Comparative Performance Review
|
|
|
- Lynette Goodman
- 10 years ago
- Views:
Transcription
1 Comparative Performance Review Endpoint Security Performance in Desktop Virtualization Environments A Trend Micro White Paper
2 Executive Summary In June 2010, Indusface Consulting Ltd performed a test that primarily focused on analyzing various latest generation Anti-Virus products available in the market to measure the performance of each in virtual desktop environments. The full report contains empirically validated data gathered during 8 weeks of testing. The goal of these tests was to establish the availability, and where possible effectiveness and performance, of leading endpoint security products, specifically in a Virtual Desktop Infrastructure. Several critical virtualization metrics were analyzed in multiple deployment scenarios. These metrics include memory and CPU utilization and storage IOPs. The tests clearly showed that endpoint security solutions not optimized use in virtualized environments introduce so significant load to the VDI-Host, they effectively render the system unresponsive and thus unusable in a production environment. Only Trend Micro OfficeScan 10.5 showed only small increases in load, making it the only viable solution for deployment on a Virtual Desktop Infrastructure. 1 White Paper Endpoint Security Performance in Virtual Desktop Environments
3 Disk Utilization Observations Figure 1: Comparative Assessment for Disk Utilization for Trend Micro OfficeScan 10.5, Symantec Endpoint Protection and McAfee VirusScan 8.7. The results in the vdisk utilization graph show that Trend Micro OfficeScan 10.5 performs remarkably better than others AV vendors from an IOPS perspective. The difference between baseline (without any Anti-Virus deployed) and Trend Micro OfficeScan 10.5 (with full scanning ON) is marginal. IOPS generated by Trend Micro OfficeScan10.5 has the lowest deviation of only 0.77 MB/s and 3.66 MB/s from baseline in Normal Mixed 20 User Profile (No AV scanning) and Mixed 20 User Profile (Full scanning mode) respectively compared to other security solutions. 2 White Paper Endpoint Security Performance in Virtual Desktop Environments
4 CPU Utilization Observations Figure 2: Comparative Assessment for CPU Utilization for Trend Micro OfficeScan 10.5,Symantec Endpoint Protection and McAfee VirusScan 8.7 From the above vcpu utilization graph, the baseline test system (without any AV Solution deployed) in Mixed User Profile consumes around % of vcpu. Trend Micro OfficeScan 10.5 adds an overhead of ( ) 8.1 %. For the other security solutions, extremely long answer-times rendered the images unusable from an end user experience perspective. With 10 desktop images, Trend Micro OfficeScan 10.5 adds 11% CPU overhead compared to baseline versus Symantec which adds 29% CPU overhead and McAfee adds 83% CPU overhead. Even though Symantec and McAfee solutions utilize much higher average CPU in 4 users and 10 user scenario, Symantec Endpoint Protection and McAfee VirusScan 8.7 remained fairly responsive at 10 VDI s and below. CPU does not really become the choke point for all of the four solutions until the number of VDI grows from 10 users to higher. 3 White Paper Endpoint Security Performance in Virtual Desktop Environments
5 Memory Utilization Observations Figure 3: Comparative Assessment for Memory Utilization for Trend Micro OfficeScan 10.5, Symantec Endpoint Protection and McAfee VirusScan 8.7. From the vmemory utilization graph shown above, the baseline system (without any AV Solution deployed) in Mixed User Profile (Scanning Mode) consumes around 7.74 GB of Active Memory while Trend Micro OfficeScan 10.5 only adds an overhead of 1.32 GB in maximum VDI density environment. As per the data collected, McAfee solution has most memory consumption in all tests. Even though OfficeScan 10.5 shows the best memory performance, also Symantec Endpoint Protection 11.0 does fairly well from memory perspective. The vmemory differences in VDI Pool environment for various security solutions are not significant due to the vkernel transparent page memory scheduler which consolidates repetitive user tasks, thus memory utilization slowly begins to decrease and memory sharing begins to increase. 4 White Paper Endpoint Security Performance in Virtual Desktop Environments
6 Scan Time Observation Figure 4: Comparative Assessment for Scan time for Trend Micro OfficeScan 10.5, Symantec Endpoint Protection and McAfee VirusScan 8.7 The scan time graph above shows Trend Micro OfficeScan 10.5 scanning approximately times better in Mixed low density VDI pool and 4-8 times better in Mixed maximum high density VDI pool. 5 White Paper Endpoint Security Performance in Virtual Desktop Environments
7 Number of VDI Images Supported Figure 5: Comparative Assessment on Count of VDI supported with good end user response for Trend Micro OfficeScan 10.5, Symantec Endpoint Protection and McAfee VirusScan 8.7 by keeping IOPs approximately between 6-8 MB/s. The VDI sample test environment is sized for 20 VDI s with mixed user profile (4 Heavy and 16 Light Users). IOPS is a very important metric in an Anti-Virus deployment in a VDI environment. One way to do a fair comparison between various solutions is to keep the load creation script as is and keep IOPS fairly constant so that the user response is good (the ideal we observed for the test infrastructure was between 6-8 IOPS). At these IOPS, we tested how many VDI s can be supported by the solution. The baseline IOPS with 20 VDI s is 2.76 (without any AV solution see figure 2). With Trend Micro OfficeScan 10.5 with all 20 VDI s scanning the IOPS increases to 6.42, but remains in acceptable range. The script remains the same which is a mix of 80% Light users and 20% Heavy users. With Symantec Endpoint Protection 11.0 and McAfee Virus Scan 8.7, regardless of IOPS we could not deploy 20 VDI s. When we reduced to 10 VDI s for those 3 solutions the IOPS still remained very high with McAfee IOPS in critical state. We continued reducing the IOPS and adjusting mix of light users versus heavy uses until the IOPS came within the acceptable range of 6-8 IOPS. With Symantec Endpoint Protection 11.0 only 4 users (3 Light and 1 Heavy) can be supported. With McAfee VirusScan 8.7 only 2 systems of light users produce an IOPS over 8. Storage is an area where customers need to make a conscious decision as to whether they optimize for the average IOPS, especially when there is such a disparity between the two measurements of AV and Non-AV environments. Optimizing for the IOPS and performance will not suffer if suitable security solution has been selected. On the other hand, it s significantly cheaper to optimize for the average readings, but administrators could be faced with increased support calls due to poor performance in the event of a log-in or boot storm Trend Micro, Incorporated. All rights reserved. Trend Micro, OfficeScan, and the t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Information 6 White Paper Endpoint Security Performance in Virtual Desktop Environments
Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis
Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis Vendors Tested: McAfee Sophos Symantec Trend Micro Executive Summary Indusface was commissioned by Trend Micro Inc.
Optimize VDI with Server-Side Storage Acceleration
WHITE PAPER Optimize VDI with Server-Side Storage Acceleration Eliminate Storage Bottlenecks for Fast, Reliable Virtual Desktop Performance 1 Virtual Desktop Infrastructures (VDI) give users easy access
McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
VDI Security for Better Protection and Performance
VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments
Virtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
The impact of virtualization security on your VDI environment
ENTERPRISE TE The impact of virtualization security on your VDI environment ST ED WITH LO G I N VS I Contents Introduction... 3 What is VDI?... 3 Virtualization security challenges... 3 Choosing the right
Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop
VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop Page 1 of 11 Introduction Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end-user experience and excellent
Endpoint Security Solutions Comparative Analysis Report
Endpoint Security Solutions Comparative Analysis Report (Physical Environment) Vendors Tested Trend Micro McAfee Symantec Sophos Microsoft To: Trend Micro Indusface Contact Kandarp Shah Vice President
Hard Disk Drive vs. Kingston SSDNow V+ 200 Series 240GB: Comparative Test
Hard Disk Drive vs. Kingston Now V+ 200 Series 240GB: Comparative Test Contents Hard Disk Drive vs. Kingston Now V+ 200 Series 240GB: Comparative Test... 1 Hard Disk Drive vs. Solid State Drive: Comparative
The VMware Reference Architecture for Stateless Virtual Desktops with VMware View 4.5
The VMware Reference Architecture for Stateless Virtual Desktops with VMware View 4.5 R E F E R E N C E A R C H I T E C T U R E B R I E F Table of Contents Overview...................................................................
VMware View Design Guidelines. Russel Wilkinson, Enterprise Desktop Solutions Specialist, VMware
VMware View Design Guidelines Russel Wilkinson, Enterprise Desktop Solutions Specialist, VMware 1 2 Overview Steps to follow: Getting from concept to reality Design process: Optimized for efficiency Best
Fully supported Antivirus software (Managed Antivirus)
You are here: Antivirus > Managed Antivirus Vendors Fully supported Antivirus software (Managed Antivirus) Antivirus (AV) vendors often release software updates. We hard-code the update into our RMM agent
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture. Dell Compellent Product Specialist Team
Dell Compellent Storage Center SAN & VMware View 1,000 Desktop Reference Architecture Dell Compellent Product Specialist Team THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop Citrix Personal vdisk Technology Planning Guide www.citrix.com Overview XenDesktop offers IT administrators many options in order to implement virtual
NEXSAN NST STORAGE FOR THE VIRTUAL DESKTOP
NST STORAGE FOR THE VIRTUAL DESKTOP Nexsan s innovative product, the NST5000, is a hybrid storage system with unified protocols and highly dense storage for a combination of great performance, low cost,
Project Virtual Reality Check
Project Virtual Reality Check #DUTCHVMUG Jeroen van de Kamp CTO [email protected] Ruben Spruijt CTO [email protected] Project Virtual Reality Check. Jeroen van de Kamp: [email protected] @thejeroen
Endpoint Protection Performance Benchmarks
Endpoint Protection Performance Benchmarks GFI Software conducted objective performance testing on four, publically available business endpoint protection security software products on Windows 7 Professional
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER
Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER Table of Contents Thin, Legacy-Free, Purpose-Built Hypervisor.... 3 More Secure with Smaller Footprint.... 4 Less Downtime Caused by Patches...
Dell Desktop Virtualization Solutions Stack with Teradici APEX 2800 server offload card
Dell Desktop Virtualization Solutions Stack with Teradici APEX 2800 server offload card Performance Validation A joint Teradici / Dell white paper Contents 1. Executive overview...2 2. Introduction...3
Two Great Ways to Protect Your Virtual Machines From Malware
Two Great Ways to Protect Your Virtual Machines From Malware By Maxim Weinstein, CISSP, Senior Product Marketing Manager Virtualization promises to reduce operational costs, simplify management and increase
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Security Industry Market Share Analysis
Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide
Symantec Encryption Satellite for Windows Version 3.3 Release
Page 1 of 5 Symantec Encryption Satellite for Windows Version 3.3 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release
Security Industry Market Share Analysis
Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes
Client Manager for Endpoint Protection (CMEP) User s Guide
Client Manager for Endpoint Protection (CMEP) July, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of BigFix, Inc. All other product
Core Protection Module 1.6 for Mac powered by. User s Guide
Core Protection Module 1.6 for Mac July, 2010 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are
System Requirements and Server Configuration
Hardware Requirements for C Series, page 1 Open Virtualization Files, page 2 VMware Hosting, page 2 Software, page 2 Side A Server Component Configurations, page 5 Side B Server Component Configurations,
Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8
Worry-FreeTM Business Security Standard and Advanced Editions Securing Your Journey to the Cloud8 Administrator s Guide System Requirements Trend Micro Incorporated reserves the right to make changes to
Analysis of VDI Storage Performance During Bootstorm
Analysis of VDI Storage Performance During Bootstorm Introduction Virtual desktops are gaining popularity as a more cost effective and more easily serviceable solution. The most resource-dependent process
BridgeWays Management Pack for VMware ESX
Bridgeways White Paper: Management Pack for VMware ESX BridgeWays Management Pack for VMware ESX Ensuring smooth virtual operations while maximizing your ROI. Published: July 2009 For the latest information,
McAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Performance Test Report: Novell iprint Appliance 1.1
White Paper File and Networking Services Performance Test Report: Novell iprint Appliance. Table of Contents page Executive Summary.... Introduction.... Overview... 3. Configurable Test Variables...3 4.
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Deploying XenApp 7.5 on Microsoft Azure cloud
Deploying XenApp 7.5 on Microsoft Azure cloud The scalability and economics of delivering Citrix XenApp services Given business dynamics seasonal peaks, mergers, acquisitions, and changing business priorities
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
McAfee MOVE AntiVirus (Agentless) 3.6.0
Product Guide McAfee MOVE AntiVirus (Agentless) 3.6.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
GRIDCENTRIC VMS TECHNOLOGY VDI PERFORMANCE STUDY
GRIDCENTRIC VMS TECHNOLOGY VDI PERFORMANCE STUDY TECHNICAL WHITE PAPER MAY 1 ST, 2012 GRIDCENTRIC S VIRTUAL MEMORY STREAMING (VMS) TECHNOLOGY SIGNIFICANTLY IMPROVES THE COST OF THE CLASSIC VIRTUAL MACHINE
Symantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
HOW MANY USERS CAN I GET ON A SERVER? This is a typical conversation we have with customers considering NVIDIA GRID vgpu:
THE QUESTION HOW MANY USERS CAN I GET ON A SERVER? This is a typical conversation we have with customers considering NVIDIA GRID vgpu: How many users can I get on a server? NVIDIA: What is their primary
http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
McAfee MOVE AntiVirus 2.6.0
Deployment Guide McAfee MOVE AntiVirus 2.6.0 For use with epolicy Orchestrator 4.5.0, 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
McAfee MOVE / VMware Collaboration Best Practices
McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...
VDI Without Compromise with SimpliVity OmniStack and VMware Horizon View
VDI Without Compromise with SimpliVity OmniStack and VMware Horizon View Page 1 of 16 Introduction A Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end user experience and
http://docs.trendmicro.com/en-us/smb/worry-free-business-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Trend Micro Endpoint Comparative Report Performed by AV Test.org
Trend Micro Endpoint Comparative Report Performed by AV Test.org Results from December 2009 Executive Summary In December of 2009, AV Test.org performed endpoint security benchmark testing on five market
DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering
DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
Flash Storage Optimizing Virtual Desktop Deployments
Flash Storage Optimizing Virtual Desktop Deployments Ashok Rajagopalan UCS Product Management May 2014 In Collaboration with Intel Old Fashioned VDI (circa 2012) was Financially Unattractive to Most Average
Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES
Server and Storage Sizing Guide for Windows 7 TECHNICAL NOTES Table of Contents About this Document.... 3 Introduction... 4 Baseline Existing Desktop Environment... 4 Estimate VDI Hardware Needed.... 5
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
An overwhelming majority of IaaS clouds leverage virtualization for their foundation.
1 2 3 An overwhelming majority of IaaS clouds leverage virtualization for their foundation. 4 With the use of virtualization comes the use of a hypervisor. Normally, the hypervisor simply provisions resources
Nimble Storage for VMware View VDI
BEST PRACTICES GUIDE Nimble Storage for VMware View VDI N I M B L E B E S T P R A C T I C E S G U I D E : N I M B L E S T O R A G E F O R V M W A R E V I E W V D I 1 Overview Virtualization is an important
Increasing performance and lowering the cost of storage for VDI With Virsto, Citrix, and Microsoft
Increasing performance and lowering the cost of storage for VDI With Virsto, Citrix, and Microsoft 2010 Virsto www.virsto.com Virsto: Improving VDI with Citrix and Microsoft Virsto Software, developer
An Oracle White Paper March 2013. Oracle s Single Server Solution for VDI
An Oracle White Paper March 2013 Oracle s Single Server Solution for VDI Introduction The concept of running corporate desktops in virtual machines hosted on servers is a compelling proposition. In contrast
Boost your VDI Confidence with Monitoring and Load Testing
White Paper Boost your VDI Confidence with Monitoring and Load Testing How combining monitoring tools and load testing tools offers a complete solution for VDI performance assurance By Adam Carter, Product
Tegile Zebi Application Selling. Virtual Desktop Initiatives
Tegile Zebi Application Selling Virtual Desktop Initiatives 1 Virtual Desktop Challenges Kiosks and labs Desktop administration cost Enterprise pain of migrating from XP to Windows 7 ipad & Android tablet
1. Server 2008 - Microsoft FEP 2010 - Instalation
1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements
Cisco, Citrix, Microsoft, and NetApp Deliver Simplified High-Performance Infrastructure for Virtual Desktops
Cisco, Citrix, Microsoft, and NetApp Deliver Simplified High-Performance Infrastructure for Virtual Desktops Greater Efficiency and Performance from the Industry Leaders Citrix XenDesktop with Microsoft
Using McAfee VirusScan. Professional Edition Version 8.0. Software On a DX8000 DVR
Using McAfee VirusScan Professional Edition Version 8.0 Software On a DX8000 DVR DX8000 Digital Video Recorder C1611M-B (12/04) Contents Using McAfee VirusScan Professional Edition Version 8.0.....................................................................5
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Flash Storage Roles & Opportunities. L.A. Hoffman/Ed Delgado CIO & Senior Storage Engineer Goodwin Procter L.L.P.
Flash Storage Roles & Opportunities L.A. Hoffman/Ed Delgado CIO & Senior Storage Engineer Goodwin Procter L.L.P. Overview & Background Flash Storage history First smartphones, then laptops, then onboard
Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms
Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual
Client Manager for Endpoint Protection (CMEP)
Client Manager for Endpoint Protection (CMEP) Release Notes Version 1.0 January, 2010 All rights reserved. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are trademarks of
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools
A Software White Paper December 2013 Virtual Desktop Infrastructure Optimization with SysTrack Monitoring Tools and Login VSI Testing Tools A Joint White Paper from Login VSI and Software 2 Virtual Desktop
Why AppSense for VDI. How User Virtualization performs and adds value. Page 1 of 2 1999-2012 AppSense Ltd. All Rights Reserved.
Why AppSense for VDI How User Virtualization performs and adds value Page 1 of 2 1999-2012 AppSense Ltd. All Rights Reserved. Contents Summary... 3 Test Scope and Purpose... 5 Test Framework... 5 Hardware...
Pricing Guide. Service Overview
Service Overview tolomy s G Cloud services are designed to give you the best possible degree of control and transparency over your costs. To maximise cost efficiency on offer to our customers a wide range
Symantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
A Dell White Paper Dell Compellent
Functional IOPS in VDI with Dell Compellent A Dell White Paper Dell Compellent THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
SIZING EMC VNX SERIES FOR VDI WORKLOAD
White Paper SIZING EMC VNX SERIES FOR VDI WORKLOAD An Architectural Guideline EMC Solutions Group Abstract This white paper provides storage sizing guidelines to implement virtual desktop infrastructure
VDI Optimization Real World Learnings. Russ Fellows, Evaluator Group
Russ Fellows, Evaluator Group SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material
SanDisk SSD Boot Storm Testing for Virtual Desktop Infrastructure (VDI)
WHITE PAPER SanDisk SSD Boot Storm Testing for Virtual Desktop Infrastructure (VDI) August 214 951 SanDisk Drive, Milpitas, CA 9535 214 SanDIsk Corporation. All rights reserved www.sandisk.com 2 Table
VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance
VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance Key indicators and classification capabilities in Stratusphere FIT and Stratusphere UX Whitepaper INTRODUCTION This whitepaper
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION
DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION A DIABLO WHITE PAPER AUGUST 2014 Ricky Trigalo Director of Business Development Virtualization, Diablo Technologies
ISE 820 All Flash Array. Performance Review. Performance Review. March 2015
ISE 820 All Flash Array Performance Review March 2015 Performance Review March 2015 Table of Contents Executive Summary... 3 SPC-1 Benchmark Re sults... 3 Virtual Desktop Benchmark Testing... 3 Synthetic
Enterprise Anti-Virus Protection
Enterprise Anti-Virus APRIL - JUNE 2013 Dennis Technology Labs www.dennistechnologylabs.com This report aims to compare the effectiveness of anti-malware products provided by well-known security companies.
McAfee Server Security
Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or
How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook
SEP 12.1 Best Practices in a Virtual Environment The document is intended to capture the complete set of best practices for installation and configuration of SEP in a virtual environment. 1 Table of Contents
ESAP 2.5.2 Release Notes. SDK Version: Windows 3.6.8649.2 (V2 Unified + V3), Mac 3.6.8470.2
ESAP 2.5.2 Release Notes SDK Version: Windows 3.6.8649.2 (V2 Unified + V3), Mac 3.6.8470.2 ESAP 2.5.2 and Junos Pulse Secure Access/Access Control Service Compatibility Chart: This ESAP package can be
Citrix XenDesktop Validation on Nimble Storage s Flash-Optimized Platform
XenDesktop Storage Validation on Nimble Storage Whitepaper XenDesktop Storage Validation on Nimble Storage Whitepaper Citrix XenDesktop Validation on Nimble Storage s Flash-Optimized Platform 1 2 Executive
AlwaysOn Desktop Implementation with Pivot3 HOW-TO GUIDE
Implementation with Pivot3 HOW-TO GUIDE Solution Overview Highly available servers and storage are critical components of the architecture and must be designed into the VDI clusters at each site. Desktop
WHITE PAPER 1 WWW.FUSIONIO.COM
1 WWW.FUSIONIO.COM WHITE PAPER WHITE PAPER Executive Summary Fusion iovdi is the first desktop- aware solution to virtual desktop infrastructure. Its software- defined approach uniquely combines the economics
Prinect. Is Your Prinect Workflow Safe from a Cyber Attack?
Prinect Is Your Prinect Workflow Safe from a Cyber Attack? Anti-Virus Software & Your Prinect Workflow Security is a key concern of today s digital world. Fully protecting your business requires a multi-prong
