtualization IBM System x and BladeCenter Virtual Client Solution: Desktop Virtualization Powered by and VMware View June 29, 2010 Agenda 1 2 3 4 5 6 Virtual client solution overview Addressing companies pain points

More information

EMA Product Brief: Desktop Virtualization with Quest

EMA Product Brief: Desktop Virtualization with Quest EMA Product Brief: Desktop Virtualization with Quest HIGHLIGHTS Vendor name: Quest Software Product name: vworkspace Production function: Desktop Virtualization Host Operating Systems Support: Windows

More information

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

A10 ADC Return On Investment

A10 ADC Return On Investment WHITE PAPER A10 ADC Return On Investment Table of Contents Introduction...3 Streamline Operations to Maximize Efficiencies...3 Server Offload Is the Key...3 SSL Acceleration...4 TCP Optimization...5 RAM

More information

Desktop Virtualization. The back-end

Desktop Virtualization. The back-end Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers

More information

Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs

Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs Beyond Quality of Service (QoS) Cost Savings Unrealized THE

More information

Using AnywhereUSB to Connect USB Devices

Using AnywhereUSB to Connect USB Devices VMWARE TECHNICAL NOTE VMware ESX Server Using to Connect Devices Digi International s Remote I/O Concentrator is a remote networking solution that utilizes over IP technology, called RealPort, to enable

More information

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

Maximize your Remote Desktop Services

Maximize your Remote Desktop Services Maximize your Remote Desktop Services White paper Parallels An Overview of Remote Desktop Services Virtualization has added new issues to information technology. Today, businesses look not only at optimizing

More information

How To Create A Desktop Computer From A Computer Or Mouse And Keyboard (For Business)

How To Create A Desktop Computer From A Computer Or Mouse And Keyboard (For Business) Wyse WSM The power of a PC. Without the complexity. : Learn all you need to know. Here. Introducing Powerful, cost-effective desktop and application virtualization for businesses of all sizes. delivers

More information

How To Use Ibm Tivoli Monitoring Software

How To Use Ibm Tivoli Monitoring Software Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by

More information

www.chippc.com Xcalibur Global 1.2

www.chippc.com Xcalibur Global 1.2 Xcalibur Global 1.2 www.chippc.com Xcalibur Global 1.2 Management Software One Platform No Limits... Thin Client Management Active Directory Users & Groups Policy Based Management Devices Users VDI Management

More information

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland

Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows

More information

NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK

NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK 1. ThinPoint solution to Access your Own PC You require your business users to access their own PC in the office remotely

More information

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0

Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0 Ports Reference Guide for Cisco Virtualization Experience Media Engine for SUSE Linux Release 9.0 Ports 2 Virtualization Experience Media Engine 2 Virtualization Experience Client Manager 3 Cisco Jabber

More information

Network device management solution

Network device management solution iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems

More information

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

An Analysis of Propalms TSE and Microsoft Remote Desktop Services An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management

More information

Desktop Delivery: Making Desktop Virtualization Work

Desktop Delivery: Making Desktop Virtualization Work Desktop Delivery: Making Desktop Virtualization Work Published: April, 2008 TABLE OF CONTENTS SUMMARY...2 CHALLENGES WITH TRADITIONAL DESKTOPS...3 DESKTOP VIRTUALIZATION OVERVIEW...4 DESKTOP VIRTUALIZATION

More information

Infortrend EonNAS 3000 and 5000: Key System Features

Infortrend EonNAS 3000 and 5000: Key System Features Infortrend EonNAS 3000 and 5000: Key System Features White paper Abstract This document introduces Infortrend s EonNAS 3000 and 5000 systems and analyzes key features available on these systems. Table

More information

Benefits of the Virtual Desktop on Enterprise Networks

Benefits of the Virtual Desktop on Enterprise Networks Benefits of the Virtual Desktop on Enterprise Networks Introducing Enterprise Desktop Virtualization A white paper by Wyse Technology Inc. Abstract The personal computer revolution is far from over, but

More information

Citrix Provisioning Services Administrator s Guide Citrix Provisioning Services 5.1 SP2

Citrix Provisioning Services Administrator s Guide Citrix Provisioning Services 5.1 SP2 Citrix Provisioning Services Administrator s Guide Citrix Provisioning Services 5.1 SP2 December 2009 Revision 4 Copyright and Trademark Notice Information in this document is subject to change without

More information

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

CA XOsoft Content Distribution v4

CA XOsoft Content Distribution v4 PRODUCT BRIEF: CA XOSOFT CONTENT DISTRIBUTION CA XOsoft Content Distribution v4 CA XOSOFT CONTENT DISTRIBUTION (FORMERLY CA XOSOFT WANSYNC CD) IS A SIMPLE, HIGHLY FLEXIBLE AND COST-EFFECTIVE CONTENT DELIVERY,

More information

Top Desktop Management Pain Points

Top Desktop Management Pain Points Top Desktop Management Pain Points 2010 Table of Contents Managing Desktops and Laptops is a Challenge... 3 A Proactive Approach... 3 Asset Inventory is Key... 3 Mobile Workforce Support Challenges...

More information

New Features in PSP2 for SANsymphony -V10 Software-defined Storage Platform and DataCore Virtual SAN

New Features in PSP2 for SANsymphony -V10 Software-defined Storage Platform and DataCore Virtual SAN New Features in PSP2 for SANsymphony -V10 Software-defined Storage Platform and DataCore Virtual SAN Updated: May 19, 2015 Contents Introduction... 1 Cloud Integration... 1 OpenStack Support... 1 Expanded

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Server Deployment Overview

Server Deployment Overview Server Deployment Overview OpenText Exceed ondemand Managed Application Access Solutions for Enterprise OpenText Connectivity Solutions Group February 2011 Abstract No two business environments are identical,

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

Remote/Branch Office IT Consolidation with Lenovo S2200 SAN and Microsoft Hyper-V

Remote/Branch Office IT Consolidation with Lenovo S2200 SAN and Microsoft Hyper-V Remote/Branch Office IT Consolidation with Lenovo S2200 SAN and Microsoft Hyper-V Most data centers routinely utilize virtualization and cloud technology to benefit from the massive cost savings and resource

More information

Accelerating Microsoft Windows 7 migrations with Citrix XenApp

Accelerating Microsoft Windows 7 migrations with Citrix XenApp Citrix XenApp and Microsoft Windows 7 White Paper Accelerating Microsoft Windows 7 migrations with Citrix XenApp XenApp will accelerate your Windows 7 migration, save money and resources, minimize disruption

More information

Sage Intergy 6.10 Architecture Guide

Sage Intergy 6.10 Architecture Guide Reference Confidential This document and the information it contains are the confidential information of Sage. Neither this document nor the information it contains may be disclosed to any third party

More information

Desktop Virtualization for the Banking Industry. Resilient Desktop Virtualization for Bank Branches. A Briefing Paper

Desktop Virtualization for the Banking Industry. Resilient Desktop Virtualization for Bank Branches. A Briefing Paper Desktop Virtualization for the Banking Industry Resilient Desktop Virtualization for Bank Branches A Briefing Paper September 2012 1 Contents Introduction VERDE Cloud Branch for Branch Office Management

More information

Building a better branch office. www.citrix.com

Building a better branch office. www.citrix.com Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch

More information

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on

More information

Application Visibility and Monitoring >

Application Visibility and Monitoring > White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information

More information

How To Use Windows Small Business Server 2011 Essentials

How To Use Windows Small Business Server 2011 Essentials Everything Your Business Needs in a Server, Nothing it doesn t. Ideal as a first server for small businesses with up to 25 users, Windows Small Business Server 2011 Essentials provides a cost-effective

More information

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection

Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the

More information

DeviceLock Virtual DLP: Overview & Scenarios

DeviceLock Virtual DLP: Overview & Scenarios DeviceLock Virtual DLP: Overview & Scenarios DeviceLock Virtual DLP Overview DeviceLock s Virtual DLP feature extends the reach of DeviceLock data leak prevention capabilities to a variety of virtual computing

More information

Wyse vworkspace Supports Higher Education s Desktop Virtualization Needs

Wyse vworkspace Supports Higher Education s Desktop Virtualization Needs Wyse vworkspace Supports Higher Education s Desktop Virtualization Needs Prepared by Chris Lyman, Senior Systems Consultant Dell cloud client-computing Solutions Abstract As interest in alternative approaches

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec

More information

Benefits of the Virtual Desktop on Enterprise Networks. A white paper by Wyse Technology Inc.

Benefits of the Virtual Desktop on Enterprise Networks. A white paper by Wyse Technology Inc. Benefits of the Virtual Desktop on Enterprise Networks A white paper by Wyse Technology Inc. Abstract The personal computer revolution is far from over, but enterprises are rightfully questioning the high

More information

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Oracle Desktop Virtualization

Oracle Desktop Virtualization Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on

More information

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Protecting Content and Securing the Organization Through Smarter Endpoint Choices Protecting Content and Securing the Organization Through Smarter Endpoint Choices Prepared by Dan O Farrell Dell Cloud Client-Computing Finally a practical approach to protecting content and securing desktops

More information

Thin-Client Computing:

Thin-Client Computing: Thin-Client Computing: Competitive Edge for Retail and Banking Sectors A National Semiconductor White Paper Thin Client Table of Contents Competitive Edge for Retail and Banking Sectors Executive Summary

More information

Parallels VDI Solution

Parallels VDI Solution Parallels VDI Solution White Paper Version 1.0 April 2009 Table of Contents Enterprise Desktop Computing Challenges... 3 What is Virtual Desktop Infrastructure (VDI)... 3 Benefits of Virtual Desktop Infrastructure...

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

Installing and Administering VMware vsphere Update Manager

Installing and Administering VMware vsphere Update Manager Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

K2 [blackpearl] deployment planning

K2 [blackpearl] deployment planning K2 [blackpearl] deployment planning UNDERSTANDING THE DEPLOYMENT SCENARIOS AND OPTIONS December 14 This paper describes the various deployment scenarios of the K2 [blackpearl] software, and discusses when

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network

Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network Solution Overivew Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network EXECUTIVE SUMMARY Today s businesses are turning to wireless networking to give employees immediate

More information

Standard Bank. Case Study

Standard Bank. Case Study Standard Bank Case Study A move to a new London landmark headquarters built to the latest environmental standards triggered an IT revolution for a top international bank. Today, Standard Bank is reaping

More information

Introduction. Manageability. What is needed?

Introduction. Manageability. What is needed? Introduction It will come as no surprise to readers of this white paper that Microsoft currently dominates the IT marketplace. The company has been able to leverage the vast number of computers using its

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information