MobiKEY. Virtual Desktop Infrastructure (VDI) Integration. September 2012



Similar documents
MobiKEY TM with TruOFFICE

SOLUTIONS OVERVIEW. Version 4.0

Enterprise Desktop Solutions: VMware View 4.5

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation

Increasing Your VDI Project s Return on Investment Using Workspace Virtualization

Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering

Real World Considerations for Implementing Desktop Virtualization

Augmenting VMware View Horizon (VDI) with Micro Focus Client Management

Parallels VDI Solution

QuickSpecs. HP Virtual Desktop Infrastructure with VMware View Overview

Cloud Attached Storage

How Using V3 Appliances Virtual Desktop Total Cost of Ownership (TCO) is Reduced: A Superior Desktop Experience For Less Money

Streamlining BEA WebLogic Server Application Development. With VMware Infrastructure 3. With VMware Infrastructure 3

Maximizing Your Desktop and Application Virtualization Implementation

Microsoft System Center Virtual Machine Manager 2008: Overview. Lee Chiang Yen Principal Trainer NetAssist Services

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN

Understanding & Improving Hypervisor Security

Cloud Computing. Chapter 8 Virtualization

VMware/Hyper-V Backup Plug-in User Guide

Increasing Storage Performance, Reducing Cost and Simplifying Management for VDI Deployments

Security. Environments. Dave Shackleford. John Wiley &. Sons, Inc. s j}! '**»* t i j. l:i. in: i««;

VMware Solutions for Small and Midsize Business

VIRTUALIZATION SECURITY IN THE REAL WORLD

VMware vsphere 4.1. Pricing, Packaging and Licensing Overview. E f f e c t i v e A u g u s t 1, W H I T E P A P E R

Frequently Asked Questions: Desktone s Offerings and Market

Why Choose VMware vsphere for Desktop Virtualization? WHITE PAPER

Top 10 Reasons to Virtualize VMware Zimbra Collaboration Server with VMware vsphere. white PAPER

More enhanced features.

Windows Server Virtualization An Overview

Virtualization Case Study

What s New with VMware Virtual Infrastructure

Virtualization Support - Real Backups of Virtual Environments

Server-centric client virtualization model reduces costs while improving security and flexibility.

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016

VMware Virtual Desktop Manager User Authentication Guide

Protecting your Data in a New Generation Virtual and Physical Environment

Quick Start Guide. for Installing vnios Software on. VMware Platforms

Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company

Using Intelligent Power Manager (IPM) & Intelligent Power Protector (IPP) on Virtual Desktop Infrastructure (VDI)

Deployment Guide for Citrix XenDesktop

Desktop Virtualization Strategy

Outgoing VDI Gateways:

Data Center Manager (DCM)

Always On Infrastructure for Software as a Ser vice

Deployment Guide: Unidesk and Hyper- V

VMsources Group Inc

Virtualization 101 ASPE RESOURCE SERIES. Prepared for ASPE by Global Knowledge's Kerry Doyle, MA, ZDNet/CNet.com Associate Editor

VDI and session-based desktop virtualization:

Hybrid Cloud Backup and Recovery Software. Virtualization Support Real Backups of Virtual Environments

IBM FlashSystem and Atlantis ILIO

How To Protect Your Cloud From Attack

Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server

Integration Guide: Using Unidesk 3.x with Citrix XenDesktop

The Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service

High Availability for Desktop Virtualization

ROCKING THE CLOUD VDI AT SAINT PAUL COLLEGE. Najam Saeed Lisa Nguyen Rob Reiter

VMware Virtual Infrastucture From the Virtualized to the Automated Data Center

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual

Thinspace deskcloud. Quick Start Guide

Desktop Virtualization and Storage Infrastructure Optimization

SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE. When you can do it simply, you can do it all.

Virtualization Essentials

Desktop Virtualization for the Banking Industry. Resilient Desktop Virtualization for Bank Branches. A Briefing Paper

Desktop Virtualization. The back-end

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Accelerating the Next Phase of Virtualization

Desktop virtualization for all

Getting the Most Out of VMware Mirage with Hitachi Unified Storage and Hitachi NAS Platform WHITE PAPER

Parallels Virtuozzo Containers

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Release Version 3 The 2X Software Server Based Computing Guide

Top 10 Myths of Desktop Virtualization

WHITE PAPER: Egenera Cloud Suite

Virtualized Hadoop. A Dell Hadoop Whitepaper. By Joey Jablonski. A Dell Hadoop Whitepaper

Course Title: Virtualization Security, 1st Edition

Kronos Workforce Central on VMware Virtual Infrastructure

ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK

Accelerating the Next Phase of Virtualization. Desktop virtualization and WAN optimization

Why is the V3 appliance so effective as a physical desktop replacement?

ArCycle vmbackup. for VMware/Hyper-V. User Guide

W H I T E P A P E R E n a b l i n g D a t a c e n t e r A u t o mation with Virtualized Infrastructure

Consolidate and Virtualize Your Windows Environment with NetApp and VMware

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for

Better virtualization of. XenApp and XenDesktop with XenServer

Transcription:

MobiKEY Virtual Desktop Infrastructure (VDI) Integration September 2012

Copyright 2012 Route1 Inc. All rights reserved. Route1, the Route1 and shield design Logo, SECURING THE DIGITAL WORLD, Mobi, MobiSecure, Route1 MobiKEY, Route1 MobiVDI, MobiKEY, MobiKEY IBAD, DEFIMNET, MobiNET, Route1 MobiNET, TruOFFICE, TruFLASH, TruOFFICE VDI, MobiKEY Fusion, EnterpriseLIVE, EnterpriseLIVE VO, MobiNET Agent and MobiKEY Classic, are either registered trademarks or trademarks of Route1 Inc. in the United States and or Canada. All other trademarks and trade names are the property of their respective owners. The DEFIMNET and MobiNET platforms, and the MobiKEY, MobiKEY Classic and MobiKEY Fusion devices are protected by U.S. Patents 7,814,216 and 7,739,726, and other patents pending. Route1 Inc. is the owner of, or licensed user of, all copyright in this brochure, including all photographs, product descriptions, designs and images. No part of this brochure may be reproduced, transmitted or otherwise used in whole or in part or by any means without prior written consent of Route1 Inc. September 2012 2

Why Virtualization? Today s computer hardware was designed to run a single operating system, leaving most machines vastly underutilized. Virtualization lets you run multiple virtual machines on a single physical machine, with each virtual machine sharing the resources of that one physical computer across multiple environments. How Route1 Uses Virtualization MobiKEY uses virtualization to break the bonds between the desktop and operating systems, applications and peripheral hardware. By encapsulating the operating system, user applications and data into isolated layers, MobiKEY enables IT administrators to change, update and deploy each component independently for greater business agility and improved response time. The result is a more flexible access model that improves security, lowers operating costs and simplifies desktop administration and management. In short, MobiKEY is a secure remote access service that extends an organization s server consolidation strategy to the desktop and ensures peace of mind. The virtual machine concept allows users to share the resources of a single computer across multiple users for maximum efficiency. MobiKEY has expanded this capability to enable a virtual infrastructure, which allows multiple users to virtually and securely share their resources (programs, applications, processes and data) across the entire network. How MobiKEY Works with VDI MobiKEY requires the deployment of the EnterpriseLIVE virtualization orchestrator appliance on the corporate network. MobiKEY uses the third party virtual infrastructure, i.e. VMware or Citrix Xen Server. EnterpriseLIVE Virtualization Orchestrator (EL-VO or MAG) The EL-VO appliance is responsible for managing virtual machine pools and the allocation of available virtual machine resources for new session requests by MobiKEY users. The EL-VO appliance interacts with the VDI server(s) (both of which can be located within the customer datacenter) to handle the creation and availability of virtual machines on demand. It also interacts with the Connection Arbitrator, which runs within the MobiNET platform environment. This unique and powerful appliance provides end-users with a familiar desktop experience, while enabling administrators to seamlessly integrate a unified secure desktop consolidation strategy within their corporate datacenters and maximize the utilization of system resources, to more effectively 3

monitor and manage centralized virtualized desktops, all while providing a low total cost of ownership by minimizing e-waste and hardware overhead. The EL-VO hardware requires only basic network configuration. It does not require exposure to the internet (incoming connections from outside of the enterprise are not required). It requires the following network accessibility: outgoing connection to the MobiNET platform incoming connection on port 443 accessible from where the VDI provider is located; commonly inside the corporate network Integration with the VDI Provider The VDI provider hosts and manages the virtual desktops and application resources that end-users will connect to using their MobiKEY. Once the VDI provider s application(s) are installed and properly configured, the administrator will create a Virtual Machine template which will contain a Windows-based operating system and the applications required by the users of a given resource pool. Each time a new virtual desktop session is initiated, the user will connect with a cloned version of this virtual machine template. This template also contains a configured MobiNET Agent software with the IP address of the corresponding EL-VO appliance so that each time a new Virtual Machine is created, the MobiNET Agent software will contact the EL-VO appliance to download the proper pool configuration. Most virtual machine monitors in the market today rely on a built-in operating system to perform core virtualization tasks such as allocating hardware resources to the various virtual machines that run on top. This means that your virtual machines are only as reliable as the built-in operating system. For example, VMware ESX is based on the VMware ESX architecture, which installs directly on the physical server and has no reliance on a general purpose operating system. VMware ESXi has an ultra thin design with no reliance on a general purpose operating system. This architecture avoids the requirements for security hardening, user access control, anti-virus tasks and patching associated with typical operating systems. Its ultra thin code base installs directly on the server hardware for the ultimate reliability. 4

Virtual Desktop Pool Management MobiKEY includes integrated virtual desktop management capabilities that leverage the EL-VO appliance which provisions and manages allocation of available virtual desktop pools and resources. The EL-VO appliance supports three types of virtual desktops. 5

Persistent Desktop Pool This is a pool of virtual desktops that permanently assigns a virtual desktop to a user once that desktop has been created. When a session is finished, the resources used by the virtual desktop are released and made available for other users. However, the virtual desktop is persisted. Each user will connect to their virtual desktop each time. The user is able to customize their desktop as these customizations will be persisted. Non-Persistent Desktop Pool This is a pool of virtual desktops that are similar to persistent desktops, except in the fact that these virtual desktops are not permanently assigned to users. When a session is finished, the virtual desktop is returned to the pool and made available for other users. By recycling the virtual desktops after each session, this type of pool ensures that each user receives a newly provisioned virtual desktop each time a connection to the pool is made. This pool configuration should be employed when a clean virtual machine is required for each user session or in highly controlled environments where there is no requirement for customization on virtual desktop instances. Individual Desktops These are existing virtual desktops that are available through the EL-VO appliance. The EL-VO appliance pool manager controls the power state of these virtual desktop instances. MobiKEY also supports roaming user profiles. Roaming user profiles allow a user with a computer joined to a Windows Server domain to log onto any computer on the same network and access their documents and have a consistent desktop experience, such as applications remembering toolbar positions and preferences, or the desktop appearance staying the same. Benefits to Using MobiKEY with VDI 1. Physical desktops consolidated into a centralized virtual infrastructure. 2. Remote access provided by software residing on MobiKEY. 3. Relies on mature hypervisor technology that runs in tens of thousands of customer environments. 4. MobiKEY provides total cost of ownership savings by consolidating physical desktops into virtual desktops in a centralized data center, which results in: Reduces helpdesk support. Centralized management. 6

Fits into any disaster recovery strategy. Provides an easy way to rollout extra temporary user seats. Increased access control to sensitive corporate information (no copy, paste, printing, or removable media) as the VDI pool is locked in corporate datacenter. 5. Can be used as a strategy for digital rights management and business continuity. 7