310 likes | 396 Views
Impact van BYOD en Mobiele devices op uw huidige desktop en client architectuur . Why mobility ? Why BYOD?. What is Mobility ?. A device that moves between D ifferent geographical locations Between different networks A person who moves between Different geographical locations
E N D
Impact van BYOD en Mobiele devices op uw huidige desktop en client architectuur
What is Mobility ? • A device that moves between • Different geographical locations • Between different networks • A person who moves between • Different geographical locations • Different networks • Different communication devices • Different applications
What is Mobility ? • But even within your company walls • A user moving to a meetingroom • A doctor visits his patients in a hospital
look from User view … Simple • I own a device • Just want myapplication Device Connection Application
look from Administration view - How to tackle • Does not stop withone user • Notalways “plug andplay” • Management / hosting • Security Device Connection Application Backend Infrastructure Security
Device - Challenges Device
Device - Challenges Today smartphone Tomorrow computer
“empower me” “show me” “alert me” snack dine create
Device - Management • Laptops - Workstations • Management softwares • Microsoft SCCM – SCOM • Symantec Endpointprotection • … • Smartphones – Tablets • Require New management types • Mobile device management
What is Mobile device Management ? • Secure email, calendar and contacts • Push VPN and WiFi Settings and Certificates • Device restrictions and policies • Remote full and selective wipe • Self provisioning iPad Enterprise Environment Android Messaging Applications iPhone MdM Directory webOS Certificate Services BlackBerry Files Database Windows Mobile VPN Symbian
Device - Advice • Determine the varying levels of service and support options for the segmented workforce • Reserve the right to manage all mobile devices with access to corporate resources like PCs. • Require users to back up their own personal data Device
Connection Connection
Connection - Advice • Mobility starts within your company walls • By default Everybody on guest network • Allow access to internet (limited) • Allow access to all external company services (webmail – citrix) • Proactively monitor • ongoing voice • data usage • Expenses – international Roaming bills • Determine a tiered reimbursement policy for voice and data services costs
Application Application
Application - Location • How tobringyourapplicationtoyour mobile device ? • Client • Different apps on different environments • Customdevelopment • Processing on the client • Central • Terminal server • Virtual desktops • Processing on backend • Application types can determine device
Application – Client Server • Notalwayspossible • Customdevelopmentcanberequired • Heterogeneous environments • Licensing model • User interface is different on Android, IOS, Windows • Availablebandwidth • Authenticationrequirements Connect Execute Application on your mobile device Access Data on central infrastructure
Application – Central • Publishedapplications / shared desktops • is an architecture where the application executes 100% on the server, and the application’s user interface is accessed via a mobile device. Keyboard / mouse video Connect Execute application on central infrastructure Access data View Application on your mobile device
Application – Central • Another way… VDI – Virtual Desktop Infrastructure Dedicated Virtual Desktop Shared Desktop TotalIsolation user user user user user user CPS/TS Apps Apps Apps Apps Win 7 Win 7 Win 7 Windows Server Hypervisor Hardware Hardware • Dedicated OS to user • User, OS and application are isolated • Client OS desktop (e.g. Windows 7) • Session isolated at “application” level • (shared OS) • Server OS desktop (e.g. Win2k8)
Application – Central • Publishedapplications / shared desktops • Strong on security • Wide device support (printer, PDA, …) • Verygood TCO • Global accessibility. • Real Desktop Operating System • Better application compatibility • (no modifications necessary) • No registry or DLL restrictions • Existing desktops can be imported • Full Isolation: each Virtual Desktop runs separately • Virtual Desktop Infrastructure
Application – Central • Publishedapplications / shared desktops / VDI • Limit user control or personalization • Locked down - one user impacts hundreds • No linux support • Challenges • Check applicationcompatibility – shared / VDI • Some apps might have problems (i.e. multimedia, web apps) • Printing and printer driver management • client device connectivity (i.e. USB, COM ports) • User overhead like IE, AntiVirus, Windows User Profiles, …
Applications - Advice • Determine how users will be provisioned with enterprise-class applications • Customdevelopment or Standard applications • Centralizeapplicationsand data • Choose shared desktops first • For Users thatdon’t fit this environment Choosevirtualized desktops (VDI)
Backend Backend Infrastructure
Backend • Private cloud • Public cloud • Bpos • Office 365 • … • Considerations : data location • Bridgesbetweenclouds • VmwareVcloud • Citrix bridge software • …
Hybrid Cloud Hybrid Cloud • On/off premise • Low utility cost • Self-service • Fully elastic • Trusted security • Corporate control • Off premise • Low utility cost • Self-service • Fully elastic • On premise • High fixed cost • Full control • Known security Public Cloud Public Cloud Traditional Datacenter Traditional Datacenter
Backend - Advice • Determine Cloud main Entry point andbackup entry • Check your Data location • Authenticationbetween datacenters • KnowwhatyourSLA’s are covering
Security Security
Security - Advice • Consider disabling features and user activities in heavily regulated environments • Extend acceptable use policies to all current and future mobile devices. • Protect the integrity and privacy of corporate data by isolating it from personal data. • Enforce strong security policies that prevent data security breaches
Prepareyour environment for the future The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn, and relearn. (AlvinToffler)