SlideShare una empresa de Scribd logo
1 de 50
Descargar para leer sin conexión
Awingu for EuroSys GDPR event
March 2nd, 2018 , Belgium
Source: Survey of Income and Program Participation, sample with evolution remote workers in the US, 2010
“Mobile working has grown 50% over last 2 decades”
Today, work is mobile.
We want to work on any device, incl. private devices
And increasingly we’ll use tablets & phones
* Gartner, Oct 2016
“61% of EUC organizations identified modernizing
legacy applications as the biggest hurdle they face in
changing their endpoint strategies.” (Gartner, Nov 2016)
Gartner, Can Workspace Aggregation Meet the Challenges of Unified Workspaces?, 2016, Andrew Garver
Business and end-user push towards mobile working
and “any device” is a challenge for IT
VPN and classic VDI (e.g. RDS, Citrix) are still the most adopted tools for remote working
§ Limited ‘any device’ usage – requires agents to be installed
§ High impact on support organization
§ Local data on device – thus risk of data leakage
§ Limited usage insights
§ …
Local data on the end-point remains a challenge…
Every 53 seconds a laptop is stolen
Local data on the end-point remains a challenge…
Harddisks are often not cleaned when repurposed
Increasing security adds complexity & costs
Default tools are subject to hackers
Agenda
Introduction to the technology
Secure workspaces & GDPR
Customers and cases
1
2
3
Awingu is a Unified Workspace that
offers secure access to your company
software and files in a browser based
workspace
ü Access legacy, Web & SaaS apps
ü Access company files
ü Highly secure & audited
ü Any Device (incl. B/CYOD)
ü Any Cloud
Architecture: Awingu’s virtual appliance integrates
with your existing IT assets
Awingu Unified Workspace
Awingu virtual appliance runs on
premise or in the cloud
SaaS
File Server
Cloud Storage
MS AD/LDAP
Legacy Apps
Desktop
Backend Infra
(on premise or cloud)
Anywhere
(incl. on- & off-
line access)
Any device
(incl. BYOD &
CYOD)
Fully secured
& audited
Via Single
Sign-On &
building on
top of
Microsoft
RDP*
Intranet / Web Apps
Secure
Access
Aggregation
HTML5 Workspace
Security & audit
Collaboration built-in
Multi-tenant & Open API
* setup on top of existing Citrix XenApp, XenDesktop environments is possible by leveraging the common RDS layer
1
2
3
4
5
Live Demo
11
Architecture: Awingu’s virtual appliance integrates
with your existing IT assets
Awingu Unified Workspace
Awingu virtual appliance runs on
premise or in the cloud
SaaS
File Server
Cloud Storage
MS AD/LDAP
Legacy Apps
Desktop
Backend Infra
(on premise or cloud)
Anywhere
(incl. on- & off-
line access)
Any device
(incl. BYOD &
CYOD)
Fully secured
& audited
Via Single
Sign-On &
building on
top of
Microsoft
RDP*
Intranet / Web Apps
Secure
Access
Aggregation
HTML5 Workspace
Security & audit
Collaboration built-in
Multi-tenant & Open API
* setup on top of existing Citrix XenApp, XenDesktop environments is possible by leveraging the common RDS layer
1
2
3
4
5
Selection of features
Aggregation HTML5 workspace Security & audit Collaboration built-in
Multi-tenant & Open API
1 2 3 4
5
Windows apps &
desktops
SaaS (SSO)
Web Apps
File servers
(cloud or classic)
Proprietary RDP to
html5 technology
Smartcard support
Any browser (incl.
mobile) on any OS
Dual screen
working supported
Built-in MFA, and
integrations
SSL encryption
built-in
Deep usage audit &
anomaly detection
Granular usage
controls
Built-in file sharing
Built-in app session
sharing
Skype For Business
integration
Virtual printer
Any Cloud (private
– hybrid – public)
Multi-tenant as of a
single VM
Open API
Customizable per
tenant
Context Aware
(based on network)
Platform AgnosticIntuitive to use, easy
to deploy
Highly competitive
TCO
Security & compliancy
enhancing
Awingu is a 100% browser-based turnkey solution that makes old and new apps
available in the same Web browser and online workspace
What makes Awingu unique?
Agenda
Introduction to the technology
Secure workspaces & GDPR
Customers and cases
1
2
3
Awingu equips businesses with a Secure and GDPR-ready workspace,
leveraging built-in capabilities that are easy to setup & manage
Centralized data access Secure Authentication Encryption
Shadow IT Usage auditing End-Point Security
Centralized Data Access
“Awingu helps in keeping a central repository of data. Since Awingu runs completely in the
browser there is no local data footprint left on end device. Files and applications remain in
the safe realm of the enterprise.”
ü Data Subject information runs in a central data
repository, and not a local device
ü Granular control on enabling
download/upload/sharing/printing
ü Share files via Awingu
ü Audit usage and file manipulations
ü Increased protection against (ransomware) viruses
Secure Authentication
“Companies need to put all levels of security in place. Multi-Factor-Authentication is
considered as bare minimum. Awingu comes out of the box with the possibility to enable
Multi-Factor-Authentication. ”
ü Built-in one-time password generator
ü Integration with wide range of partner solutions
Note: a subset of options is shown // * via proxi
One-Time Password (built-in)
(e.g. Google Authenticator)
Radius (Generic connector, e.g. RSA, Vasco,
Symantec ViP …)
SMS PASSCODE *
Duo Security *
Azure MFA *
Solution
1-time password options
Hard Token
(device)
Text message
(SMS)
Phone Call
Soft token
(mobile app)
Verification
pushed to
Mobile App
Native support
Email
Not supported
Secure Authentication
Encryption
“Awingu supports encrypted connections for secure solutions. All date communication via
Awingu can be encrypted. ”
ü Awingu built-in SSL certificate generator
ü Use own SSL certificates (on domain level)
Shadow IT
21
“Awingu allows to share files and applications and enabling this to bringing this to any device.
The need to use “shadow IT” tools to work fully mobile and cross-device, but compromising
security, is no longer there.”
ü Secure work cross device/BYOD
ü Share large files in a controlled way*
ü Share Application sessions in a controlled way*
ü SSO with diverse SaaS apps
* Granular controls can be applied
Usage Auditing
22
“Awingu provides use administration features to view usage behind Awingu. Awingu keeps
track of logins, application sessions, connected SaaS sessions, shared files, allowing to detect
anomalies and alert in case of it.
ü For employees, but also for externals
ü Full usage insights
ü Session Recording*
ü Anomaly detection built-in
* Warning and opt-in will apply
End-Point Security
23
“Since Awingu runs completely in the browser, there is no data on end point devices. If a
device is stolen or lost, there is no risk of losing data that would be locally stored on device as
there is none.”
ü No local data = no risk of data loss when devices are
lost/stolen/re-purposed
ü No direct access to file servers (ransomware
protection)
* Granular controls can be applied
Agenda
Introduction to the technology
Secure workspaces & GDPR
Customers and cases
1
2
3
Public sectorTelco & technology Services & retailManufacturing
Education & non
profit
Transport & logistics Healthcare ISV’s
Reference customers
Why Awingu?
* Independent Software vendor
Cross industry
Click box for more info in
PowerPoint full screen mode
Industry specific
Local Gov
remote working for staff and GDPR compliant contractor
access
VDI cost optimization
Cost efficient and hassle-free alternative to Citrix and
other
GDRP ready
minimum security & compliancy requirements built-in
Contractor access
Secure, audited and cost effective IT access for external
contractors
Any Device access
platform agnostic access for remote workers without
support worries
Healthcare
secure BYOD access for Medical Doctors without IT
admin headache
ISV‘s*
ultrafast ‘SaaS-ification’ of legacy software on a cloud of
choice
Awingu is nominated as ’Gartner
Cool Vendor in Unified Workspaces
2017’
“I&O leaders responsible for mobile and
endpoint strategies will benefit from Awingu as
they make progress on their journeys toward
unified workspaces“
Back-up
About Awingu
Partnerships
Offices
HQ Ghent, Belgium
NYC
Use-case details
What?
The cost of ‘end user computing’ is composed of the hardware (e.g.
Laptop), the centralized and decentralized software, the mobility and
management solution (e.g. VDI, MDM, VPN), and the support and
managed effort. A lot of these costs are not transparent. Awingu helps
business save on all fronts.
Awingu benefits:
ü Low adoption cost from optimized UX
ü Extend life-cycle of existing devices, or adopt flexible B/CYOD
policies
ü Selectively manage end-user devices (e.g. not for contractors)
ü Can significantly reduce Citrix / VMware VDI costs (30-80%)
ü Leverages existing investments in software, end-user devices
and back-end infrastructure (e.g. (RDS, Citrix)
ü Single-click upgrades
Built for cost-efficiency & simplicity
Back to main
Built for cost-efficiency & simplicity
Back to main
Context
Awingu’s
solution
Aviapartner is one of the leading international independent providers
of ground handling services across 37 airports in 6 Europe. They
employ around nearly 6000 staff.
AviaPartner was fully deployed on Citrix, but they found this to be a
cost-inefficient solution for AviaPartner. AviaPartner chose to deploy
Awingu on Microsoft’s Azure platform.
ü Awingu provided significant cost gains compared to Citrix.
ü Awingu furthermore makes it easy to support multiple devices.
To be full “platform agnostic”. AviaPartner currently supports
over a dozen devices from their airport based terminals to
MacBooks, iPads, etc. and users need to get access their core
applications on all devices, anywhere.
ü They adopted Awingu’s built-in One-Time-Password solution
and phased-out the use of classic MFA tokens
Built for cost-efficiency & simplicity
Case: AviaPartner deploys Awingu as a perfect alternative to Citrix
Back to main
What?
Many organizations still depend on VPN and other agent
based solutions for remote working. This typically requires
management of all devices, doesn’t enable BYOD. Also, it
implies running data locally, and potentially gives hackers
access to the back-end network.
Awingu is a simple and secure solution that provides easy
access on any device.
Awingu benefits:
ü Work from any device via the browser
ü Access all company applications: legacy, intranet, web
& SaaS
ü Platform agnostic: BYOD, CYOD
ü Share files & access to application sessions
ü Integrated with Office 365*
Engineered for effective mobile working on
any device
* Share files/sessions directly to Skype for Business users, SSO with Office 365, Access OneDrive documents
Back to main
• During Awingu PoC in 2016, 86% recommended
Awingu
• Today, Awingu deployed for large part of employees
and mainly used for;
• Intranet (incl. HR, expenses, “who-is-who”)
• BCI (CRM & sales tools)
• Set of field force and internal support tools
• Awingu is used on mix of devices; corporate
laptop/desktop, corporate tablet (sales), BYOD
• Awingu is used in:
• ’shop in the shop’
• Technical & commercial field force
• Teleworkers
Engineered for effective mobile working
Case: Proximus leverages Awingu to mobilize workforce, facilitate teleworking
Back to main
What?
• Many organizations work with contractors that need short
or long term access to IT assets (applications or files).
Many times, this is given via VPN or classic VDI tools.
• These are not optimized for security (e.g. Risk for back-
end network access with VPN) or compliancy…
• … are are expensive to manage and support
Awingu benefits:
ü Easy access for contractors using own device
ü Fully secured and audited usage (up to session recording)
ü Cost efficient: no local agents to manage
Secure access for contractors
Back to main
What?
GDPR dictates minimals norms to secure sensite data, e.g.
Encryption, auditing, MFA. Awingu offers these out-of-the-
box
Awingu benefits:
ü Granular usage & access controls
ü Centrally managed
ü Multi-Factor Authentication
ü SSL encrypted traffic
ü No direct access to company network (screen rendering)
ü Full usage audit & anomaly detection
Optimized for secure & GDPR-ready working
Back to main
ü xx
Healthcare: secure BYOD access for Medical
Doctors without IT admin headache
Back to main
What?
Many healthcare institutions work with Medical Doctors and
staff that need off-line access to secure patient data (and
apps). Often on ‘personal’ devices (e.g. Medical doctors that
have a private practise).
Awingu is an easy add-on to the existing IT environment to
provide secure BYOD access to medical apps and files
Awingu benefits
ü Browser based access on any device, OS independent
ü Fully audited, granular usage controls (e.g. Printing,
sharing)
ü Fast setup on existing RDP or Citrix environments
• Secure remote access to Imelda's applications from any type of device. For
example: Medical Doctors can securely work from their personal device in
their own private practice.
• No more remote printing issues. The 'Awingu printer' feature enables easy
printing at home (or any other location) from a personal device.
• Improved efficiency of IT support : No local agents to support and manage
by the IT team. End-users access applications and files via a browser using
their device of choice.
Context
Awingu’s
solution
• Imelda is a mid-sized regional hospital in Bonheiden, near Antwerp
(Belgium). They employ about 1900 employees - a mix of Medical Doctors,
Nurses, administrative staff and management.
• The IT team was challenged by a growing demand for remote working and
BYOD
• The wide range of devices, security/compliance constraints and the
complexity of use-cases was impossible to manage (cost) efficiently with the
classic 'agent-based' tools (e.g. RDP, Citrix XenApp).
Healthcare: secure BYOD access for MD’s
Case: Hospital Imelda Bonheiden chooses Awingu
Back to main
ü xx
Local Gov: remote working for staff and GDPR
compliant contractor access
Back to main
What?
Local gov organizations are increasingly embracing
teleworking (e.g. management teams) and digitizing
processes. They often rely on a large mix of software tools
that are not (always) available outside of the local buildings.
Also, GDPR is a big challenge, especially give the dependency
on contractors.
Awingu provides an cost-efficient and secure access to
mobile workers and contractors.
Awingu benefits
ü Browser based access on any device, OS independent
ü Fully audited, granular usage controls (e.g. Printing,
sharing)
ü Fast setup on existing RDP or Citrix environments
ISV2SaaS.com by Awingu
40
Back to main
ISV2SaaS.com by Awingu
Case: InfoDidac builds ‘CloudEco’ offer on Awingu and Microsoft Azure
InfoDidac chose to build ‘CloudEco’ on Awingu and Azure
Benefits for InfoDidac:
• No new code: No need to re-write legacy application. Awingu
makes it available in the browser (in html5)
• Customized: The Awingu workspace is customized to the wishes
and look & feel of Infodidac
• Multi-tenant: thanks to the multi-tenancy of the Awingu,
management of schools and users became a lot easier.
Benefits for the end-users (users of ‘CloudEco’)
• Work from anywhere and any device
• Back-ups are done automatically by InfoDidac
• Possibility to access multiple schools’ data from the same platform
Context
Awingu’s
solution
• InfoDidac is a Belgian ISV. Their solution ‘ProEco’ is the administration
software for 1300 schools in the Belgian French Community.
• ‘ProEco’ is a legacy software that runs locally on the PC of the end-user. It
was not built to run as a SaaS service
• Schools and their staff request to work more efficiently and flexibly,
Hence the need for a Cloud version: ‘CloudEco’
Back to main
Appendix
Run Awingu on top of Citrix in no time
Easy 4-step guide to deploy Awingu on top
of an existing Citrix XenApp or
XenDesktop environment, by building on
the common RDP layer
ü Get quick & easy access to the full
Awingu experience and benefit quickly
ü Works on older Citrix environments
(e.g. 6.x) as well as recent deployments
Note: Citrix license costs can apply
Back-up
Straight-forward & competitive pricing
Subscription
€7
per month/ concurrent user
Perpetual
€168
per concurrent user (incl. Y1
Maintenance & support)
Minimum users 20 20
Additional users 5 5
Maintenance & Support Included
Y1 = Included
a.o. Y2: €25.50 per user/year
Note: pricing excl. VAT / US $ pricing = € pricing / pricing as of Dec 2015 / further details to discuss with your Awingu salesrep
and distribution partner
Payment 12 months upfront Upfront payment
Back-up
Minimum requirements for Awingu
Back-up
• Microsoft Domain Controller(s) based on Windows 2008 (R2) or Windows 2012 ( R2)
(note: Azure AD is not sufficient)
• Or: Linux based server(s) with openldap installed
• (Legacy or desktop) Applications need to be virtualized and running centrally on a
server
• Windows Server (s) with Microsoft TS or RDS role enabled
• There should be valid Microsoft RDS CAL’s in place
• Have a valid SaaS subscription
• Configure the SaaS to point to Awingu for the authentication
• Microsoft or Linux server(s)
• Shares based on CIFS or WebDAV protocol
Run the Awingu software
Back-end
infrastructure
Application
Servers (legacy
server desktop)
AD or LDAP
Web / SaaS
apps
Fileserver
• Virtual Machine (Hyper-V, Vmware ESX, KVM) running in private cloud, or public cloud
(e.g. Azure, EC2, Softlayer, …)
• Advised min specs for 100 concurrent users: 8 vCPU, 8Gb Ram
Connectivity
• Current fix & mobile broadband connections are sufficient
• Bandwidth: ‘heavy user’ will consume ca. 250Kb up & download
• Latency: should be below 200ms for decent user experience
“Awingu All-in-One” in Azure Marketplace
ü Awingu Azure Marketplace
ü Full Awingu & back-end installer
• Provisioning of application servers,
file servers, AD & network settings
• Provisioning and auto-config of
Awingu, ready for use
ü 2 (free) concurrent users built-in for
smooth roll-out and testing
Your Awingu workspace up-and-running in no time in the Azure cloud
Secure Authentication in Awingu
Note: a subset of options is shown // * via proxi
One-Time Password (built-in)
(e.g. Google Authenticator)
Radius (Generic connector, e.g. RSA, Vasco, Symantec
ViP …)
SMS PASSCODE *
Duo Security *
Azure MFA *
Solution
1-time password options
Hard Token
(device)
Text message
(SMS)
Phone Call
Soft token
(mobile app)
Verification
pushed to
Mobile App
Native support
Email
Not supported
Zoom: Auto-Start & Auto-Focus Applications
Auto-FocusAuto-Start
App
2
App
4
App
6
App
8
App
1
App
3
App
5
App
7
At Awingu login, a selection of ‘auto-start’ apps
will load in the background & become available
in ‘active sessions’
At Awingu login, one specific application will
open in focus/foreground (instead of the Awingu
workspace)
App
2
App
4
App
6
App
8
App
1
App
3
App
5
App
7
25

Más contenido relacionado

La actualidad más candente

MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
Charles McNeil
 

La actualidad más candente (20)

Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
Shadow Data Exposed
Shadow Data ExposedShadow Data Exposed
Shadow Data Exposed
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
SMB Network Security Checklist
 SMB Network Security Checklist SMB Network Security Checklist
SMB Network Security Checklist
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
 
User Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network SecurityUser Behavior based Anomaly Detection for Cyber Network Security
User Behavior based Anomaly Detection for Cyber Network Security
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...Stefan van der Wiele | Protect users identities and control access to valuabl...
Stefan van der Wiele | Protect users identities and control access to valuabl...
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 

Similar a Awingu deck for eurosys gdpr march 2018

UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
DianaGray10
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
Amit Gatenyo
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 

Similar a Awingu deck for eurosys gdpr march 2018 (20)

Awingu 4.0
Awingu 4.0Awingu 4.0
Awingu 4.0
 
Introduction to awingu
Introduction to awinguIntroduction to awingu
Introduction to awingu
 
Accel klantenevent 2016: Awingu
Accel klantenevent 2016: AwinguAccel klantenevent 2016: Awingu
Accel klantenevent 2016: Awingu
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Voyss Cloud-Based Managed Services Webinar 9-14-12
 Voyss Cloud-Based Managed Services Webinar 9-14-12 Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
 
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
TechEd NZ 2014: Enterprise Management with Microsoft System Center Configurat...
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
Securing Cloud Services
Securing Cloud ServicesSecuring Cloud Services
Securing Cloud Services
 
Application Virtualization
Application VirtualizationApplication Virtualization
Application Virtualization
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
Presentasi Awingu DCMS
Presentasi Awingu DCMSPresentasi Awingu DCMS
Presentasi Awingu DCMS
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 

Más de Marketing Team

Más de Marketing Team (20)

EuroSys bedrijfspresentatie 2018
EuroSys bedrijfspresentatie 2018EuroSys bedrijfspresentatie 2018
EuroSys bedrijfspresentatie 2018
 
DELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterDELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenter
 
HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen. HP: De toekomst van personal computing toestellen.
HP: De toekomst van personal computing toestellen.
 
Innovaphone secure your voice
Innovaphone secure your voiceInnovaphone secure your voice
Innovaphone secure your voice
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black”
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
Our digital future with veeam software
Our digital future with veeam softwareOur digital future with veeam software
Our digital future with veeam software
 
Businessday 18 okt - Teamleader
Businessday 18 okt - Teamleader Businessday 18 okt - Teamleader
Businessday 18 okt - Teamleader
 
Businessday okt 2016 - HP - The Office of the future
Businessday okt 2016 - HP - The Office of the futureBusinessday okt 2016 - HP - The Office of the future
Businessday okt 2016 - HP - The Office of the future
 
Businessday okt 2016 - Innovaphone
Businessday okt 2016 - InnovaphoneBusinessday okt 2016 - Innovaphone
Businessday okt 2016 - Innovaphone
 
Businessday okt 2016 - Cranium: GDPR
Businessday okt 2016 - Cranium: GDPRBusinessday okt 2016 - Cranium: GDPR
Businessday okt 2016 - Cranium: GDPR
 
Businessday okt 2016 - Kyocera
Businessday okt 2016 - KyoceraBusinessday okt 2016 - Kyocera
Businessday okt 2016 - Kyocera
 
Businessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuardBusinessday okt 2016 - WatchGuard
Businessday okt 2016 - WatchGuard
 
Businessday okt 2016 - Google cloud
Businessday okt 2016 - Google cloudBusinessday okt 2016 - Google cloud
Businessday okt 2016 - Google cloud
 
Businessday okt 2016 - Telenet
Businessday okt 2016 - Telenet Businessday okt 2016 - Telenet
Businessday okt 2016 - Telenet
 
Businessday okt 2016 - Awingu
Businessday okt 2016 - AwinguBusinessday okt 2016 - Awingu
Businessday okt 2016 - Awingu
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
 
WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016WatchGuard - Security event juni 2016
WatchGuard - Security event juni 2016
 
Telenet anti ddos - Security event juni 2016
Telenet anti ddos - Security event juni 2016Telenet anti ddos - Security event juni 2016
Telenet anti ddos - Security event juni 2016
 
EuroSys bedrijfspresentatie
EuroSys bedrijfspresentatieEuroSys bedrijfspresentatie
EuroSys bedrijfspresentatie
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Awingu deck for eurosys gdpr march 2018

  • 1. Awingu for EuroSys GDPR event March 2nd, 2018 , Belgium
  • 2. Source: Survey of Income and Program Participation, sample with evolution remote workers in the US, 2010 “Mobile working has grown 50% over last 2 decades” Today, work is mobile.
  • 3. We want to work on any device, incl. private devices And increasingly we’ll use tablets & phones * Gartner, Oct 2016
  • 4. “61% of EUC organizations identified modernizing legacy applications as the biggest hurdle they face in changing their endpoint strategies.” (Gartner, Nov 2016) Gartner, Can Workspace Aggregation Meet the Challenges of Unified Workspaces?, 2016, Andrew Garver
  • 5. Business and end-user push towards mobile working and “any device” is a challenge for IT VPN and classic VDI (e.g. RDS, Citrix) are still the most adopted tools for remote working § Limited ‘any device’ usage – requires agents to be installed § High impact on support organization § Local data on device – thus risk of data leakage § Limited usage insights § …
  • 6. Local data on the end-point remains a challenge… Every 53 seconds a laptop is stolen
  • 7. Local data on the end-point remains a challenge… Harddisks are often not cleaned when repurposed
  • 8. Increasing security adds complexity & costs Default tools are subject to hackers
  • 9. Agenda Introduction to the technology Secure workspaces & GDPR Customers and cases 1 2 3
  • 10. Awingu is a Unified Workspace that offers secure access to your company software and files in a browser based workspace ü Access legacy, Web & SaaS apps ü Access company files ü Highly secure & audited ü Any Device (incl. B/CYOD) ü Any Cloud
  • 11. Architecture: Awingu’s virtual appliance integrates with your existing IT assets Awingu Unified Workspace Awingu virtual appliance runs on premise or in the cloud SaaS File Server Cloud Storage MS AD/LDAP Legacy Apps Desktop Backend Infra (on premise or cloud) Anywhere (incl. on- & off- line access) Any device (incl. BYOD & CYOD) Fully secured & audited Via Single Sign-On & building on top of Microsoft RDP* Intranet / Web Apps Secure Access Aggregation HTML5 Workspace Security & audit Collaboration built-in Multi-tenant & Open API * setup on top of existing Citrix XenApp, XenDesktop environments is possible by leveraging the common RDS layer 1 2 3 4 5
  • 13. Architecture: Awingu’s virtual appliance integrates with your existing IT assets Awingu Unified Workspace Awingu virtual appliance runs on premise or in the cloud SaaS File Server Cloud Storage MS AD/LDAP Legacy Apps Desktop Backend Infra (on premise or cloud) Anywhere (incl. on- & off- line access) Any device (incl. BYOD & CYOD) Fully secured & audited Via Single Sign-On & building on top of Microsoft RDP* Intranet / Web Apps Secure Access Aggregation HTML5 Workspace Security & audit Collaboration built-in Multi-tenant & Open API * setup on top of existing Citrix XenApp, XenDesktop environments is possible by leveraging the common RDS layer 1 2 3 4 5
  • 14. Selection of features Aggregation HTML5 workspace Security & audit Collaboration built-in Multi-tenant & Open API 1 2 3 4 5 Windows apps & desktops SaaS (SSO) Web Apps File servers (cloud or classic) Proprietary RDP to html5 technology Smartcard support Any browser (incl. mobile) on any OS Dual screen working supported Built-in MFA, and integrations SSL encryption built-in Deep usage audit & anomaly detection Granular usage controls Built-in file sharing Built-in app session sharing Skype For Business integration Virtual printer Any Cloud (private – hybrid – public) Multi-tenant as of a single VM Open API Customizable per tenant Context Aware (based on network)
  • 15. Platform AgnosticIntuitive to use, easy to deploy Highly competitive TCO Security & compliancy enhancing Awingu is a 100% browser-based turnkey solution that makes old and new apps available in the same Web browser and online workspace What makes Awingu unique?
  • 16. Agenda Introduction to the technology Secure workspaces & GDPR Customers and cases 1 2 3
  • 17. Awingu equips businesses with a Secure and GDPR-ready workspace, leveraging built-in capabilities that are easy to setup & manage Centralized data access Secure Authentication Encryption Shadow IT Usage auditing End-Point Security
  • 18. Centralized Data Access “Awingu helps in keeping a central repository of data. Since Awingu runs completely in the browser there is no local data footprint left on end device. Files and applications remain in the safe realm of the enterprise.” ü Data Subject information runs in a central data repository, and not a local device ü Granular control on enabling download/upload/sharing/printing ü Share files via Awingu ü Audit usage and file manipulations ü Increased protection against (ransomware) viruses
  • 19. Secure Authentication “Companies need to put all levels of security in place. Multi-Factor-Authentication is considered as bare minimum. Awingu comes out of the box with the possibility to enable Multi-Factor-Authentication. ” ü Built-in one-time password generator ü Integration with wide range of partner solutions
  • 20. Note: a subset of options is shown // * via proxi One-Time Password (built-in) (e.g. Google Authenticator) Radius (Generic connector, e.g. RSA, Vasco, Symantec ViP …) SMS PASSCODE * Duo Security * Azure MFA * Solution 1-time password options Hard Token (device) Text message (SMS) Phone Call Soft token (mobile app) Verification pushed to Mobile App Native support Email Not supported Secure Authentication
  • 21. Encryption “Awingu supports encrypted connections for secure solutions. All date communication via Awingu can be encrypted. ” ü Awingu built-in SSL certificate generator ü Use own SSL certificates (on domain level)
  • 22. Shadow IT 21 “Awingu allows to share files and applications and enabling this to bringing this to any device. The need to use “shadow IT” tools to work fully mobile and cross-device, but compromising security, is no longer there.” ü Secure work cross device/BYOD ü Share large files in a controlled way* ü Share Application sessions in a controlled way* ü SSO with diverse SaaS apps * Granular controls can be applied
  • 23. Usage Auditing 22 “Awingu provides use administration features to view usage behind Awingu. Awingu keeps track of logins, application sessions, connected SaaS sessions, shared files, allowing to detect anomalies and alert in case of it. ü For employees, but also for externals ü Full usage insights ü Session Recording* ü Anomaly detection built-in * Warning and opt-in will apply
  • 24. End-Point Security 23 “Since Awingu runs completely in the browser, there is no data on end point devices. If a device is stolen or lost, there is no risk of losing data that would be locally stored on device as there is none.” ü No local data = no risk of data loss when devices are lost/stolen/re-purposed ü No direct access to file servers (ransomware protection) * Granular controls can be applied
  • 25. Agenda Introduction to the technology Secure workspaces & GDPR Customers and cases 1 2 3
  • 26. Public sectorTelco & technology Services & retailManufacturing Education & non profit Transport & logistics Healthcare ISV’s Reference customers
  • 27. Why Awingu? * Independent Software vendor Cross industry Click box for more info in PowerPoint full screen mode Industry specific Local Gov remote working for staff and GDPR compliant contractor access VDI cost optimization Cost efficient and hassle-free alternative to Citrix and other GDRP ready minimum security & compliancy requirements built-in Contractor access Secure, audited and cost effective IT access for external contractors Any Device access platform agnostic access for remote workers without support worries Healthcare secure BYOD access for Medical Doctors without IT admin headache ISV‘s* ultrafast ‘SaaS-ification’ of legacy software on a cloud of choice
  • 28. Awingu is nominated as ’Gartner Cool Vendor in Unified Workspaces 2017’ “I&O leaders responsible for mobile and endpoint strategies will benefit from Awingu as they make progress on their journeys toward unified workspaces“ Back-up
  • 31. What? The cost of ‘end user computing’ is composed of the hardware (e.g. Laptop), the centralized and decentralized software, the mobility and management solution (e.g. VDI, MDM, VPN), and the support and managed effort. A lot of these costs are not transparent. Awingu helps business save on all fronts. Awingu benefits: ü Low adoption cost from optimized UX ü Extend life-cycle of existing devices, or adopt flexible B/CYOD policies ü Selectively manage end-user devices (e.g. not for contractors) ü Can significantly reduce Citrix / VMware VDI costs (30-80%) ü Leverages existing investments in software, end-user devices and back-end infrastructure (e.g. (RDS, Citrix) ü Single-click upgrades Built for cost-efficiency & simplicity Back to main
  • 32. Built for cost-efficiency & simplicity Back to main
  • 33. Context Awingu’s solution Aviapartner is one of the leading international independent providers of ground handling services across 37 airports in 6 Europe. They employ around nearly 6000 staff. AviaPartner was fully deployed on Citrix, but they found this to be a cost-inefficient solution for AviaPartner. AviaPartner chose to deploy Awingu on Microsoft’s Azure platform. ü Awingu provided significant cost gains compared to Citrix. ü Awingu furthermore makes it easy to support multiple devices. To be full “platform agnostic”. AviaPartner currently supports over a dozen devices from their airport based terminals to MacBooks, iPads, etc. and users need to get access their core applications on all devices, anywhere. ü They adopted Awingu’s built-in One-Time-Password solution and phased-out the use of classic MFA tokens Built for cost-efficiency & simplicity Case: AviaPartner deploys Awingu as a perfect alternative to Citrix Back to main
  • 34. What? Many organizations still depend on VPN and other agent based solutions for remote working. This typically requires management of all devices, doesn’t enable BYOD. Also, it implies running data locally, and potentially gives hackers access to the back-end network. Awingu is a simple and secure solution that provides easy access on any device. Awingu benefits: ü Work from any device via the browser ü Access all company applications: legacy, intranet, web & SaaS ü Platform agnostic: BYOD, CYOD ü Share files & access to application sessions ü Integrated with Office 365* Engineered for effective mobile working on any device * Share files/sessions directly to Skype for Business users, SSO with Office 365, Access OneDrive documents Back to main
  • 35. • During Awingu PoC in 2016, 86% recommended Awingu • Today, Awingu deployed for large part of employees and mainly used for; • Intranet (incl. HR, expenses, “who-is-who”) • BCI (CRM & sales tools) • Set of field force and internal support tools • Awingu is used on mix of devices; corporate laptop/desktop, corporate tablet (sales), BYOD • Awingu is used in: • ’shop in the shop’ • Technical & commercial field force • Teleworkers Engineered for effective mobile working Case: Proximus leverages Awingu to mobilize workforce, facilitate teleworking Back to main
  • 36. What? • Many organizations work with contractors that need short or long term access to IT assets (applications or files). Many times, this is given via VPN or classic VDI tools. • These are not optimized for security (e.g. Risk for back- end network access with VPN) or compliancy… • … are are expensive to manage and support Awingu benefits: ü Easy access for contractors using own device ü Fully secured and audited usage (up to session recording) ü Cost efficient: no local agents to manage Secure access for contractors Back to main
  • 37. What? GDPR dictates minimals norms to secure sensite data, e.g. Encryption, auditing, MFA. Awingu offers these out-of-the- box Awingu benefits: ü Granular usage & access controls ü Centrally managed ü Multi-Factor Authentication ü SSL encrypted traffic ü No direct access to company network (screen rendering) ü Full usage audit & anomaly detection Optimized for secure & GDPR-ready working Back to main
  • 38. ü xx Healthcare: secure BYOD access for Medical Doctors without IT admin headache Back to main What? Many healthcare institutions work with Medical Doctors and staff that need off-line access to secure patient data (and apps). Often on ‘personal’ devices (e.g. Medical doctors that have a private practise). Awingu is an easy add-on to the existing IT environment to provide secure BYOD access to medical apps and files Awingu benefits ü Browser based access on any device, OS independent ü Fully audited, granular usage controls (e.g. Printing, sharing) ü Fast setup on existing RDP or Citrix environments
  • 39. • Secure remote access to Imelda's applications from any type of device. For example: Medical Doctors can securely work from their personal device in their own private practice. • No more remote printing issues. The 'Awingu printer' feature enables easy printing at home (or any other location) from a personal device. • Improved efficiency of IT support : No local agents to support and manage by the IT team. End-users access applications and files via a browser using their device of choice. Context Awingu’s solution • Imelda is a mid-sized regional hospital in Bonheiden, near Antwerp (Belgium). They employ about 1900 employees - a mix of Medical Doctors, Nurses, administrative staff and management. • The IT team was challenged by a growing demand for remote working and BYOD • The wide range of devices, security/compliance constraints and the complexity of use-cases was impossible to manage (cost) efficiently with the classic 'agent-based' tools (e.g. RDP, Citrix XenApp). Healthcare: secure BYOD access for MD’s Case: Hospital Imelda Bonheiden chooses Awingu Back to main
  • 40. ü xx Local Gov: remote working for staff and GDPR compliant contractor access Back to main What? Local gov organizations are increasingly embracing teleworking (e.g. management teams) and digitizing processes. They often rely on a large mix of software tools that are not (always) available outside of the local buildings. Also, GDPR is a big challenge, especially give the dependency on contractors. Awingu provides an cost-efficient and secure access to mobile workers and contractors. Awingu benefits ü Browser based access on any device, OS independent ü Fully audited, granular usage controls (e.g. Printing, sharing) ü Fast setup on existing RDP or Citrix environments
  • 42. ISV2SaaS.com by Awingu Case: InfoDidac builds ‘CloudEco’ offer on Awingu and Microsoft Azure InfoDidac chose to build ‘CloudEco’ on Awingu and Azure Benefits for InfoDidac: • No new code: No need to re-write legacy application. Awingu makes it available in the browser (in html5) • Customized: The Awingu workspace is customized to the wishes and look & feel of Infodidac • Multi-tenant: thanks to the multi-tenancy of the Awingu, management of schools and users became a lot easier. Benefits for the end-users (users of ‘CloudEco’) • Work from anywhere and any device • Back-ups are done automatically by InfoDidac • Possibility to access multiple schools’ data from the same platform Context Awingu’s solution • InfoDidac is a Belgian ISV. Their solution ‘ProEco’ is the administration software for 1300 schools in the Belgian French Community. • ‘ProEco’ is a legacy software that runs locally on the PC of the end-user. It was not built to run as a SaaS service • Schools and their staff request to work more efficiently and flexibly, Hence the need for a Cloud version: ‘CloudEco’ Back to main
  • 44. Run Awingu on top of Citrix in no time Easy 4-step guide to deploy Awingu on top of an existing Citrix XenApp or XenDesktop environment, by building on the common RDP layer ü Get quick & easy access to the full Awingu experience and benefit quickly ü Works on older Citrix environments (e.g. 6.x) as well as recent deployments Note: Citrix license costs can apply Back-up
  • 45. Straight-forward & competitive pricing Subscription €7 per month/ concurrent user Perpetual €168 per concurrent user (incl. Y1 Maintenance & support) Minimum users 20 20 Additional users 5 5 Maintenance & Support Included Y1 = Included a.o. Y2: €25.50 per user/year Note: pricing excl. VAT / US $ pricing = € pricing / pricing as of Dec 2015 / further details to discuss with your Awingu salesrep and distribution partner Payment 12 months upfront Upfront payment Back-up
  • 46. Minimum requirements for Awingu Back-up • Microsoft Domain Controller(s) based on Windows 2008 (R2) or Windows 2012 ( R2) (note: Azure AD is not sufficient) • Or: Linux based server(s) with openldap installed • (Legacy or desktop) Applications need to be virtualized and running centrally on a server • Windows Server (s) with Microsoft TS or RDS role enabled • There should be valid Microsoft RDS CAL’s in place • Have a valid SaaS subscription • Configure the SaaS to point to Awingu for the authentication • Microsoft or Linux server(s) • Shares based on CIFS or WebDAV protocol Run the Awingu software Back-end infrastructure Application Servers (legacy server desktop) AD or LDAP Web / SaaS apps Fileserver • Virtual Machine (Hyper-V, Vmware ESX, KVM) running in private cloud, or public cloud (e.g. Azure, EC2, Softlayer, …) • Advised min specs for 100 concurrent users: 8 vCPU, 8Gb Ram Connectivity • Current fix & mobile broadband connections are sufficient • Bandwidth: ‘heavy user’ will consume ca. 250Kb up & download • Latency: should be below 200ms for decent user experience
  • 47. “Awingu All-in-One” in Azure Marketplace ü Awingu Azure Marketplace ü Full Awingu & back-end installer • Provisioning of application servers, file servers, AD & network settings • Provisioning and auto-config of Awingu, ready for use ü 2 (free) concurrent users built-in for smooth roll-out and testing Your Awingu workspace up-and-running in no time in the Azure cloud
  • 48. Secure Authentication in Awingu Note: a subset of options is shown // * via proxi One-Time Password (built-in) (e.g. Google Authenticator) Radius (Generic connector, e.g. RSA, Vasco, Symantec ViP …) SMS PASSCODE * Duo Security * Azure MFA * Solution 1-time password options Hard Token (device) Text message (SMS) Phone Call Soft token (mobile app) Verification pushed to Mobile App Native support Email Not supported
  • 49. Zoom: Auto-Start & Auto-Focus Applications Auto-FocusAuto-Start App 2 App 4 App 6 App 8 App 1 App 3 App 5 App 7 At Awingu login, a selection of ‘auto-start’ apps will load in the background & become available in ‘active sessions’ At Awingu login, one specific application will open in focus/foreground (instead of the Awingu workspace) App 2 App 4 App 6 App 8 App 1 App 3 App 5 App 7
  • 50. 25