High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP

Size: px
Start display at page:

Download "High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP"

Transcription

1 High Performance Remote Desktop Access for Mobile Users Without the Pain and Complexity of VPN/RDP March 2015 Splashtop Inc. 1/14

2 Table of Contents Table of Contents Situation Analysis Challenges extending VPN / RDP to mobile users Introducing Splashtop Enterprise How Splashtop Enterprise Addresses Your Needs High Level Overview Splashtop Enterprise App Splashtop Center Splashtop Streamer Helping to Meet HIPPA Compliance Typical DMZ set-up Splashtop Center Administration Implementation Overview Four Simple Steps Bandwidth Considerations Additional Ways to Use Splashtop Enterprise The New Approach to Remote Desktop Access Contact Information: Office Locations, Telephone Numbers Splashtop Inc. 2/14

3 1. Situation Analysis Extending legacy VPN/RDP to mobile devices can be fraught with challenges. Lengthy, complex, and error-prone configuration of mobile VPN and RDP clients can result in downtime and additional management costs. Users are frustrated with remembering multiple logins. Remote connections back to desktops are painfully slow. Splashtop Enterprise represents a unique alternative to this traditional approach. Splashtop is used by over 18 million users and is the market leading remote access solution. By using Splashtop Enterprise, organizations can more efficiently and more cost effectively deliver secure remote desktop services designed from the ground up to support today s mobile users while retaining the same level of security as a VPN. This white paper provides server, desktop, network and security personnel with an architectural overview and description of Splashtop Enterprise and how it compares to a traditional VPN/RDP solution. Splashtop Inc. 3/14

4 1. Challenges extending VPN / RDP to mobile users Despite the explosion of mobile devices and the increasing trend of BYOD, most businesses still rely on legacy solutions designed decades ago to connect mobile users back to desktops. Figure 1: Conventional VPN/RDP Setup RDP is a Microsoft remote desktop protocol that allows users to connect to remote desktops. Using RDP alone outside the firewall exposes traffic to security risks - and can make host computers vulnerable to outside attack - so VPN is required. When connected using VPN, the corporate network is exposed to users allowing them to retrieve files, access documents, access the internet or login to specific services hosted on the corporate network. However, when this conventional VPN/RDP approach is extended to support tablets and smartphones, the situation changes dramatically: Lengthy, complex, and error-prone configuration of mobile VPN and RDP clients can result in user downtime when using line of business applications. Users are confused remembering multiple logins - VPN client, RDP app, desktop. There is significant slowness when accessing applications users selecting menu options or typing text do not see an instant response leading to frustration. Typically Internet access is also pushed through VPN. This increases the load on the VPN appliance leading to a bad user experience and potentially impacting other network services. Lack of vendor documentation for VPN client and RDP app configuration - or conflicting options - leave user forums as a source of answers. It s hard to even know which vendor to contact when it comes to getting answers. There is no one-way to reliably configure VPN clients with RDP apps - resulting in time consuming trial-and-error set-up and on-going maintenance. Splashtop Inc. 4/14

5 Mobile client connections may involve users authenticating through third-party cloud/saas servers that exist outside of your organization s network and so increase security risk. Mobile users may download a variety of RDP apps each offering different configuration options and user experiences as they behave differently all of which IT has to support. As can been seen, ensuring a fast and reliable RDP connection across a VPN can be a challenging, lengthy and tortuous experience. Splashtop Enterprise addresses these challenges and more. Splashtop Inc. 5/14

6 2. Introducing Splashtop Enterprise Splashtop Enterprise eliminates the pain and complexity involved in extending existing VPN/RDP technologies to mobile devices. Splashtop Enterprise delivers: A managed, on-premise service that is secure, easy to set-up and cost effective to operate. High performance, secure remote access to desktops and servers that reside inside the company firewall. Integration with the existing Active Directory infrastructure Significantly reduced user frustration by delivering applications to their mobile devices with the speed and ease of use as if they were in front of their desktops. Splashtop satisfied our two top priorities security and budget. It provides a cost-effective and secure gateway to our desktops without the need to allocate additional server resources or incur additional licensing cost. Velta Moisio - Director, Information Technology Lake County Juvenile Court The physical setup for Splashtop Enterprise is comparable to a basic VPN/RDP solution remote clients connect to a server on the network over a secure tunnel and authenticate based on access policies applied to the connection. Figure 2: Splashtop Enterprise Setup However, despite being similar in terms of physical setup, the two systems differ significantly in important key areas. The following table contrasts network configuration, desktop setup, mobile device setup, operational/management and performance. It demonstrates how Splashtop Enterprise eliminates many of the challenges of using VPN/RDP. Splashtop Inc. 6/14

7 Table 1: Comparison of Splashtop Enterprise to Legacy VPN/RDP Area Legacy VPN/RDP Splashtop Enterprise Operational / Management Network Desktop Mobile Performance / Use cases Multiple points of administration and configuration to support mobile users Need to support multiple, inconsistent mobile VPN and RDP clients/apps Mobile activity must be synthesized from multiple server logs Setup and maintain multiple firewall policies for each user device Configure port forwarding on router Configure VPN appliance for mobile device access Configure policies for VPN access Configure each remote desktop for RDP o May require Windows upgrade to support RDP, or installation of additional third-party software Grant access rights for each user on each remote desktop separately Configure L2TP client for secure connection (VPN) Evaluate, install and configure RDP app for remote desktop access Train users how to use different gestures and menus for each RDP app Tunneling RDP within VPN is inefficient. It increases the connection pay load and so consumes more bandwidth. Poor video streaming means it is unable to support 3D/graphics intensive applications without considerably more bandwidth. Unified administration console Single mobile remote access solution Centralized logging with audit trail Single firewall policy/port - No additional complex firewall policy/port configuration is required Single point to define user and device access policies Install Splashtop Streamer on each remote desktop Install Splashtop Enterprise App onto mobile devices. Single app architecture includes Intuitive gestures for an excellent user experience. Splashtop streaming protocol requires just 300kbps for general office productivity Additional use cases include: o Working with graphic intensive 3D images / animation o Viewing full screen video such as product training o Engineering/design simulation o Viewing medical images Splashtop Inc. 7/14

8 3. How Splashtop Enterprise Addresses Your Needs 3.1. High Level Overview The Splashtop Enterprise solution is comprised of three components, each residing on different systems within an enterprise network. Together, they provide a high performance and secure remote desktop experience. Figure 3: High Level Architecture Splashtop Enterprise App The Splashtop Enterprise App is a lightweight remote client that is installed on an employee s mobile device, such as an Apple ipad or iphone, Google Android phone or tablet; Macs and Windows PCs and laptops are also supported. Users connect to desktops using the same AD credentials they use at their desk Splashtop Center Splashtop Center is installed within the enterprise firewall (or DMZ) on a Windows-based system and brokers connections between the user s mobile device (running the Splashtop Enterprise app) and enterprise desktops (running Splashtop Streamer software). It also provides an administrative console to manage users and devices. Seamless integration with existing Active Directory (AD) domains helps IT administrators simplify the process of local user authentication and ensures that only authorized users can establish remote sessions. Since all Splashtop traffic is managed by Splashtop Center, only a single firewall policy is required, not per-user policies, reducing the firewall management workload. Security policies are applied within Splashtop Center as part of each user s assigned policy. Splashtop Inc. 8/14

9 Splashtop Streamer This agent software must be installed on the target desktop the user will access. IT administrators can install the software either by visiting the user s desktop, using existing management tools or optionally allowing users to download the software from the Splashtop Center server themselves. To enable users to access more than one desktop, IT administrators must install streamers onto those other systems. The streamer software can automatically login using the users AD credentials Helping to Meet HIPPA Compliance For organizations specifically concerned with Health Insurance Portability and Accountability Act of 1996 (HIPAA) compliance, please see the whitepaper How Splashtop Helps Support HIPAA Compliance Typical DMZ set-up All communications within the Splashtop Enterprise solution from the mobile app through Splashtop Center to Splashtop Streamer and back again are secured over Splashtop s patent-pending streaming technology using the IETF-standard Transport Layer Security (TLS) protocol. Splashtop Enterprise also prevents eavesdropping on and modification or replay of communications by restricting the cipher suite to 2048 bit ECDH-RSA with 256-bit AES-CBC and SHA1 (see Figure 5: Splashtop Center Deployment in DMZ). Figure 4: Splashtop Center Deployment in DMZ Splashtop Inc. 9/14

10 3.4. Splashtop Center Administration Splashtop Center provides a robust, unified administrative console that includes: Active Directory (AD) integration Support existing AD for authentication Centralized policy-based control - Set user and device access policies, activate/deactivate users and devices, MAC address filtering, create or import SSL certificates, set maximum frame rate per user connection, set idle timeout Reporting - View real-time connections and audit trails Grouping - Allow access to shared pool of physical or virtual desktops With the installation of Splashtop Streamer on the Splashtop Center server, the console can be accessed remotely by administrators from a Splashtop Enterprise app on a mobile device (or Windows PC or Mac). Figure 5: Splashtop Center Console Users Tab Active Directory (AD) integration eliminates redundant administration tasks and ensures consistency of user identities. By authenticating against the domain in read-only mode, the risk of modifying the existing AD infrastructure is reduced. Only approved devices and users that have been specifically added by the administrator can access desktops. Administrators can also allow/deny remote access by mobile devices individually using MAC addresses, lock or disable access by a specific device, disable auto-logon (forcing users to enter passwords to connect), and de-activate a mobile device entirely. Groups can be created to act as a shared resource pool for users. Splashtop Center also displays the active status of connections, IP addresses, and connection time and duration as well as device type logging this information in an audit trail. Splashtop Inc. 10/14

11 IT Security Controls Figure 6: Splashtop Center Audit Trail Splashtop Inc. 11/14

12 3.5. Implementation Overview Four Simple Steps IT setup User Setup Set-up Splashtop Center on a Windows server (for initial proof of concept you can install this onto your existing desktop). Install Splashtop Enterprise app on mobile devices (users download from device's app store) Create users and define access policies. Users can be created by accessing Active Directory or by creating local users. Install Splashtop Streamer on each computer to be accessed. Users log in and connect to their desktop. Figure 7: Users choose their desired desktop from the Splashtop Enterprise app Splashtop Inc. 12/14

13 3.6. Bandwidth Considerations Splashtop Enterprise is capable of providing a truly interactive experience to mobile users, delivering 3D graphics and HD video without compromise using relatively modest bandwidth. Splashtop Center policies can be defined to throttle the frame rate for specific users (from 1-60 frames per second), allowing administrators to reduce bandwidth for each connection if required. Bandwidth required per session for general productivity usage bandwidth : 300 kbps For optimal performance : 800 kbps 3.7. Additional Ways to Use Splashtop Enterprise In addition to providing an alternative to VPN and RDP technologies, Splashtop Enterprise opens the door to discover new ways to extend company resources to mobile devices: Tabletize Office, Outlook, and Corporate Apps Support existing MS Office, IE-only,.NET or JAVA applications without rewriting or retraining users. Extending VDI Deliver virtual desktops to mobile devices more cost effectively and with greater performance. Turn Mobile Device into an Interactive Whiteboard Allow teachers, presenters or instructors to be freed from their computer to teach in all four corners of the classroom. High-Performance / High Fidelity Remote Access to 3D/graphics Deliver highly responsive 3D AutoCAD, animations, simulation, and medical images. Pooling of Resources Create a shared pool of physical or virtual desktops for users to access remotely. Splashtop Inc. 13/14

14 4. The New Approach to Remote Desktop Access Extending legacy VPN/RDP technologies to mobile devices can be fraught with challenges. Business of all sizes can use Splashtop Enterprise to efficiently and more cost effectively delivers a secure remote desktop solution uniquely designed to support the demands of today s mobile workforce. Its key features are: Market Leading Performance Patent-pending streaming technology and intelligent optimization techniques deliver up to 30 frames per second with synchronized audio for superior performance and highly responsive user interactivity Simplicity No complicated changes to your existing server hardware, networking, or storage infrastructure; intuitive administrative console for efficient user management Secure On-premise service with end-to-end encryption that integrates with your existing Active Directory (AD) infrastructure Universal A single app that supports a broad range of mobile devices and use cases Cost Effective Eliminates lengthy trial and error setup and reduces ongoing maintenance costs MDM/MAM integration - Deep integration with MDM / MAM partners adds additional on-device security and control. For further details and to start a free trial, please visit Splashtop aspires to touch people s lives by delivering the best-in-class remote desktop experience bridging tablets, phones, computers and TVs. Splashtop technology empowers consumer and business users with high-performance, secure, interactive access to their favorite applications, media content and files anytime, anywhere Contact Information: Office Locations, Telephone Numbers Silicon Valley Headquarters Taipei Office Tokyo Office 1054 S. De Anza Blvd, Suite 200 San Jose, CA U.S.A F., No.152, Sec. 1, Zhongxiao E. Rd., Zhongzheng Dist., Taipei City 100, Taiwan, Level 20 Marunouchi Trust Tower - Main Marunouchi, Chiyoda-Ku Tokyo Japan Splashtop Inc. 14/14

Remote Desktop Access for the Mobile Workforce

Remote Desktop Access for the Mobile Workforce Remote Desktop Access for the Mobile Workforce Security White Paper March 2015 Splashtop Inc. 1/12 Table of Contents Table of Contents... 2 1. Situation Analysis... 3 2. Architecture... 4 2.1. Splashtop

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

SA Series SSL VPN Virtual Appliances

SA Series SSL VPN Virtual Appliances SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Release Version 3 The 2X Software Server Based Computing Guide

Release Version 3 The 2X Software Server Based Computing Guide Release Version 3 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single

More information

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks EasyConnect Any application - Any device - Anywhere As cloud computing and mobile devices continue to reshape the way people work, workforces are becoming increasingly mobile. In order to remain competitive,

More information

Designing Enterprise Mobility

Designing Enterprise Mobility Designing Enterprise Mobility Cortado Corporate Server One Solution for All Enterprise Mobility Challenges Advanced Mobile Device Management Intelligent Mobile Application Management Professional File

More information

Propalms TSE Deployment Guide

Propalms TSE Deployment Guide Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,

More information

RSS Cloud Solution COMMON QUESTIONS

RSS Cloud Solution COMMON QUESTIONS RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included

More information

NetSupport Manager v11

NetSupport Manager v11 Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

E-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct

E-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Speeding Office 365 Implementation Using Identity-as-a-Service

Speeding Office 365 Implementation Using Identity-as-a-Service August 2015 www.sarrelgroup.com info@sarrelgroup.com Speeding Office 365 Implementation Using Identity-as-a-Service White paper August 2015 This white paper is sponsored by Centrify. August 2015 www.sarrelgroup.com

More information

Dell World Software User Forum 2013

Dell World Software User Forum 2013 Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your

More information

Secure Your Mobile Device Access with Cisco BYOD Solutions

Secure Your Mobile Device Access with Cisco BYOD Solutions Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Simply Better Printing in Any IT Architecture

Simply Better Printing in Any IT Architecture Simply Better ing in Any IT Architecture Driver Free ing One virtual printer driver, the Thin Output Gateway, replaces all printer drivers on the printing server or desktop. Advanced Adaptive Compression

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper!

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper! Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Whitepaper. Vertex VDI. Tangent, Inc.

Whitepaper. Vertex VDI. Tangent, Inc. Whitepaper Vertex VDI Tangent, Inc. To the reader, As head of engineering at Tangent, I m responsible for our VDI solutions. This white paper is intended to provide useful information to help you investigate

More information

Deploying F5 Application Ready Solutions with VMware View 4.5

Deploying F5 Application Ready Solutions with VMware View 4.5 F5 White Paper Deploying F5 Application Ready Solutions with VMware View 4.5 VMware View is the leading desktop virtualization solution built for delivering desktops as a managed service. F5 BIG IP devices

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Secure Virtual Assist/ Access/Meeting

Secure Virtual Assist/ Access/Meeting Secure Virtual Assist/ Access/Meeting Easy-to-use tools for secure remote support, PC control and collaboration Technical support by phone, email, chat and pre-installed remote support clients can be cumbersome,

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Mobile Device Strategy

Mobile Device Strategy Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.

More information

Cortado Corporate Server

Cortado Corporate Server Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Hosted desktops from Synergy IT Solutions Inc. with

Hosted desktops from Synergy IT Solutions Inc. with [partner logo here] Hosted desktops from Synergy IT Solutions Inc. with Microsoft Windows Server 2012 Technical whitepaper Contents 1 Virtual Desktop Solutions 3 Microsoft VDI 3 New and enhanced features

More information

Enterprise Security with mobilecho

Enterprise Security with mobilecho Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

An Intelligent Solution for the Mobile Enterprise

An Intelligent Solution for the Mobile Enterprise An Intelligent Solution for the Mobile Enterprise IntelliGO - An Intelligent Solution for the Mobile Enterprise BYOD and the mobile movement continue to gain momentum fueled by the explosive growth of

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Securing Citrix with SSL VPN Technology

Securing Citrix with SSL VPN Technology Securing Citrix with SSL VPN Technology An AEP Networks Solution Summary For years, Citrix Systems has dominated the server-based computing market as the solution of choice for application access across

More information

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts

Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide: NAS / NAS Pro / Business Storage Rackmounts Seagate NAS OS 4 Reviewers Guide 2 Purpose of this guide Experience the most common use cases for the product, learn about

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Video Conferencing by Avaya

Video Conferencing by Avaya Video Conferencing by Avaya Agenda Radvision Overview Evolution of Enterprise Video Scopia Elite Series MCU & iview Scopia Desktop & Mobility Scopia XT Series End-Points 2 Radvision Overview Industry Leader

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Advice on how schools can connect into their servers remotely

Advice on how schools can connect into their servers remotely Advice on how schools can connect into their servers remotely Steve Prentice Ian Gover elearning and Information Management Support Services for Education elimadmin@somerset.gov.uk 1 Scenario You want

More information

The All-in-One Support Solution. Easy & Secure. Secure Advisor

The All-in-One Support Solution. Easy & Secure. Secure Advisor The All-in-One Support Solution. Easy & Secure. Secure Advisor Secure Advisor - A Perfect Solution for Online Support Fast and easy remote support from anywhere Problems that often sound complicated on

More information

What s New in Juniper s SSL VPN Version 6.0

What s New in Juniper s SSL VPN Version 6.0 What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper

More information

Endpoint Virtualization for Healthcare Providers

Endpoint Virtualization for Healthcare Providers WHITE PAPER: xxxxxx BEST PRACTICES [00-Cover_Bar] FOR HEALTHCARE Endpoint Virtualization for Healthcare Providers Confidence in a connected world. White Paper: Best Practices for Healthcare Endpoint Virtualization

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

GoToMyPC reviewer s guide

GoToMyPC reviewer s guide GoToMyPC reviewer s guide Citrix GoToMyPC reviewer s guide Thank you for evaluating Citrix GoToMyPC. This guide will introduce you to the current GoToMyPC functionality and help you effectively evaluate

More information

Media Server Installation & Administration Guide

Media Server Installation & Administration Guide Media Server Installation & Administration Guide Smarter Surveillance for a Safer World On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone: (845)

More information

Enterprise Private Cloud Storage

Enterprise Private Cloud Storage Enterprise Private Cloud Storage The term cloud storage seems to have acquired many definitions. At Cloud Leverage, we define cloud storage as an enterprise-class file server located in multiple geographically

More information

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security White Paper Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security Introduction Organizations that want to harness the power of the web must deal with

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test

More information

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments

Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Microsoft Terminal Server and Citrix Presentation Server Deployment Environments Understanding the use of Act! in a Terminal Server or Citrix Presentation Server environment Table of Contents Introduction...

More information

Global Network. Whitepaper. September 2014. Page 1 of 9

Global Network. Whitepaper. September 2014. Page 1 of 9 Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3

More information

RHUB TurboMeeting Web Conferencing and Remote Support Datasheet

RHUB TurboMeeting Web Conferencing and Remote Support Datasheet RHUB TurboMeeting Web Conferencing and Remote Support Datasheet V 5.1.2 RHUB Communications, Inc. 4340 Stevens Creek Blvd., Suite 282, San Jose, CA 95129 Tel: 866-758-0984, Support: 408-899-2831, Fax:

More information

The complete solution for enabling BYO. www.citrix.com

The complete solution for enabling BYO. www.citrix.com The complete solution for enabling BYO Solution Brief The complete solution for enabling BYO www.citrix.com Companies of all sizes are witnessing a transformation in the types of devices entering the workplace,

More information

Vertex Virtual Desktops

Vertex Virtual Desktops Vertex Virtual Desktops Whitepaper Revision 3.1 Updated 9-1-2012 Tangent, Inc. 2009. V.2 To the reader, I m Ron Perkes and I run the engineering group at Tangent responsible for our virtual desktop solutions.

More information

An Enterprise Approach to Mobile File Access and Sharing

An Enterprise Approach to Mobile File Access and Sharing White Paper File and Networking Services An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Novell Filr Competitive

More information

Secure remote access to your applications and data. Secure Application Access

Secure remote access to your applications and data. Secure Application Access Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

ipecs UCS Unified Communications Solution Easy to access and activate Highlights Single server solution

ipecs UCS Unified Communications Solution Easy to access and activate Highlights Single server solution ipecs UCS Unified Communications Solution In today s world of remote and dispersed workers, the ipecs UCS application provides tools to enhance productivity and mobility while improving employee collaboration

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Deployment Guide Sept-2014 rev. a Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Table of Contents 1 Introduction... 2 1.1 Array Networks AG Series Secure Access

More information

Release Version 4.1 The 2X Software Server Based Computing Guide

Release Version 4.1 The 2X Software Server Based Computing Guide Release Version 4.1 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

SureDrop Secure collaboration. Without compromise.

SureDrop Secure collaboration. Without compromise. SureDrop Secure collaboration. Without compromise. SureDrop IT S THE DROP BOX YOU CAN USE AND YOUR IT DEPARTMENT WILL LOVE. With so many file collaboration products promising a work anywhere, with anyone,

More information

EasiShare Whitepaper - Empowering Your Mobile Workforce

EasiShare Whitepaper - Empowering Your Mobile Workforce Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for

More information

VIDEOCONFERENCE. 1 Introduction. Service Description Videoconferece

VIDEOCONFERENCE. 1 Introduction. Service Description Videoconferece VIDEOCONFERENCE 1 Introduction Videoconferencing is interactive remote communication between two or more participants, transmitted by voice or image. Participants see and listen to each other and can present

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Moving to the Cloud: What Every CIO Should Know

Moving to the Cloud: What Every CIO Should Know Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling

More information

OpenScape UC Application

OpenScape UC Application OpenScape UC Application A better way to communicate How productive are your virtual teams? Today s reality - A mobile, global, distributed and virtual workforce. But face-to-face just isn t always possible.

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Mobile Device Management

Mobile Device Management Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

USING GENIE REMOTELY

USING GENIE REMOTELY USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.

More information

NEW! CLOUD APPS ReadyCLOUD & genie remote access

NEW! CLOUD APPS ReadyCLOUD & genie remote access Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz Dual Core Processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Generating leads with Meraki's Systems Manager. Partner Training"

Generating leads with Meraki's Systems Manager. Partner Training Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution

More information

Athena Mobile Device Management from Symantec

Athena Mobile Device Management from Symantec Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile

More information