1 / 31

Impact van BYOD en Mobiele devices op uw huidige desktop en client architectuur

Impact van BYOD en Mobiele devices op uw huidige desktop en client architectuur . Why mobility ? Why BYOD?. What is Mobility ?. A device that moves between D ifferent geographical locations Between different networks A person who moves between Different geographical locations

harsha
Download Presentation

Impact van BYOD en Mobiele devices op uw huidige desktop en client architectuur

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Impact van BYOD en Mobiele devices op uw huidige desktop en client architectuur

  2. Why mobility ? Why BYOD?

  3. What is Mobility ? • A device that moves between • Different geographical locations • Between different networks • A person who moves between • Different geographical locations • Different networks • Different communication devices • Different applications

  4. What is Mobility ? • But even within your company walls • A user moving to a meetingroom • A doctor visits his patients in a hospital

  5. look from User view … Simple • I own a device • Just want myapplication Device Connection Application

  6. look from Administration view - How to tackle • Does not stop withone user • Notalways “plug andplay” • Management / hosting • Security Device Connection Application Backend Infrastructure Security

  7. Device - Challenges Device

  8. Device - Challenges Today smartphone Tomorrow computer

  9. “empower me” “show me” “alert me” snack dine create

  10. Device - Management • Laptops - Workstations • Management softwares • Microsoft SCCM – SCOM • Symantec Endpointprotection • … • Smartphones – Tablets • Require New management types • Mobile device management

  11. What is Mobile device Management ? • Secure email, calendar and contacts • Push VPN and WiFi Settings and Certificates • Device restrictions and policies • Remote full and selective wipe • Self provisioning iPad Enterprise Environment Android Messaging Applications iPhone MdM Directory webOS Certificate Services BlackBerry Files Database Windows Mobile VPN Symbian

  12. Device - Advice • Determine the varying levels of service and support options for the segmented workforce • Reserve the right to manage all mobile devices with access to corporate resources like PCs. • Require users to back up their own personal data Device

  13. Connection Connection

  14. Connection - Advice • Mobility starts within your company walls • By default Everybody on guest network • Allow access to internet (limited) • Allow access to all external company services (webmail – citrix) • Proactively monitor • ongoing voice • data usage • Expenses – international Roaming bills • Determine a tiered reimbursement policy for voice and data services costs

  15. Application Application

  16. Application - Location • How tobringyourapplicationtoyour mobile device ? • Client • Different apps on different environments • Customdevelopment • Processing on the client • Central • Terminal server • Virtual desktops • Processing on backend • Application types can determine device

  17. Application – Client Server • Notalwayspossible • Customdevelopmentcanberequired • Heterogeneous environments • Licensing model • User interface is different on Android, IOS, Windows • Availablebandwidth • Authenticationrequirements Connect Execute Application on your mobile device Access Data on central infrastructure

  18. Application – Central • Publishedapplications / shared desktops • is an architecture where the application executes 100% on the server, and the application’s user interface is accessed via a mobile device. Keyboard / mouse video Connect Execute application on central infrastructure Access data View Application on your mobile device

  19. Application – Central • Another way… VDI – Virtual Desktop Infrastructure Dedicated Virtual Desktop Shared Desktop TotalIsolation user user user user user user CPS/TS Apps Apps Apps Apps Win 7 Win 7 Win 7 Windows Server Hypervisor Hardware Hardware • Dedicated OS to user • User, OS and application are isolated • Client OS desktop (e.g. Windows 7) • Session isolated at “application” level • (shared OS) • Server OS desktop (e.g. Win2k8)

  20. Application – Central • Publishedapplications / shared desktops • Strong on security • Wide device support (printer, PDA, …) • Verygood TCO • Global accessibility. • Real Desktop Operating System • Better application compatibility • (no modifications necessary) • No registry or DLL restrictions • Existing desktops can be imported • Full Isolation: each Virtual Desktop runs separately • Virtual Desktop Infrastructure

  21. Application – Central • Publishedapplications / shared desktops / VDI • Limit user control or personalization • Locked down - one user impacts hundreds • No linux support • Challenges • Check applicationcompatibility – shared / VDI • Some apps might have problems (i.e. multimedia, web apps) • Printing and printer driver management • client device connectivity (i.e. USB, COM ports) • User overhead like IE, AntiVirus, Windows User Profiles, …

  22. Applications - Advice • Determine how users will be provisioned with enterprise-class applications • Customdevelopment or Standard applications • Centralizeapplicationsand data • Choose shared desktops first • For Users thatdon’t fit this environment Choosevirtualized desktops (VDI)

  23. Backend Backend Infrastructure

  24. Backend • Private cloud • Public cloud • Bpos • Office 365 • … • Considerations : data location • Bridgesbetweenclouds • VmwareVcloud • Citrix bridge software • …

  25. Hybrid Cloud Hybrid Cloud • On/off premise • Low utility cost • Self-service • Fully elastic • Trusted security • Corporate control • Off premise • Low utility cost • Self-service • Fully elastic • On premise • High fixed cost • Full control • Known security Public Cloud Public Cloud Traditional Datacenter Traditional Datacenter

  26. Backend - Advice • Determine Cloud main Entry point andbackup entry • Check your Data location • Authenticationbetween datacenters • KnowwhatyourSLA’s are covering

  27. Security Security

  28. Security - Advice • Consider disabling features and user activities in heavily regulated environments • Extend acceptable use policies to all current and future mobile devices. • Protect the integrity and privacy of corporate data by isolating it from personal data. • Enforce strong security policies that prevent data security breaches

  29. Prepareyour environment for the future The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn, and relearn. (AlvinToffler)

  30. Thank You

More Related