3. The Who
U2Cloud is a leader in hosting Microsoft collaborative software solutions and
business productivity suites. Our customers range from Fortune 500 companies
to small consulting firms that would like to improve efficiencies and interactions
with their customers.
4. Delivery
Our solutionsâ provide users with a secure, full-featured media-rich computing
experience with the latest productivity and entertainment applications. Our
products are delivered on-demand through the Internet to Smartphoneâs, Tablets,
PCâs, Macs or connected TVs.
5. U2Cloud is platform agnostic and only partners with the leading
technology manufacturers ensuring a robust and flexible solution
to better fit our clients ever-changing needs.
6. The What - Hosted Virtual Desktops (HVD)
Hosted Virtual Desktop (HVD) - It's your very own private Windows PC, that
you can connect to from anywhere on the planet. Jump from tablet to laptop
to phone and keep working without missing a beat.
7. The What - Hosted Virtual Desktops (HVD)
HVD enables a centralized desktop strategy that allows for quick and secure
access to applications and desktops. HVDâs can be accessed from any network-
connected device, including new PCs, older hardware, and thin clients. In
addition, all data and applications are stored centrally, ensuring a higher level
of data security and helping simplify regulatory compliance.
8. The What - Hosted Virtual Desktops (HVD)
When using HVD, you can present users with an entire desktop environment or
just the individual applications. Data is centrally stored and can be accessed by
hosted virtual desktops or SaaS applications. From a user perspective, these
applications are integrated seamlessly. They look, feel and behave like local
applications
9. Anytime, Anywhere, Any Device!
Existing PC & MAC
Workstations
Thin Clients
Existing Laptops
Apple Laptops &
Chrome Books
iPad
Blackberry
Android
iPhone
10. Intrinsic Benefits of HVD
Business Continuity Business Agility
Work-Life Balance
Predictable IT Costs Redefine the Role of IT Control and Compliance
11. Source: 451 Group 2012 Virtualization Market Report, October 2012
The Hold-Up
16. The Flavors of VDI
Non-Persistent
aka stateless
The major disadvantage of non-persistent desktops is that any
customizations made by users and any applications that are
delivered outside of the base image are lost after each desktop
reboot.
⢠simple roll-out and update of basic images
⢠guaranteed to be 100% identical
⢠user always has the same (clean) desktop
⢠less effort due to the standardization of images.
⢠zero Windows configuration drift
⢠less storage is required because a single base operating
system image can be shared across many desktops
Task Workers
Kiosks
Call Centers
EDU & Training
17. The Flavors of VDI
Persistent
aka stateful
The major disadvantage of persistent desktops is the high cost.
Persistent desktops also offer little operational cost savings, since
they are managed one at a time like physical PCs, using the same
agent-based PC management tools.
⢠users have freedom to install software within the desktop
⢠personalization and settings maintain through reboots
⢠least operational upheaval when migrating from PC model
⢠users are assigned dedicated virtual machines & custom
resources which remain the same every time they login
Developers/Programmers
Designers
Engineering CAD
Financial Reporting
18. The Flavors of VDI
Layered
aka My Favorite
⢠users have freedom to install software within the desktop
⢠personalization and settings maintain through reboots
⢠least operational upheaval when migrating from PC model
⢠less storage is required because a single base operating
system image can be shared across many desktops
⢠simple roll-out and update of basic images
⢠standardization of images, simpler application packaging and
ability to rollback or âundoâ OS and application patches.
Executives
Sales
Marketing
Finance & Accounting
Office Workers
Layering combines the benefits of stateful
and stateless desktops in one solution!
19. Layered Virtual Desktops
⢠Pooled and Personal desktops that cost less than PCs
⢠Personal desktops
⢠Golden image +
Personal vDisk
⢠Enables full user
personalization while
leveraging a common
golden image
Pooled desktops
Golden image
Personal virtual desktops
Pooled desktops
Itâs all about simple management
PVD
PVD contains
⢠User installed Applications
⢠User Data
⢠User Preferences
⢠Reduce management overhead by supporting
personal and pooled desktops from a few golden
images
⢠Eliminate 60% of image storage costs with
personalized desktops that use single instance
management
Business Benefit
20. Why Application Virtualization?
Application Server Farm
Several different devicesInstall once, deliver anywhere
Smaller storage footprint
Easy application deployment 1 to 10,000
Zero Application Drift â Sandboxed
Seamless updates & patches
Consistent end-user experience Security & Compliance
21. Application Virtualization
Applications are executed on the local device
but only certain components are downloaded,
making it possible to function without a
network connection.
Remote Applications
Run on a remote server rather than on a client
device. Agile DR
Application Streaming
Run non-native apps.. i.e Quickbooks on iPad
Applications can be faster using more robust
CPU/GPU in addition to the proximity of
corporate data
24. Our Solution Provides
⢠Secure & Compliant Desktops
⢠Active-Directory Integration
⢠Latest Microsoft Collaboration Tools
⢠Next-Generation Application Firewalls
⢠Self-Service Provisioning Portal
⢠Secure Access Anytime, Anywhere from Any Device
⢠Pay-As-You-Go
⢠Streamlined DR & Business Continuity
25. True Application Security
Pooled desktops
New VDI Challenges for the Firewall
1. Identify applications regardless of
port, protocol, evasive tactic or SSL
2. Identify users regardless of IP address
3. Scan application content in real-time
(prevent threats and data leaks)
4. Granular visibility and policy control
over application access / functionality
5. Multi-gigabit, in-line deployment with
no performance degradation
27. ⢠Users no longer defined solely by IP address
â Leverage existing Active Directory infrastructure
⢠Understand users application and threat behavior based on actual AD
username, not just IP
⢠Manage and enforce policy based on user and/or AD group
⢠Investigate security incidents, generate custom reports
Enterprise Directory Integration
User-ID
28. 256 SSL 256 SSL 256 SSL
Enterprise Directory Integration
Customer Active-Directory U2Cloud Active-Directory
Automatic User Info & Security Group Synchronization
30. Local VM VDI VM
Runs below the operating system
to make PCs manageable, reliable, & secure
Secure Local Execution
Type-1 Client Hypervisor
Hypervisor
OS
Apps
Data
Compliant & Disconnected
31. ⢠Powers Mobile Workstyles
â Laptop as the primary device
â Tablet and phone as a companion device
⢠Unified End User Experience
â Local execution
â Hosted apps, data, desktops
â Continuous synchronization between environments
⢠Seamless Management & Powerful Security
â Switching between devices and online/offline use
â Rapid recovery in the field if laptop lost, stolen, or fails
â Strong security with disk-encryption, remote kill, and time-based lockout
Securing Road Warriors
32. Customer self-service
Simple and intuitive MGMT interface
Delegated administration
Cloud services automation
Dashboard for usage and analytics
Provisioning Power
Exchange
SharePoint
Lync
Custom Services
User Accounts
Desktops
LOB Apps
256 SSL 256 SSL 256 SSL
REDUCE OPERATING COSTS
SCALE EFFICIENTLY
EMPOWER CUSTOMERS
34. IT Outsourcing
Data Storage and Backup
Infrastructure as a Service
Disaster Recovery
Hosted Email
Office Productivity
SaaSWebWindows
What you get
Any-Device Windows Desktop
Latest Microsoft Office Version
Hosted Microsoft Exchange
Enterprise Infrastructure
Managed Backup
Multiple Datacenters
IT now focuses on innovation
35. Cost of Doing Nothing
⢠IT spending and complexity inhibits business growth
⢠The business is exposed to disruptions and disasters
⢠Workers remain tethered to the office
⢠Security breaches increase with more devices
⢠Your competition can gain an advantage
36. Executive's in the Field
âAs a remote executive, I struggled every time I needed to
access the companyâs intranet, which forced me to VPN into
the network. I also kept data on my local device because
trying to access it over my broadband connection was too
slow. Some coworkers did the same and lost data due to a
virus, thankfully I was luckier. â
âSince moving to a virtual desktop, Iâm able to use any device.
Iâm able to work from any location. And best of all, I donât
have to worry about copying my data and applications onto all
of my personal devices. I paid for these devices; I donât want
work to clutter up my personal space.â
Tenant isolation with encrypted drives, private vlanâs and shared computeU2Cloud provides end-to-end encryption through transport and Encrypted Drive to meet compliancy requirements.Transition â Let look at the virtualization lifecycle for desktops and applications