SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
Enhancing Workplace Mobility and BYOD with the
VMware Mobile Secure Workplace
Marilyn Basanta
Technical Solutions Architect
VMware End User Computing
@marilynbasanta
EUC5509
#EUC5509
Agenda
 Solution overview
 Breakdown of elements
 Load balancing and namespace services
 AD configuration for PKI and Certificate Services
 RADIUS integration
 Persona management
 vCloud Network and Security
 vShield Endpoint and Anti Malware
 vSphere and View configuration considerations
 Horizon Workspace configuration considerations
 Horizon Workspace - Mobile
 Partner Solution – Trend Micro Mobile Security
 Final comments
Solution Overview
L7
End User Devices
Internal Network
External Network/
INTERNET
AD
SSO CA
RADIUS
F&P BACKUP
vC
VCNS AV
Knowledge
Workers
Mobile
Knowledge
Power
Users
MOBILITY
SECURITY
USER EXPERIENCE
VMware View Security Server
VMware View Connection Managers
HW: Gateway VM
vCOPs
Horizon
Workspace vApp
Trend Micro Mobile Security
Before we dive in, some top level items to consider…
TCP/IP Schema, VLANs, routing
and name resolution
considerations
Active Directory topology and
requirements
Network security requirements
and policies
Application workload
requirements, user roles and
behavior
LAN/WAN Topology and design
for real time protocols
Compliance requirements
Load Balancing and namespace services
L7
VMware View
Security Servers
VMware View
Connection Managers
End User Devices
Internal Network
External Network/
INTERNET
• Ensure dedicated LB networks are planned for and
exist in advance of deployment
INTERNAL EXTERNAL HA DMZ
• Plan for redundant configurations, N+1 and vSphere HA/DRS affinity
rules
Active Directory considerations
• Evaluate any existing AD
infrastructure
• New child domain? Security
requirements
• Enough DC resources in the
necessary sites?
• Enterprise CA will need to be
configured from the FRD down if
you are deploying a Windows based
PKI
• Sites and subnets configured
appropriately to localize domain
operations to the closest DCs
• Configuration steps are provided in the
solution design document
RADIUS Integration
• More choices for RADIUS integration
• Plan for extra connection servers to
provide redundant support for users
authenticating with RADIUS
• Validated solution uses Microsoft
RADIUS in the design.
Persona Management
• Considerations for virtual machines hosting
profile volumes
• Tuning the profile upload interval for scale
• When possible use Persona instead of
Windows Roaming profiles to avoid conflict
• Folder redirection balanced with roaming
data
• Application specific requirements such as
ThinApp sandbox roaming
• AV strategy using Persona, in band scanning
as part of vShield Endpoint or out of band on
the persona management fileservers
vSphere and View considerations
vDS
• Where possible leverage vDS in
management and View VDI infrastructure
• Auto-Deploy and host profiles for rollout
and ongoing compliance, conformity at
scale
• vCNS Edge for network services such as
DHCP, load balancing
• vMA for host management and
administration, vSphere web client
vCNS – App Firewall and Edge
VMware vSphere
Knowledge
Workers
Power
Users
LOB Apps
• vCNS App and Edge services
to provide security for our
logical groupings of VMs
• Define in advance the access
rules that will be required to
secure your resources
effectively
• Remember to define rules for
View agent/client/server
communication and display
protocols!
• Get familiar with the
troubleshooting techniques
required for vShield, you
*WILL* need to debug at some
stage!
Start with an open policy then
lock it down as you go
vSphere Feature – vShield Endpoint
Partner Solution: Trend
Micro Deep Security
Security API
ESX
Anti-Virus
Workload VM’s
VMDK
EPSec
• Understand the impact
on density, plan for
dedicated resources
required by security
VM per host
• Fully evaluate performance characteristics
• Look out for gotcha’s in on-access scanning and scheduled
scanning defaults
• Ensure all hosts successfully install vShield Endpoint as part of the
deployment process prior to deploying infrastructure or VDI
services. If possible integrate the vendor specific VIBs into your
ESXi installation image.
Deep Security Virtual Appliance
• Intrusion prevention
• Firewall
Virtualization Security with Deep Security
Agentless Security Platform for Private Cloud Environments
• Anti-malware
• Web reputation
• Integrity monitoring
VM VM VM
The Old Way
Security
Virtual
Appliance
VM VM VM
With Deep Security
VM
Easier
Manageability
Higher
Density
Fewer
Resources
Stronger
Security
VM
More VMs
1310/17/2013 Confidential | Copyright 2012 Trend Micro Inc.
Horizon Workspace vApp
Workspace vApp
Configurator
VA
OS (SLES)
tcserver
Service VA
OS (SLES)
App
API
DBtcserver
Data VA
OS (SLES)
App
API
DB LDAPJetty
App
Connector
VA
OS (SLES)
tcserver
App
Gateway
VA
OS (SLES)
Nginx
Modules
• Central Wizard UI
• Distributes settings
across VAs
• Network, Gateway,
vCenter, SMTP
attributes
• Add / remove modules
• Manage certs, security
• User authentication (RSA SecureID)
• AD secure bind and synchronization
• Set replication schedule
• Sync View pools and ThinApp
• Enables single user-
facing domain
• Routes requests to
correct node
• Workspace Admin UI
• Application Catalog
• Manage user entitlements
• Workspace Groups
• Reporting
• Stores files
• Controls file sharing policy for
internal and external users
• Manage file preview server
• Serves end user web UI
Horizon Workspace Deploy Considerations
• Ensure DNS name resolution is prepared in advance
• Split brain considerations for Gateway FQDN
• Prepare Signed Certificates in advance, the entire SSL chain
must be exported
• Create an Active Directory BIND DN account
• Ensure Active Directory group structure is in place to support
Workspace services (applications, data)
Horizon Workspace Deploy Considerations
• Prepare ThinApp repositories
• Configure SAML settings for View, the
default the SAML Timeout is 15 minutes
• Decide on a preview strategy (LibreOffice or
Microsoft Preview Server)
• User Principal Name (UPN) set as a required
attribute for View
• Horizon Data storage sizing
Horizon Workspace – Gateway-va Diagram
L7 Load Balancer
Load balancing strategy and technical preparation complete
Virtualization on Android (Mobile Virtualization Platform)
Personal Corporate
Corporate Workspace
Enterprise Catalog
Mail/Calendar App
Custom Apps
3rd Party Apps
 Own your full version of Android OS
 Consistent native mobile experience
 Deploy applications without modifying them
Solve Android fragmentation
 Strict corporate assets isolation
 Corporate data encryption
 VPN policy for corporate traffic
Prevent data leakage
 Exchange email, calendar, secure browser,
file browser and contacts
 Your Line Of Business application
Provide productivity features
How do Employees Obtain VMware Horizon Workspace/Mobile?
Employees’ Device
VMware Switch
Confidential
Sony is supporting Vmware Ready devices as standard feature
Coming soon: Xperia Z1
and Xperia Ultra Z will be
VMware Ready for
World Wide coverage.
Today’s Attacks: Social, Sophisticated, Stealthy!
Attacker
Moves laterally across network
seeking valuable data
Establishes Command
& Control server
Extracts data of interest – can go
undetected for months!
$$$$
Gathers intelligence about
organization and individuals
Targets individuals
using social engineering
Employees
MOBILE MALWARE
Yes… It’s real.
It’s not just “malware”, but, privacy leaks..
Well Known Apps Leak Data ..
Device Management & Control
Employees
Trend Micro
Mobile Security
Email SharePoint Corp Data Web Traffic
• Easy onboarding: email, URL, QR code
• Apple (iOS), Android, Blackberry, Windows Phone 7
and 8
• Optional Cloud Communication Server
• Device Discovery
• Device Provisioning
• Remote Control
• Reporting
• Inventory Management
Cloud
Comm.
Server
Threat Protection
Employees
Email SharePoint Corp Data Web Traffic
Trend Micro
Mobile Security
• Android AV and Website
Reputation
• Leveraging Smart Protection
Network
• Anti-Malware
• Firewall
• Web Threat Protection
• Call Filtering
• SMS/WAP Anti-Spam
Complete End User Protection
Email &
Messaging
Web
Access
Device Hopping
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Anti-Malware Encryption
Application
Control
Device
Management
Data Loss
Prevention
Content
Filtering
Employees
IT Admin
Security
Trend Micro Mobile Security
Manage Device
Management
• Device Discovery
• Device Enrollment
• Device Provisioning
• Asset Tracking
• S/W Management
• Remote Control
• Reporting
• Summary Views
• Summery Reports
Mobile Device
Security
• Anti-Malware
• Firewall
• Web Threat Protection
• Call Filtering
• SMS/WAP Anti-Spam
• Jail break detection
• App Reputation
Data Protection
• Encryption Enforcement
• Remote Wipe
• Selective Wipe
• Remote Lock
• Feature Lock
• Password Policy
Application
Management
• App Black Listing
• App White Listing
• App Push
• Required
• Optional
• App Inventory
Stand Alone/Integrated
Horizon Virtual Workspace
Windows Management
and Delivery
(server hosted & local)
(apps and desktops)
VMware Horizon View & Mirage
Secure Mobile
Workspace
(across all devices)
(apps, data, collaboration)
VMware Horizon Workspace
Virtual
Workspace
Secure access to all my
stuff, anywhere, anytime
Next Steps
For more information on Mobile Secure Desktop design, please visit:
Mobile Secure Desktop Validated Design
Guidehttp://www.vmware.com/files/pdf/view/Mobile-Secure-Desktop-Solution-Brief.pdf
Mobile Secure Desktop Solution Guidehttp://www.vmware.com/files/pdf/view/Mobile-
Secure-Desktop-Solution-Brief.pdf
View Design
Resourceshttp://www.vmware.com/products/desktop_virtualization/view/technical-
resources.html#Design
Horizon Workspace Reviewer’s Guide
http://www.vmware.com/files/pdf/techpaper/vmware-horizon-workspace-reviewers-
guide.pdf
Integrating Horizon Workspace and Horizon View
http://www.vmware.com/files/pdf/techpaper/vmware-horizon-view-integration-horizon-
workspace.pdf
Configuring Horizon Switch
http://blogs.vmware.com/horizontech/2013/08/configuring-vmware-switch-for-android-
with-vmware-horizon-workspace-1-5.html
THANK YOU
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace

Weitere ähnliche Inhalte

Was ist angesagt?

Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM DatapowerSigortam.net
 
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...Jürgen Ambrosi
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for znick_garrod
 
Unraveling the mystery of Cloud Computing
Unraveling the mystery of Cloud ComputingUnraveling the mystery of Cloud Computing
Unraveling the mystery of Cloud ComputingByron Patrick
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageINSPIRIT BRASIL
 
V mware v realize automation 6.2 knowledge transfer kit
V mware v realize  automation 6.2 knowledge transfer kitV mware v realize  automation 6.2 knowledge transfer kit
V mware v realize automation 6.2 knowledge transfer kitsolarisyougood
 
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access GatewaySichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access GatewayDigicomp Academy AG
 
Zimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentationZimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentationsolarisyourep
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxsolarisyougood
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security ProcessesAmazon Web Services Japan
 
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computingpallavikhandekar212
 

Was ist angesagt? (20)

Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
Unraveling the mystery of Cloud Computing
Unraveling the mystery of Cloud ComputingUnraveling the mystery of Cloud Computing
Unraveling the mystery of Cloud Computing
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
VAS - VMware CMP
VAS - VMware CMPVAS - VMware CMP
VAS - VMware CMP
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
vRA7 What's New
vRA7 What's NewvRA7 What's New
vRA7 What's New
 
V mware v realize automation 6.2 knowledge transfer kit
V mware v realize  automation 6.2 knowledge transfer kitV mware v realize  automation 6.2 knowledge transfer kit
V mware v realize automation 6.2 knowledge transfer kit
 
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access GatewaySichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
 
Zimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentationZimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentation
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
 
Security Avalanche
Security AvalancheSecurity Avalanche
Security Avalanche
 
Zimbra Overview
Zimbra OverviewZimbra Overview
Zimbra Overview
 
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computing
 

Ähnlich wie VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace

Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityScott Hoag
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Amazon Web Services
 
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero Amazon Web Services
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSDeploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSAmazon Web Services
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the CloudAmazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the CloudAmazon Web Services
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformShashi Kiran
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureK.Mohamed Faizal
 
KoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersKoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersTobias Koprowski
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon Web Services
 
Por trás da infraestrutura do Cloud - Campus Party 2014
Por trás da infraestrutura do Cloud - Campus Party 2014Por trás da infraestrutura do Cloud - Campus Party 2014
Por trás da infraestrutura do Cloud - Campus Party 2014Gleicon Moraes
 
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...Amazon Web Services
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your AzureHolly Plude
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine Erin Banks
 
Windows Azure Overview for IT Professionals
Windows Azure Overview for IT ProfessionalsWindows Azure Overview for IT Professionals
Windows Azure Overview for IT ProfessionalsAlex Melching
 

Ähnlich wie VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace (20)

Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network Security
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSDeploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the CloudAmazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
 
KoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersKoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginners
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
 
Por trás da infraestrutura do Cloud - Campus Party 2014
Por trás da infraestrutura do Cloud - Campus Party 2014Por trás da infraestrutura do Cloud - Campus Party 2014
Por trás da infraestrutura do Cloud - Campus Party 2014
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
resumeLF_201503
resumeLF_201503resumeLF_201503
resumeLF_201503
 
Windows Azure Overview for IT Professionals
Windows Azure Overview for IT ProfessionalsWindows Azure Overview for IT Professionals
Windows Azure Overview for IT Professionals
 

Mehr von VMworld

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld
 

Mehr von VMworld (20)

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep Dive
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep Dive
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations!
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts Panel
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way!
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SAN
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace

  • 1. Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace Marilyn Basanta Technical Solutions Architect VMware End User Computing @marilynbasanta EUC5509 #EUC5509
  • 2. Agenda  Solution overview  Breakdown of elements  Load balancing and namespace services  AD configuration for PKI and Certificate Services  RADIUS integration  Persona management  vCloud Network and Security  vShield Endpoint and Anti Malware  vSphere and View configuration considerations  Horizon Workspace configuration considerations  Horizon Workspace - Mobile  Partner Solution – Trend Micro Mobile Security  Final comments
  • 3. Solution Overview L7 End User Devices Internal Network External Network/ INTERNET AD SSO CA RADIUS F&P BACKUP vC VCNS AV Knowledge Workers Mobile Knowledge Power Users MOBILITY SECURITY USER EXPERIENCE VMware View Security Server VMware View Connection Managers HW: Gateway VM vCOPs Horizon Workspace vApp Trend Micro Mobile Security
  • 4. Before we dive in, some top level items to consider… TCP/IP Schema, VLANs, routing and name resolution considerations Active Directory topology and requirements Network security requirements and policies Application workload requirements, user roles and behavior LAN/WAN Topology and design for real time protocols Compliance requirements
  • 5. Load Balancing and namespace services L7 VMware View Security Servers VMware View Connection Managers End User Devices Internal Network External Network/ INTERNET • Ensure dedicated LB networks are planned for and exist in advance of deployment INTERNAL EXTERNAL HA DMZ • Plan for redundant configurations, N+1 and vSphere HA/DRS affinity rules
  • 6. Active Directory considerations • Evaluate any existing AD infrastructure • New child domain? Security requirements • Enough DC resources in the necessary sites? • Enterprise CA will need to be configured from the FRD down if you are deploying a Windows based PKI • Sites and subnets configured appropriately to localize domain operations to the closest DCs
  • 7. • Configuration steps are provided in the solution design document RADIUS Integration • More choices for RADIUS integration • Plan for extra connection servers to provide redundant support for users authenticating with RADIUS • Validated solution uses Microsoft RADIUS in the design.
  • 8. Persona Management • Considerations for virtual machines hosting profile volumes • Tuning the profile upload interval for scale • When possible use Persona instead of Windows Roaming profiles to avoid conflict • Folder redirection balanced with roaming data • Application specific requirements such as ThinApp sandbox roaming • AV strategy using Persona, in band scanning as part of vShield Endpoint or out of band on the persona management fileservers
  • 9. vSphere and View considerations vDS • Where possible leverage vDS in management and View VDI infrastructure • Auto-Deploy and host profiles for rollout and ongoing compliance, conformity at scale • vCNS Edge for network services such as DHCP, load balancing • vMA for host management and administration, vSphere web client
  • 10. vCNS – App Firewall and Edge VMware vSphere Knowledge Workers Power Users LOB Apps • vCNS App and Edge services to provide security for our logical groupings of VMs • Define in advance the access rules that will be required to secure your resources effectively • Remember to define rules for View agent/client/server communication and display protocols! • Get familiar with the troubleshooting techniques required for vShield, you *WILL* need to debug at some stage! Start with an open policy then lock it down as you go
  • 11. vSphere Feature – vShield Endpoint Partner Solution: Trend Micro Deep Security Security API ESX Anti-Virus Workload VM’s VMDK EPSec • Understand the impact on density, plan for dedicated resources required by security VM per host • Fully evaluate performance characteristics • Look out for gotcha’s in on-access scanning and scheduled scanning defaults • Ensure all hosts successfully install vShield Endpoint as part of the deployment process prior to deploying infrastructure or VDI services. If possible integrate the vendor specific VIBs into your ESXi installation image.
  • 12. Deep Security Virtual Appliance • Intrusion prevention • Firewall Virtualization Security with Deep Security Agentless Security Platform for Private Cloud Environments • Anti-malware • Web reputation • Integrity monitoring VM VM VM The Old Way Security Virtual Appliance VM VM VM With Deep Security VM Easier Manageability Higher Density Fewer Resources Stronger Security VM More VMs 1310/17/2013 Confidential | Copyright 2012 Trend Micro Inc.
  • 13. Horizon Workspace vApp Workspace vApp Configurator VA OS (SLES) tcserver Service VA OS (SLES) App API DBtcserver Data VA OS (SLES) App API DB LDAPJetty App Connector VA OS (SLES) tcserver App Gateway VA OS (SLES) Nginx Modules • Central Wizard UI • Distributes settings across VAs • Network, Gateway, vCenter, SMTP attributes • Add / remove modules • Manage certs, security • User authentication (RSA SecureID) • AD secure bind and synchronization • Set replication schedule • Sync View pools and ThinApp • Enables single user- facing domain • Routes requests to correct node • Workspace Admin UI • Application Catalog • Manage user entitlements • Workspace Groups • Reporting • Stores files • Controls file sharing policy for internal and external users • Manage file preview server • Serves end user web UI
  • 14. Horizon Workspace Deploy Considerations • Ensure DNS name resolution is prepared in advance • Split brain considerations for Gateway FQDN • Prepare Signed Certificates in advance, the entire SSL chain must be exported • Create an Active Directory BIND DN account • Ensure Active Directory group structure is in place to support Workspace services (applications, data)
  • 15. Horizon Workspace Deploy Considerations • Prepare ThinApp repositories • Configure SAML settings for View, the default the SAML Timeout is 15 minutes • Decide on a preview strategy (LibreOffice or Microsoft Preview Server) • User Principal Name (UPN) set as a required attribute for View • Horizon Data storage sizing
  • 16. Horizon Workspace – Gateway-va Diagram L7 Load Balancer Load balancing strategy and technical preparation complete
  • 17. Virtualization on Android (Mobile Virtualization Platform) Personal Corporate Corporate Workspace Enterprise Catalog Mail/Calendar App Custom Apps 3rd Party Apps  Own your full version of Android OS  Consistent native mobile experience  Deploy applications without modifying them Solve Android fragmentation  Strict corporate assets isolation  Corporate data encryption  VPN policy for corporate traffic Prevent data leakage  Exchange email, calendar, secure browser, file browser and contacts  Your Line Of Business application Provide productivity features
  • 18. How do Employees Obtain VMware Horizon Workspace/Mobile? Employees’ Device VMware Switch Confidential
  • 19. Sony is supporting Vmware Ready devices as standard feature Coming soon: Xperia Z1 and Xperia Ultra Z will be VMware Ready for World Wide coverage.
  • 20. Today’s Attacks: Social, Sophisticated, Stealthy! Attacker Moves laterally across network seeking valuable data Establishes Command & Control server Extracts data of interest – can go undetected for months! $$$$ Gathers intelligence about organization and individuals Targets individuals using social engineering Employees
  • 21.
  • 23.
  • 24. It’s not just “malware”, but, privacy leaks..
  • 25. Well Known Apps Leak Data ..
  • 26. Device Management & Control Employees Trend Micro Mobile Security Email SharePoint Corp Data Web Traffic • Easy onboarding: email, URL, QR code • Apple (iOS), Android, Blackberry, Windows Phone 7 and 8 • Optional Cloud Communication Server • Device Discovery • Device Provisioning • Remote Control • Reporting • Inventory Management Cloud Comm. Server
  • 27. Threat Protection Employees Email SharePoint Corp Data Web Traffic Trend Micro Mobile Security • Android AV and Website Reputation • Leveraging Smart Protection Network • Anti-Malware • Firewall • Web Threat Protection • Call Filtering • SMS/WAP Anti-Spam
  • 28. Complete End User Protection Email & Messaging Web Access Device Hopping Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Anti-Malware Encryption Application Control Device Management Data Loss Prevention Content Filtering Employees IT Admin Security
  • 29. Trend Micro Mobile Security Manage Device Management • Device Discovery • Device Enrollment • Device Provisioning • Asset Tracking • S/W Management • Remote Control • Reporting • Summary Views • Summery Reports Mobile Device Security • Anti-Malware • Firewall • Web Threat Protection • Call Filtering • SMS/WAP Anti-Spam • Jail break detection • App Reputation Data Protection • Encryption Enforcement • Remote Wipe • Selective Wipe • Remote Lock • Feature Lock • Password Policy Application Management • App Black Listing • App White Listing • App Push • Required • Optional • App Inventory Stand Alone/Integrated
  • 30. Horizon Virtual Workspace Windows Management and Delivery (server hosted & local) (apps and desktops) VMware Horizon View & Mirage Secure Mobile Workspace (across all devices) (apps, data, collaboration) VMware Horizon Workspace Virtual Workspace Secure access to all my stuff, anywhere, anytime
  • 31. Next Steps For more information on Mobile Secure Desktop design, please visit: Mobile Secure Desktop Validated Design Guidehttp://www.vmware.com/files/pdf/view/Mobile-Secure-Desktop-Solution-Brief.pdf Mobile Secure Desktop Solution Guidehttp://www.vmware.com/files/pdf/view/Mobile- Secure-Desktop-Solution-Brief.pdf View Design Resourceshttp://www.vmware.com/products/desktop_virtualization/view/technical- resources.html#Design Horizon Workspace Reviewer’s Guide http://www.vmware.com/files/pdf/techpaper/vmware-horizon-workspace-reviewers- guide.pdf Integrating Horizon Workspace and Horizon View http://www.vmware.com/files/pdf/techpaper/vmware-horizon-view-integration-horizon- workspace.pdf Configuring Horizon Switch http://blogs.vmware.com/horizontech/2013/08/configuring-vmware-switch-for-android- with-vmware-horizon-workspace-1-5.html