370 likes | 491 Views
the presentation is about to begin!. MTM virtual desktop alliance. a completely simple solution for desktop virtualization. alliance sponsors. gold sponsors. silver sponsors. v.s . virtualized & isolated end-point components. local or hosted. user. user profile. profile.
E N D
MTM virtual desktop alliance a completely simple solution for desktop virtualization
alliance sponsors gold sponsors silver sponsors
virtualized & isolated end-point components local or hosted user user profile profile on-demand assembly & delivery apps apps desktop os desktop os client
HDX MediaStream Seamless multimedia experience HDX RealTime Voice and video for real-time collaboration HDX Rich Graphics with RemoteFX High performance, full fidelity 2D and 3D graphics HDX Plug-n-Play Simple access to peripherals HDX Broadcast Optimized delivery over any network HDX SmartAccess Simple, highly available and secure user experience HDX Adaptive Orchestration Dynamically adjusts to conditions across the infrastructure and leverages available RemoteFX capabilities HDX WAN Optimization Performance acceleration for branch offices
Any user any device Any type of virtual desktop One centrally managed solution
VDI alone offers limited ROI and flexibility Citrix XenDesktop supports all virtual desktop flavors
Mobileusers Taskworkers USER TYPES Local VM-baseddesktops Local Streameddesktops Hosted shared desktops Hosted Blade PC desktops Hosted VM-based desktops (VDI) Physical Desktops On-demand apps Client-side compute Runs locally Online or offline Boots from network 5000 users/server Shared 500 users/server Personalized 1 user/workstation Personalized 150 users/server Easy setup. Any PC or Laptop. On-Demand Apps
Securing Your Citrix Deployment with Two-factor Authentication Presented by: Karen Kiffney Senior Manager, Product Marketing, RSA
Agenda • The Problem with Passwords • RSA Authentication Overview • RSA Authentication in Citrix Environments
Secure Access for Increased Mobility and Collaboration Lack of confidence in secure access Struggle with one-size-fits-all security Security impeding new business initiatives
What We’ve HeardSecure Access for Increased Mobility and Collaboration CHALLENGE “ “ “ Users bypass cumbersome security mechanisms -- putting corporate resources at risk “ Unclear who is remotely accessing our systems and what they are doing inside the network Security is impeding new business initiatives such as VDI and outsourcing Not prepared to address attacks against our organization ” ” ” ” Strong authentication for workforce, partners customers Flexibility to enforce policies and controls – by user, document, site or transaction Confidence that only legitimate users are accessing your information Ability to monitor all user activity on the network Range of authentication mechanisms for various applications and profiles Single sign-on capabilities for reduced costs and increased user satisfaction Global threat detection and takedown Corporate identities, credentials and systems recovery Enable collaboration between employees, partners and outsourcers without compromising security REQUIREMENT SOLUTION
RSA Authentication: Innovation Through Time Understand customers needs to balance Cost Convenience Security EnterpriseMore than 1,000 users Enterprise – Consumer Applications More than 10,000 users Small & Mid-Size Organizations Fewer than 2,500 users Hardware tokens Software tokens Risk-based Authentication SMS & text messaging Passwords
RSA Authentication: Choice Part-Time Employees Partners Road Warriors Administrators Infrequent Users Internal Employees Customers Contractors Frequent Users ? Broad range of solutions to meet the needsof an increasingly diverse user population Fob / Card Token Embedded Solutions PC / Web Browser Hybrid Smart Card Portable Devices Risk-Based On-Demand Hardware Tokens Software Tokens Tokenless
RSA Authentication: Three Platforms Enterprise- Consumer ApplicationsMore than 10,000 users Small and mid-size organizations Fewer than 2,500 users Enterprise with More than 1,000 users TargetMarket Protection of SSL VPNs and web applications Users: Employees, partners, clients Protection of any application, portal or network infrastructureUsers: Employees, partners, customers Protection of web applicationsUsers: typically customers or clients UseCase Convenient for end-users and IT staffLower TCO Enterprise class features and scalability, authenticator form factor options Scalable, convenient, cost-effective; Available on-prem or hosted Value Proposition RSA Authentication Manager Express RSA Authentication Manager RSA Adaptive Authentication Maximum Flexibility and Optimization
What is Two-Factor Authentication? Two-Factor Authentication: “The act of identifying an individual by using any combination of something they know, something they have or something they are.” “Something you know” = PIN, password, life question “Something you have” = Token, Smartcard, Trusted Device “Something you are” = Biometrics (fingerprint, retinal scan, etc)
RSA Authentication: Three Platforms Enterprise- Consumer ApplicationsMore than 10,000 users Small and mid-size organizations Fewer than 2,500 users Enterprise with More than 1,000 users TargetMarket Protection of SSL VPNs and web applications Users: Employees, partners, clients Protection of any application, portal or network infrastructureUsers: Employees, partners, customers Protection of web applicationsUsers: typically customers or clients UseCase Convenient for end-users and IT staffLower TCO Enterprise class features and scalability, authenticator form factor options Scalable, convenient, cost-effective; Available on-prem or hosted Value Proposition RSA Authentication Manager Express RSA Authentication Manager RSA Adaptive Authentication Maximum Flexibility and Optimization
RSA SecurID AuthenticatorsFlexibility and choice • Authenticator family includes hardware and software tokens, hybrid devices and on-demand SMS authentication • Provides customers with options to balance risk, cost and convenience needs • Designed for use by employees, partners and customers
RSA Authentication: Three Platforms Enterprise- Consumer ApplicationsMore than 10,000 users Small and mid-size organizations Fewer than 2,500 users Enterprise with More than 1,000 users TargetMarket Protection of SSL VPNs and web applications Users: Employees, partners, clients Protection of any application, portal or network infrastructureUsers: Employees, partners, customers Protection of web applicationsUsers: typically customers or clients UseCase Convenient for end-users and IT staffLower TCO Enterprise class features and scalability, authenticator form factor options Scalable, convenient, cost-effective; Available on-prem or hosted Value Proposition RSA Authentication Manager Express RSA Authentication Manager RSA Adaptive Authentication Maximum Flexibility and Optimization
RSA Authentication Manager Express Multi-factor authentication with zero footprint Risk-Based Authentication On-Demand Authentication Easy to ManageAppliance Platform
Risk-Based Authentication How it works Device Profile User Behavior Profile SSL VPN Authentication Policy Protected Resources PASS Activity Details Assurance Level Web Portals Web Browser RISKY RSA Risk Engine Identity Challenge OWA PASS ? FAIL SharePoint On-Demand Tokencode Challenge Questions Access Denied
Multi-factor Risk-based Authentication Factor #1:Something You KNOW Factor #2: Something You HAVE Factor #3: Something You DO Step Up:Something You KNOW or HAVE
MTM virtual desktop alliance solution • Complete end-to-end solution • 60% greater density • 1/3 cost of networking infrastructure • Secure Delivery • Bandwidth optimization • Cisco Validated Design included Data App App Desktop O/S Hypervisor Desktop Virtualization S/W Citrix Hypervisor VMware/Citrix/Microsoft Broker Storage Unified Fabric Unified Computing UnifiedNetwork Services Unified Storage Clients WAN
Why MTM? • largest Citrix reseller in N. America • Cisco UCS datacenter ATP certified • NetApp FastPath • deep investment and competency in virtual desktop • end to end solution • full professional and managed services options
Geographic Coverage • Cisco Gold Partner • Unified Communications Masters • Largest Citrix Solution Advisor in the US • Platinum Solution Advisor • Microsoft Gold Certified Partner • Unified Communications Competency • Server Infrastructure Competency • VMware Enterprise Solution Provider • NetApp Gold Partner • AppSense Gold Partner • CommVault Platinum Partner • OpenText Premier Partner Austin Dallas Philadelphia Stamford Arlington Heights Cincinnati Milwaukee St. Louis Boston Dover Wilmington Los Angeles San Francisco Houston Columbus Seattle Rocky Hill New York
Professional Service Offerings • Assessment • Design Services • POC/Pilot Implementation Services • Production Rollout Services • Instructor Led and Virtual Training
Managed Service Offerings • Remote Support and Remediation • Managed Services – Infrastructure • Covers: • XenServer, Hyper-V or VMware • XenDesktop, Provisioning Server, XenApp, etc. • Ongoing • 6 month handover support • Managed Services – Full Solution • Adds support for desktop image management • User Tier-1 helpdesk
why desktop virtualization why a validated design why MTM technologies
demos available • complete solution demo lab under construction • on site demo using iPad and laptops • in demo studio in select markets with Cisco UC components • schedule your demo today!