SlideShare una empresa de Scribd logo
1 de 46
800.800.4239 | CDW.com/PeopleWhoGetIT
VDI FOR BUSINESS
Derrek Kim - Technical Specialist
BEYOND THE HYPE
22CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
How do I
manage costs?
How do I take
advantage
of virtualization?
Should we go with
Rich Clients or
Thin Clients?
How do I keep
my mobile
users productive?
Should I embrace
cloud services?
How do I keep my
data safe and
applications secure?
VIRTUAL DESKTOP INFRASTRUCTURE
33CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
THE NEED FOR A DESKTOP STRATEGY
44CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
APPLICATION CONSIDERATIONS
Provide access
from
anywhere
Know which
applications
you have
Manage
application
lifecycle
55CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Challenges
OPERATING SYSTEM AND
BROWSER CONSIDERATIONS
Access
from
anywhere
Image
management
Operating
System
migration
66CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
DATA & USER SETTINGS
CONSIDERATIONS
Data Protection
& Compliance
Anywhere
access
to data & user
settings
Ever-increasing volume of
data from multiple sources
77CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Challenges
HARDWARE CONSIDERATIONS
Handling the
growing mobility
of end users
Addressing
consumerization
Managing the
Hardware Lifecycle
88CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VIRTUAL DESKTOP INFRASTRUCTURE
• What is VDI
• Use cases
• Components
• Licensing considerations
• VDI Technology landscape
WHAT IS VDI?
Understanding VDI Hype
1010CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
BASICS OF VDI
VDI defines a broad range of technologies which enable end
user desktop computing processes to be run on remote
computing resources or locally in a manner which provides
isolation from the primary end user OS.
1111CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
REASONS FOR VDI
• Standardization , Stable
• External Users – Non-Corporate resource
• React to changes quickly
• Maintain Intellectual Property
• Data Protection – Proximity/Backup
• Comply with Global Export rules (Regulatory Compliance)
• D/R Pandemic – What if 40% of workforce force to work
from home
• Mandates for quick security patches
• Need for extremely Quick Application updates
• Support volatile Client device environment
1212CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
REASONS FOR VDI
• Applications need client OS (specific environment)
• Users need a customizable environment
• Policy against a shared computing model
• BYOC
• Local/Off line usage
• Device independence
1313CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
REASONS AGAINST VDI
• Cost
• Application Performance - Video
• Complexity
• Local device access
1414CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
• Open a branch office
• Start an offshore project
• On-board a new employee
• Move a dept from building
A to Z
• Add, delete & update apps
• Apply security patches
• Implement ‗BYOC‘
1515CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VIRTUALIZATION REALITY
• VDI can be beneficial for EVERY organization
However…
• VDI is NOT for every application
VDI USAGE?
Where does it really make sense
1717CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
HIGH IMPACT USER
Premium knowledge worker Sensitive / Secure Information
Examples: Healthcare, Military
1818CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
HIGH VOLUME TASK WORKER
Task oriented Important / Secure Information
Examples: Tax prep, Call Center,
Remote/At-Home worker
• Limited access to local storage
• Standardized Desktop and Apps
• Non-company (personal) computer
1919CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
NOT RECOMMENDED
Mobility/Flexibility/Performance
Anywhere access to Information
Examples: Knowledge worker,
Media Creation/Editing, Sales
2020CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
• What is VDI
• Where does it make sense to use it
CHECKPOINT
TECHNICAL COMPONENTS
What‘s needed to implement VDI
VDI EXPLAINED
2222CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
TECHNOLOGY IN USE
2323CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization
Platform
• Microsoft Hyper-V
• VMware vSphere
• Citrix XenServer
TECHNOLOGY IN USE
2424CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
• MS Windows VDA Licensing
• MS Windows VL w/SA
Windows VDA is required for
ALL VDI implementations
that use a non-SA device to
access a Windows VDI
desktop, regardless of the
VDI infrastructure vendor
TECHNOLOGY IN USE
2525CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
• Template VMs/Thin Provisioning
• Microsoft App-V
• Citrix XenApp
• Microsoft RDS
• Profile Tools
• Other…
TECHNOLOGY IN USE
2626CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI
Mgt
OS/App
Mgt
Windows OS
Virtualization Platform
• Citrix XenDesktop
• Citrix Provisioning Server
• Microsoft RD Broker
• Microsoft SCVMM
• VMware View
TECHNOLOGY IN USE
2727CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
TYPES OF VDI
• One to one relationship
• Highest costStatic
• One to Many relationship
• Pools must be maintainedPooled
• One to Many
• Elasticity
• System Managed Pools
Dynamic
2828CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
ESSENTIAL COMPONENTS
Factors that need to be accounted for when deploying a Virtualized
Desktop Infrastructure
• Folder Redirection
• Profiles Availability
• Application Installation
• App Virtualization
• Remote Application Access
• Image Management
• Image Deployment
• Session Management
• User Connectivity
Data &
User Settings
Applications
Operating
System
WINDOWS LICENSING
Licensing Windows in a VDI Environment
3030CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 1:Standard Users
MICROSOFT VDI LICENSING
My company has 100 PCs and 100 users that access Windows® client Operating
System (OS) (―Windows Client OS‖ implies one of the following operating systems:
Windows XP, Windows Vista®, Windows 7) running on virtual machines (VMs) using
VDI. However, only 50 VMs are running at any one time.
License: If the PCs are covered under Software Assurance (SA),
then no additional licensing is required, as Software Assurance
contains rights to Windows VDI desktops.
3131CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 2: Shift Workers
MICROSOFT VDI LICENSING
My company has 100 PCs with 300 workers accessing these PCs in shifts.
At any time, 150 Windows client OS VMs are being accessed using VDI.
License: If the PCs are covered under Software Assurance, then
no additional licensing is required, as Software Assurance contains
rights to Windows VDI desktops.
3232CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 3: Mixed Desktop Hardware
MICROSOFT VDI LICENSING
My company has 100 PCs under SA and 100 thin clients (running a minimal OS such
as Windows FLP or Windows Embedded for purposes of accessing a VDI). We have 100
Windows client VMs.
License: For the 100 PCs covered under SA, no additional
licensing is required. Each of the 100 thin clients would need
a Windows Virtual Desktop Access (VDA) license, and hence
a total of 100 Windows VDA licenses are required.
3333CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 4: Standard Users – Home Use
MICROSOFT VDI LICENSING
My company has 100 employees who are the primary users of 100 thin clients covered
under Windows VDA. These employees occasionally work from home and access the
corporate VMs via VDI.
License: Windows VDA licenses extend roaming rights for the
primary (―named‖) user of a company-owned device covered
under Windows VDA, and hence no additional licenses for home
PCs are required in this scenario.
3434CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 5: 100% Home Users
MICROSOFT VDI LICENSING
My company has 100 workers who work from home and access Windows
client VMs via VDI from their home PCs.
License: The employee-owned PCs will have to be licensed
with Windows VDA, and hence 100 Windows VDA licenses are
required.
3535CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 6: Roaming Users
MICROSOFT VDI LICENSING
I have 300 thin clients throughout my company and only 100 users who
roam from station to station.
License: Windows VDA is a device–based license so 300
thin clients must be licensed with Windows VDA. If the
devices are PCs covered with SA, then no additional
licensing is required.
3636CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
Scenario 7: Contractor-Owned PCs
MICROSOFT VDI LICENSING
My company has 100 contractors who are working for six months, and we
will engage 100 different contractors the other six months of the year.
License: Assuming each contractor accesses the environment
with one unique device, 100 Windows VDA licenses are required
for the contractors to access the VDI environment. You can
transfer the Windows VDA licenses to the second set of
contractors after a period of 90 days of first assignment.
3737CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
• Microsoft Windows Software Assurance provides the ability for
the covered device and its primary user to access the VDI
environment
• Without Software Assurance, a VDA license is necessary to
access the VDI environment
• Microsoft Windows VDI licensing is DEVICE based – it is not
based on concurrent usage
• Licensing can be transferred once every 90 days
• Roaming usage for the license ―Primary User‖ of the device is
permitted
LICENSING SUMMARY
VDI LANDSCAPE
Who are the players
3939CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VDI PROVIDERS
Major Players Niche Players
4040CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATION
• 59% reported that their client virtualization goals are equally
or more important than their server virtualization goals
• Respondents who have implemented client virtualization and
track ROI report that they are saving slightly more than 20%
of their total IT budget
• 91 percent of those considering or implementing client
virtualization (82% of all respondents) plan to implement
within the next 12-24 months
CDW surveyed 200 IT managers at medium and large businesses to understand
what is driving client virtualization, how it is being used in data centers, and to
identify the key roadblocks to success.
CDW STUDY JANUARY 2011
4141CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATON
• 37% have completed an up-front inventory
analysis of client devices in preparation for
implementation and 44% plan to complete an
analysis in the near future
CDW STUDY JANUARY 2011
4242CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATION
97% noted experiencing challenges with implementation
―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis,
education and testing to enable businesses to take full advantage of client virtualization”
CDW STUDY JANUARY 2011
4343CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
VIRTUALIZATION REALITY
• Virtualization is revolutionary
» An Important Paradigm shift
» Largest change to address IT industry since change from Main-
Frame to Distributed Computing (1990s)
• It is not a panacea
» Virtualization is not magic – but can solve complex problems
» Still requires effort, planning, and management
» Many false claims in the industry about virtualization benefits
• Planning & Management are Critical
» Virtualization needs careful planning and control to succeed
» Not everything can be virtualized
- Physical still needs to be managed
- Virtual also needs to be managed
- Management strategies have to account for hybrid environments
4444CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
CLIENT VIRTUALIZATION
97% noted experiencing challenges with implementation
―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis,
education and testing to enable businesses to take full advantage of client virtualization”
Recommendations:
• Identify Goals
• Do Your Research
• Prep, Test & Prepare
• Measure the Savings
• Find Out More
Full report available at
http://newsroom.cdw.com/features/feature-01-04-11.html
CDW STUDY JANUARY 2011
4545CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
ADDITIONAL RESOURCES
• For more information about Microsoft VDA, please visit:
http://www.microsoft.com/vdi
• For more information about Microsoft Virtualization, please
visit: http://www.microsoft.com/virtualization
• For more information about Microsoft System Center, please
visit: http://www.microsoft.com/systemcenter
• For more information about Windows Server 2008 R2,
please visit: http://www.microsoft.com/windowsserver2008
• For more information about Remote Desktop Services,
please visit: http://www.microsoft.com/rds
4646CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY.
QUESTIONS
Derrek Kim
Solution Architect – MS Virtualization
derrek.kim@cdw.com
(616) 813-7137
(847) 371-2835

Más contenido relacionado

La actualidad más candente

Introduction to Azure Cloud Storage
Introduction to Azure Cloud StorageIntroduction to Azure Cloud Storage
Introduction to Azure Cloud StorageGanga R Jaiswal
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENDaron Walker
 
Cloud Cloud Cloud
Cloud Cloud CloudCloud Cloud Cloud
Cloud Cloud Cloudkdalma
 
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxVeeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxPrince Joseph
 
Vmware view overview
Vmware view overviewVmware view overview
Vmware view overviewManny Singh
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingAlessandro Iudica
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptxmasbulosoke
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computingTISEE
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDIShivani Sehta
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon ViewSumeraHangi
 
Migrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with ConfidenceMigrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with ConfidenceDavid J Rosenthal
 
Windows virtual desktop l100 presentation
Windows virtual desktop l100 presentationWindows virtual desktop l100 presentation
Windows virtual desktop l100 presentationkiefter
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technologysanjoysanyal
 

La actualidad más candente (20)

What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Types Of VDI Solutions
Types Of VDI SolutionsTypes Of VDI Solutions
Types Of VDI Solutions
 
Introduction to Azure Cloud Storage
Introduction to Azure Cloud StorageIntroduction to Azure Cloud Storage
Introduction to Azure Cloud Storage
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
VMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation ENVMware Horizon Customer Presentation EN
VMware Horizon Customer Presentation EN
 
VMware Horizon - news
VMware Horizon - newsVMware Horizon - news
VMware Horizon - news
 
Cloud Cloud Cloud
Cloud Cloud CloudCloud Cloud Cloud
Cloud Cloud Cloud
 
Veeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptxVeeam Solutions for SMB_2022.pptx
Veeam Solutions for SMB_2022.pptx
 
Azure rev002
Azure rev002Azure rev002
Azure rev002
 
Vmware view overview
Vmware view overviewVmware view overview
Vmware view overview
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
 
Application Migrations at Scale
Application Migrations at ScaleApplication Migrations at Scale
Application Migrations at Scale
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Top challenges in cloud computing
Top challenges in cloud computingTop challenges in cloud computing
Top challenges in cloud computing
 
12 Things You Must Know About VDI
12 Things You Must Know About VDI12 Things You Must Know About VDI
12 Things You Must Know About VDI
 
VDI/ VMware Horizon View
VDI/ VMware Horizon ViewVDI/ VMware Horizon View
VDI/ VMware Horizon View
 
Migrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with ConfidenceMigrate to Microsoft Azure with Confidence
Migrate to Microsoft Azure with Confidence
 
Windows virtual desktop l100 presentation
Windows virtual desktop l100 presentationWindows virtual desktop l100 presentation
Windows virtual desktop l100 presentation
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
 

Similar a VDI for Business - Beyond the Hype

Windows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized DesktopWindows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized DesktopLouis Göhl
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsAruj Thirawat
 
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPSBUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPSvDesk.Works
 
Desktop virtualization scott calvet
Desktop virtualization   scott calvetDesktop virtualization   scott calvet
Desktop virtualization scott calvetNathan Winters
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainALAMGIR HOSSAIN
 
10 zig
10 zig10 zig
10 zigdvmug1
 
Hybrid cloud availability strategy with Veeam & Microsoft Azure
Hybrid cloud availability strategy with Veeam & Microsoft AzureHybrid cloud availability strategy with Veeam & Microsoft Azure
Hybrid cloud availability strategy with Veeam & Microsoft AzureIngram Micro
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRNetgear Italia
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm Technologies
 
VMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid CloudVMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid CloudVMworld
 
A Citrix Masterclass
A Citrix MasterclassA Citrix Masterclass
A Citrix Masterclassbluechipper
 
Desktop virtualisation
Desktop virtualisationDesktop virtualisation
Desktop virtualisationBlueChipICT
 
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data CenterHBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Centerdavehill99
 
Cloud VDI And Its Benefits
Cloud VDI And Its BenefitsCloud VDI And Its Benefits
Cloud VDI And Its BenefitsYuvraj Jain
 
VMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
VMworld 2014: How I Learned to Stop Worrying and Love the Public CloudVMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
VMworld 2014: How I Learned to Stop Worrying and Love the Public CloudVMworld
 

Similar a VDI for Business - Beyond the Hype (20)

VDA brochure
VDA brochureVDA brochure
VDA brochure
 
Windows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized DesktopWindows Virtual Enterprise Centralized Desktop
Windows Virtual Enterprise Centralized Desktop
 
Throughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI SolutionsThroughwave Day 2015 - VDI Solutions
Throughwave Day 2015 - VDI Solutions
 
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPSBUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
BUSINESS TRANSITION GUIDE TO CLOUD DESKTOPS
 
SMARTSTATION
SMARTSTATION SMARTSTATION
SMARTSTATION
 
Desktop virtualization scott calvet
Desktop virtualization   scott calvetDesktop virtualization   scott calvet
Desktop virtualization scott calvet
 
VMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossainVMware overview presentation by alamgir hossain
VMware overview presentation by alamgir hossain
 
vDesk Overview
vDesk OverviewvDesk Overview
vDesk Overview
 
10 zig
10 zig10 zig
10 zig
 
Hybrid cloud availability strategy with Veeam & Microsoft Azure
Hybrid cloud availability strategy with Veeam & Microsoft AzureHybrid cloud availability strategy with Veeam & Microsoft Azure
Hybrid cloud availability strategy with Veeam & Microsoft Azure
 
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDRWebinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
Webinar NETGEAR - Acronis e Netgear per le Aziende - Acronis backup 12 e ReadyDR
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
VMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid CloudVMworld 2014: How to Build a Hybrid Cloud
VMworld 2014: How to Build a Hybrid Cloud
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
Vdi
VdiVdi
Vdi
 
A Citrix Masterclass
A Citrix MasterclassA Citrix Masterclass
A Citrix Masterclass
 
Desktop virtualisation
Desktop virtualisationDesktop virtualisation
Desktop virtualisation
 
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data CenterHBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
HBC9363 Virtualization 2.0 How the Cloud is Evolving the Modern Data Center
 
Cloud VDI And Its Benefits
Cloud VDI And Its BenefitsCloud VDI And Its Benefits
Cloud VDI And Its Benefits
 
VMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
VMworld 2014: How I Learned to Stop Worrying and Love the Public CloudVMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
VMworld 2014: How I Learned to Stop Worrying and Love the Public Cloud
 

Más de JAX Chamber IT Council

Year up JAX IT Council - February 2016
Year up   JAX IT Council - February 2016Year up   JAX IT Council - February 2016
Year up JAX IT Council - February 2016JAX Chamber IT Council
 
The Internet of Things Drives Business Transformation
The Internet of Things Drives Business TransformationThe Internet of Things Drives Business Transformation
The Internet of Things Drives Business TransformationJAX Chamber IT Council
 
CA Technologies Survive and Thrive in the Application Economy- August 2014
CA Technologies   Survive and Thrive in the Application Economy- August 2014CA Technologies   Survive and Thrive in the Application Economy- August 2014
CA Technologies Survive and Thrive in the Application Economy- August 2014JAX Chamber IT Council
 
Tom Morgan - July 29, 2014 - From Chaos to Collaborative Communities
Tom Morgan - July 29, 2014 -  From Chaos to Collaborative CommunitiesTom Morgan - July 29, 2014 -  From Chaos to Collaborative Communities
Tom Morgan - July 29, 2014 - From Chaos to Collaborative CommunitiesJAX Chamber IT Council
 
Agile Implementations - Tim FitzGerald - US Assure
Agile Implementations - Tim FitzGerald - US AssureAgile Implementations - Tim FitzGerald - US Assure
Agile Implementations - Tim FitzGerald - US AssureJAX Chamber IT Council
 
The Industry-University Interface: An Academic Administrator’s View
The Industry-University Interface:An Academic Administrator’s ViewThe Industry-University Interface:An Academic Administrator’s View
The Industry-University Interface: An Academic Administrator’s ViewJAX Chamber IT Council
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverJAX Chamber IT Council
 
If companies are not careful, "Big Data" will become "Big Dilbert"
If companies are not careful, "Big Data" will become "Big Dilbert"If companies are not careful, "Big Data" will become "Big Dilbert"
If companies are not careful, "Big Data" will become "Big Dilbert"JAX Chamber IT Council
 

Más de JAX Chamber IT Council (12)

Year up JAX IT Council - February 2016
Year up   JAX IT Council - February 2016Year up   JAX IT Council - February 2016
Year up JAX IT Council - February 2016
 
The Internet of Things Drives Business Transformation
The Internet of Things Drives Business TransformationThe Internet of Things Drives Business Transformation
The Internet of Things Drives Business Transformation
 
CA Technologies Survive and Thrive in the Application Economy- August 2014
CA Technologies   Survive and Thrive in the Application Economy- August 2014CA Technologies   Survive and Thrive in the Application Economy- August 2014
CA Technologies Survive and Thrive in the Application Economy- August 2014
 
Tom Morgan - July 29, 2014 - From Chaos to Collaborative Communities
Tom Morgan - July 29, 2014 -  From Chaos to Collaborative CommunitiesTom Morgan - July 29, 2014 -  From Chaos to Collaborative Communities
Tom Morgan - July 29, 2014 - From Chaos to Collaborative Communities
 
Agile Implementations - Tim FitzGerald - US Assure
Agile Implementations - Tim FitzGerald - US AssureAgile Implementations - Tim FitzGerald - US Assure
Agile Implementations - Tim FitzGerald - US Assure
 
City of Jacksonville Technology Story
City of Jacksonville Technology StoryCity of Jacksonville Technology Story
City of Jacksonville Technology Story
 
QA Center Of Excellence (TCoE)
QA Center Of Excellence (TCoE)QA Center Of Excellence (TCoE)
QA Center Of Excellence (TCoE)
 
The Cultural Challenge of Technology
The Cultural Challenge of TechnologyThe Cultural Challenge of Technology
The Cultural Challenge of Technology
 
The Industry-University Interface: An Academic Administrator’s View
The Industry-University Interface:An Academic Administrator’s ViewThe Industry-University Interface:An Academic Administrator’s View
The Industry-University Interface: An Academic Administrator’s View
 
Securing a Moving Target
Securing a Moving TargetSecuring a Moving Target
Securing a Moving Target
 
The State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take OverThe State of Internet Security: Web Attaks Take Over
The State of Internet Security: Web Attaks Take Over
 
If companies are not careful, "Big Data" will become "Big Dilbert"
If companies are not careful, "Big Data" will become "Big Dilbert"If companies are not careful, "Big Data" will become "Big Dilbert"
If companies are not careful, "Big Data" will become "Big Dilbert"
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Último (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

VDI for Business - Beyond the Hype

  • 1. 800.800.4239 | CDW.com/PeopleWhoGetIT VDI FOR BUSINESS Derrek Kim - Technical Specialist BEYOND THE HYPE
  • 2. 22CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. How do I manage costs? How do I take advantage of virtualization? Should we go with Rich Clients or Thin Clients? How do I keep my mobile users productive? Should I embrace cloud services? How do I keep my data safe and applications secure? VIRTUAL DESKTOP INFRASTRUCTURE
  • 3. 33CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. THE NEED FOR A DESKTOP STRATEGY
  • 4. 44CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. APPLICATION CONSIDERATIONS Provide access from anywhere Know which applications you have Manage application lifecycle
  • 5. 55CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Challenges OPERATING SYSTEM AND BROWSER CONSIDERATIONS Access from anywhere Image management Operating System migration
  • 6. 66CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. DATA & USER SETTINGS CONSIDERATIONS Data Protection & Compliance Anywhere access to data & user settings Ever-increasing volume of data from multiple sources
  • 7. 77CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Challenges HARDWARE CONSIDERATIONS Handling the growing mobility of end users Addressing consumerization Managing the Hardware Lifecycle
  • 8. 88CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VIRTUAL DESKTOP INFRASTRUCTURE • What is VDI • Use cases • Components • Licensing considerations • VDI Technology landscape
  • 10. 1010CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. BASICS OF VDI VDI defines a broad range of technologies which enable end user desktop computing processes to be run on remote computing resources or locally in a manner which provides isolation from the primary end user OS.
  • 11. 1111CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. REASONS FOR VDI • Standardization , Stable • External Users – Non-Corporate resource • React to changes quickly • Maintain Intellectual Property • Data Protection – Proximity/Backup • Comply with Global Export rules (Regulatory Compliance) • D/R Pandemic – What if 40% of workforce force to work from home • Mandates for quick security patches • Need for extremely Quick Application updates • Support volatile Client device environment
  • 12. 1212CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. REASONS FOR VDI • Applications need client OS (specific environment) • Users need a customizable environment • Policy against a shared computing model • BYOC • Local/Off line usage • Device independence
  • 13. 1313CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. REASONS AGAINST VDI • Cost • Application Performance - Video • Complexity • Local device access
  • 14. 1414CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. • Open a branch office • Start an offshore project • On-board a new employee • Move a dept from building A to Z • Add, delete & update apps • Apply security patches • Implement ‗BYOC‘
  • 15. 1515CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VIRTUALIZATION REALITY • VDI can be beneficial for EVERY organization However… • VDI is NOT for every application
  • 16. VDI USAGE? Where does it really make sense
  • 17. 1717CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. HIGH IMPACT USER Premium knowledge worker Sensitive / Secure Information Examples: Healthcare, Military
  • 18. 1818CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. HIGH VOLUME TASK WORKER Task oriented Important / Secure Information Examples: Tax prep, Call Center, Remote/At-Home worker • Limited access to local storage • Standardized Desktop and Apps • Non-company (personal) computer
  • 19. 1919CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. NOT RECOMMENDED Mobility/Flexibility/Performance Anywhere access to Information Examples: Knowledge worker, Media Creation/Editing, Sales
  • 20. 2020CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. • What is VDI • Where does it make sense to use it CHECKPOINT
  • 21. TECHNICAL COMPONENTS What‘s needed to implement VDI VDI EXPLAINED
  • 22. 2222CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform TECHNOLOGY IN USE
  • 23. 2323CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform • Microsoft Hyper-V • VMware vSphere • Citrix XenServer TECHNOLOGY IN USE
  • 24. 2424CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform • MS Windows VDA Licensing • MS Windows VL w/SA Windows VDA is required for ALL VDI implementations that use a non-SA device to access a Windows VDI desktop, regardless of the VDI infrastructure vendor TECHNOLOGY IN USE
  • 25. 2525CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform • Template VMs/Thin Provisioning • Microsoft App-V • Citrix XenApp • Microsoft RDS • Profile Tools • Other… TECHNOLOGY IN USE
  • 26. 2626CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI Mgt OS/App Mgt Windows OS Virtualization Platform • Citrix XenDesktop • Citrix Provisioning Server • Microsoft RD Broker • Microsoft SCVMM • VMware View TECHNOLOGY IN USE
  • 27. 2727CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. TYPES OF VDI • One to one relationship • Highest costStatic • One to Many relationship • Pools must be maintainedPooled • One to Many • Elasticity • System Managed Pools Dynamic
  • 28. 2828CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. ESSENTIAL COMPONENTS Factors that need to be accounted for when deploying a Virtualized Desktop Infrastructure • Folder Redirection • Profiles Availability • Application Installation • App Virtualization • Remote Application Access • Image Management • Image Deployment • Session Management • User Connectivity Data & User Settings Applications Operating System
  • 29. WINDOWS LICENSING Licensing Windows in a VDI Environment
  • 30. 3030CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 1:Standard Users MICROSOFT VDI LICENSING My company has 100 PCs and 100 users that access Windows® client Operating System (OS) (―Windows Client OS‖ implies one of the following operating systems: Windows XP, Windows Vista®, Windows 7) running on virtual machines (VMs) using VDI. However, only 50 VMs are running at any one time. License: If the PCs are covered under Software Assurance (SA), then no additional licensing is required, as Software Assurance contains rights to Windows VDI desktops.
  • 31. 3131CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 2: Shift Workers MICROSOFT VDI LICENSING My company has 100 PCs with 300 workers accessing these PCs in shifts. At any time, 150 Windows client OS VMs are being accessed using VDI. License: If the PCs are covered under Software Assurance, then no additional licensing is required, as Software Assurance contains rights to Windows VDI desktops.
  • 32. 3232CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 3: Mixed Desktop Hardware MICROSOFT VDI LICENSING My company has 100 PCs under SA and 100 thin clients (running a minimal OS such as Windows FLP or Windows Embedded for purposes of accessing a VDI). We have 100 Windows client VMs. License: For the 100 PCs covered under SA, no additional licensing is required. Each of the 100 thin clients would need a Windows Virtual Desktop Access (VDA) license, and hence a total of 100 Windows VDA licenses are required.
  • 33. 3333CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 4: Standard Users – Home Use MICROSOFT VDI LICENSING My company has 100 employees who are the primary users of 100 thin clients covered under Windows VDA. These employees occasionally work from home and access the corporate VMs via VDI. License: Windows VDA licenses extend roaming rights for the primary (―named‖) user of a company-owned device covered under Windows VDA, and hence no additional licenses for home PCs are required in this scenario.
  • 34. 3434CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 5: 100% Home Users MICROSOFT VDI LICENSING My company has 100 workers who work from home and access Windows client VMs via VDI from their home PCs. License: The employee-owned PCs will have to be licensed with Windows VDA, and hence 100 Windows VDA licenses are required.
  • 35. 3535CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 6: Roaming Users MICROSOFT VDI LICENSING I have 300 thin clients throughout my company and only 100 users who roam from station to station. License: Windows VDA is a device–based license so 300 thin clients must be licensed with Windows VDA. If the devices are PCs covered with SA, then no additional licensing is required.
  • 36. 3636CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. Scenario 7: Contractor-Owned PCs MICROSOFT VDI LICENSING My company has 100 contractors who are working for six months, and we will engage 100 different contractors the other six months of the year. License: Assuming each contractor accesses the environment with one unique device, 100 Windows VDA licenses are required for the contractors to access the VDI environment. You can transfer the Windows VDA licenses to the second set of contractors after a period of 90 days of first assignment.
  • 37. 3737CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. • Microsoft Windows Software Assurance provides the ability for the covered device and its primary user to access the VDI environment • Without Software Assurance, a VDA license is necessary to access the VDI environment • Microsoft Windows VDI licensing is DEVICE based – it is not based on concurrent usage • Licensing can be transferred once every 90 days • Roaming usage for the license ―Primary User‖ of the device is permitted LICENSING SUMMARY
  • 38. VDI LANDSCAPE Who are the players
  • 39. 3939CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VDI PROVIDERS Major Players Niche Players
  • 40. 4040CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. CLIENT VIRTUALIZATION • 59% reported that their client virtualization goals are equally or more important than their server virtualization goals • Respondents who have implemented client virtualization and track ROI report that they are saving slightly more than 20% of their total IT budget • 91 percent of those considering or implementing client virtualization (82% of all respondents) plan to implement within the next 12-24 months CDW surveyed 200 IT managers at medium and large businesses to understand what is driving client virtualization, how it is being used in data centers, and to identify the key roadblocks to success. CDW STUDY JANUARY 2011
  • 41. 4141CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. CLIENT VIRTUALIZATON • 37% have completed an up-front inventory analysis of client devices in preparation for implementation and 44% plan to complete an analysis in the near future CDW STUDY JANUARY 2011
  • 42. 4242CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. CLIENT VIRTUALIZATION 97% noted experiencing challenges with implementation ―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis, education and testing to enable businesses to take full advantage of client virtualization” CDW STUDY JANUARY 2011
  • 43. 4343CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. VIRTUALIZATION REALITY • Virtualization is revolutionary » An Important Paradigm shift » Largest change to address IT industry since change from Main- Frame to Distributed Computing (1990s) • It is not a panacea » Virtualization is not magic – but can solve complex problems » Still requires effort, planning, and management » Many false claims in the industry about virtualization benefits • Planning & Management are Critical » Virtualization needs careful planning and control to succeed » Not everything can be virtualized - Physical still needs to be managed - Virtual also needs to be managed - Management strategies have to account for hybrid environments
  • 44. 4444CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. CLIENT VIRTUALIZATION 97% noted experiencing challenges with implementation ―CDW Client Virtualization Straw Poll results point to a need for increased up-front analysis, education and testing to enable businesses to take full advantage of client virtualization” Recommendations: • Identify Goals • Do Your Research • Prep, Test & Prepare • Measure the Savings • Find Out More Full report available at http://newsroom.cdw.com/features/feature-01-04-11.html CDW STUDY JANUARY 2011
  • 45. 4545CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. ADDITIONAL RESOURCES • For more information about Microsoft VDA, please visit: http://www.microsoft.com/vdi • For more information about Microsoft Virtualization, please visit: http://www.microsoft.com/virtualization • For more information about Microsoft System Center, please visit: http://www.microsoft.com/systemcenter • For more information about Windows Server 2008 R2, please visit: http://www.microsoft.com/windowsserver2008 • For more information about Remote Desktop Services, please visit: http://www.microsoft.com/rds
  • 46. 4646CDW — PROPRIETARY AND CONFIDENTIAL. COPYING RESTRICTED. FOR INTERNAL USE ONLY. QUESTIONS Derrek Kim Solution Architect – MS Virtualization derrek.kim@cdw.com (616) 813-7137 (847) 371-2835