1 / 37

the presentation is about to begin!

the presentation is about to begin!. MTM virtual desktop alliance. a completely simple solution for desktop virtualization. alliance sponsors. gold sponsors. silver sponsors. v.s . virtualized & isolated end-point components. local or hosted. user. user profile. profile.

gram
Download Presentation

the presentation is about to begin!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. the presentation is about to begin!

  2. MTM virtual desktop alliance a completely simple solution for desktop virtualization

  3. alliance sponsors gold sponsors silver sponsors

  4. v.s.

  5. virtualized & isolated end-point components local or hosted user user profile profile on-demand assembly & delivery apps apps desktop os desktop os client

  6. HDX MediaStream Seamless multimedia experience HDX RealTime Voice and video for real-time collaboration HDX Rich Graphics with RemoteFX High performance, full fidelity 2D and 3D graphics HDX Plug-n-Play Simple access to peripherals HDX Broadcast Optimized delivery over any network HDX SmartAccess Simple, highly available and secure user experience HDX Adaptive Orchestration Dynamically adjusts to conditions across the infrastructure and leverages available RemoteFX capabilities HDX WAN Optimization Performance acceleration for branch offices

  7. Any user any device Any type of virtual desktop One centrally managed solution

  8. VDI alone offers limited ROI and flexibility Citrix XenDesktop supports all virtual desktop flavors

  9. Mobileusers Taskworkers USER TYPES Local VM-baseddesktops Local Streameddesktops Hosted shared desktops Hosted Blade PC desktops Hosted VM-based desktops (VDI) Physical Desktops On-demand apps Client-side compute Runs locally Online or offline Boots from network 5000 users/server Shared 500 users/server Personalized 1 user/workstation Personalized 150 users/server Easy setup. Any PC or Laptop. On-Demand Apps

  10. Securing Your Citrix Deployment with Two-factor Authentication Presented by: Karen Kiffney Senior Manager, Product Marketing, RSA

  11. Agenda • The Problem with Passwords • RSA Authentication Overview • RSA Authentication in Citrix Environments

  12. Secure Access for Increased Mobility and Collaboration Lack of confidence in secure access Struggle with one-size-fits-all security Security impeding new business initiatives

  13. What We’ve HeardSecure Access for Increased Mobility and Collaboration CHALLENGE “ “ “ Users bypass cumbersome security mechanisms -- putting corporate resources at risk “ Unclear who is remotely accessing our systems and what they are doing inside the network Security is impeding new business initiatives such as VDI and outsourcing Not prepared to address attacks against our organization ” ” ” ” Strong authentication for workforce, partners customers Flexibility to enforce policies and controls – by user, document, site or transaction Confidence that only legitimate users are accessing your information Ability to monitor all user activity on the network Range of authentication mechanisms for various applications and profiles Single sign-on capabilities for reduced costs and increased user satisfaction Global threat detection and takedown Corporate identities, credentials and systems recovery Enable collaboration between employees, partners and outsourcers without compromising security REQUIREMENT SOLUTION

  14. RSA Authentication Solutions

  15. RSA Authentication: Innovation Through Time Understand customers needs to balance Cost Convenience Security EnterpriseMore than 1,000 users Enterprise – Consumer Applications More than 10,000 users Small & Mid-Size Organizations Fewer than 2,500 users Hardware tokens Software tokens Risk-based Authentication SMS & text messaging Passwords

  16. RSA Authentication: Choice Part-Time Employees Partners Road Warriors Administrators Infrequent Users Internal Employees Customers Contractors Frequent Users ? Broad range of solutions to meet the needsof an increasingly diverse user population Fob / Card Token Embedded Solutions PC / Web Browser Hybrid Smart Card Portable Devices Risk-Based On-Demand Hardware Tokens Software Tokens Tokenless

  17. RSA Authentication: Three Platforms Enterprise- Consumer ApplicationsMore than 10,000 users Small and mid-size organizations Fewer than 2,500 users Enterprise with More than 1,000 users TargetMarket Protection of SSL VPNs and web applications Users: Employees, partners, clients Protection of any application, portal or network infrastructureUsers: Employees, partners, customers Protection of web applicationsUsers: typically customers or clients UseCase Convenient for end-users and IT staffLower TCO Enterprise class features and scalability, authenticator form factor options Scalable, convenient, cost-effective; Available on-prem or hosted Value Proposition RSA Authentication Manager Express RSA Authentication Manager RSA Adaptive Authentication Maximum Flexibility and Optimization

  18. A Closer Look at Multi-factor Authentication

  19. What is Two-Factor Authentication? Two-Factor Authentication: “The act of identifying an individual by using any combination of something they know, something they have or something they are.” “Something you know” = PIN, password, life question “Something you have” = Token, Smartcard, Trusted Device “Something you are” = Biometrics (fingerprint, retinal scan, etc)

  20. RSA Authentication: Three Platforms Enterprise- Consumer ApplicationsMore than 10,000 users Small and mid-size organizations Fewer than 2,500 users Enterprise with More than 1,000 users TargetMarket Protection of SSL VPNs and web applications Users: Employees, partners, clients Protection of any application, portal or network infrastructureUsers: Employees, partners, customers Protection of web applicationsUsers: typically customers or clients UseCase Convenient for end-users and IT staffLower TCO Enterprise class features and scalability, authenticator form factor options Scalable, convenient, cost-effective; Available on-prem or hosted Value Proposition RSA Authentication Manager Express RSA Authentication Manager RSA Adaptive Authentication Maximum Flexibility and Optimization

  21. How does RSA SecurID work?

  22. RSA SecurID AuthenticatorsFlexibility and choice • Authenticator family includes hardware and software tokens, hybrid devices and on-demand SMS authentication • Provides customers with options to balance risk, cost and convenience needs • Designed for use by employees, partners and customers

  23. RSA Authentication: Three Platforms Enterprise- Consumer ApplicationsMore than 10,000 users Small and mid-size organizations Fewer than 2,500 users Enterprise with More than 1,000 users TargetMarket Protection of SSL VPNs and web applications Users: Employees, partners, clients Protection of any application, portal or network infrastructureUsers: Employees, partners, customers Protection of web applicationsUsers: typically customers or clients UseCase Convenient for end-users and IT staffLower TCO Enterprise class features and scalability, authenticator form factor options Scalable, convenient, cost-effective; Available on-prem or hosted Value Proposition RSA Authentication Manager Express RSA Authentication Manager RSA Adaptive Authentication Maximum Flexibility and Optimization

  24. RSA Authentication Manager Express Multi-factor authentication with zero footprint Risk-Based Authentication On-Demand Authentication Easy to ManageAppliance Platform

  25. Risk-Based Authentication How it works Device Profile User Behavior Profile SSL VPN Authentication Policy Protected Resources PASS Activity Details Assurance Level Web Portals Web Browser RISKY RSA Risk Engine Identity Challenge OWA PASS ? FAIL SharePoint On-Demand Tokencode Challenge Questions Access Denied

  26. Multi-factor Risk-based Authentication Factor #1:Something You KNOW Factor #2: Something You HAVE Factor #3: Something You DO Step Up:Something You KNOW or HAVE

  27. RSA Authentication Securing Citrix Environments

  28. MTM virtual desktop alliance solution • Complete end-to-end solution • 60% greater density • 1/3 cost of networking infrastructure • Secure Delivery • Bandwidth optimization • Cisco Validated Design included Data App App Desktop O/S Hypervisor Desktop Virtualization S/W Citrix Hypervisor VMware/Citrix/Microsoft Broker Storage Unified Fabric Unified Computing UnifiedNetwork Services Unified Storage Clients WAN

  29. Why MTM? • largest Citrix reseller in N. America • Cisco UCS datacenter ATP certified • NetApp FastPath • deep investment and competency in virtual desktop • end to end solution • full professional and managed services options

  30. Geographic Coverage • Cisco Gold Partner • Unified Communications Masters • Largest Citrix Solution Advisor in the US • Platinum Solution Advisor • Microsoft Gold Certified Partner • Unified Communications Competency • Server Infrastructure Competency • VMware Enterprise Solution Provider • NetApp Gold Partner • AppSense Gold Partner • CommVault Platinum Partner • OpenText Premier Partner Austin Dallas Philadelphia Stamford Arlington Heights Cincinnati Milwaukee St. Louis Boston Dover Wilmington Los Angeles San Francisco Houston Columbus Seattle Rocky Hill New York

  31. Core Practices

  32. Professional Service Offerings • Assessment • Design Services • POC/Pilot Implementation Services • Production Rollout Services • Instructor Led and Virtual Training

  33. Managed Service Offerings • Remote Support and Remediation • Managed Services – Infrastructure • Covers: • XenServer, Hyper-V or VMware • XenDesktop, Provisioning Server, XenApp, etc. • Ongoing • 6 month handover support • Managed Services – Full Solution • Adds support for desktop image management • User Tier-1 helpdesk

  34. why desktop virtualization why a validated design why MTM technologies

  35. get more informationwww.virtualdesktopalliance.com

  36. demos available • complete solution demo lab under construction • on site demo using iPad and laptops • in demo studio in select markets with Cisco UC components • schedule your demo today!

  37. Thank You!

More Related