SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
Enhancing Workplace Mobility and BYOD with the
VMware Mobile Secure Workplace
Marilyn Basanta
Technical Solutions Architect
VMware End User Computing
@marilynbasanta
EUC5509
#EUC5509
Agenda
 Solution overview
 Breakdown of elements
 Load balancing and namespace services
 AD configuration for PKI and Certificate Services
 RADIUS integration
 Persona management
 vCloud Network and Security
 vShield Endpoint and Anti Malware
 vSphere and View configuration considerations
 Horizon Workspace configuration considerations
 Horizon Workspace - Mobile
 Partner Solution – Trend Micro Mobile Security
 Final comments
Solution Overview
L7
End User Devices
Internal Network
External Network/
INTERNET
AD
SSO CA
RADIUS
F&P BACKUP
vC
VCNS AV
Knowledge
Workers
Mobile
Knowledge
Power
Users
MOBILITY
SECURITY
USER EXPERIENCE
VMware View Security Server
VMware View Connection Managers
HW: Gateway VM
vCOPs
Horizon
Workspace vApp
Trend Micro Mobile Security
Before we dive in, some top level items to consider…
TCP/IP Schema, VLANs, routing
and name resolution
considerations
Active Directory topology and
requirements
Network security requirements
and policies
Application workload
requirements, user roles and
behavior
LAN/WAN Topology and design
for real time protocols
Compliance requirements
Load Balancing and namespace services
L7
VMware View
Security Servers
VMware View
Connection Managers
End User Devices
Internal Network
External Network/
INTERNET
• Ensure dedicated LB networks are planned for and
exist in advance of deployment
INTERNAL EXTERNAL HA DMZ
• Plan for redundant configurations, N+1 and vSphere HA/DRS affinity
rules
Active Directory considerations
• Evaluate any existing AD
infrastructure
• New child domain? Security
requirements
• Enough DC resources in the
necessary sites?
• Enterprise CA will need to be
configured from the FRD down if
you are deploying a Windows based
PKI
• Sites and subnets configured
appropriately to localize domain
operations to the closest DCs
• Configuration steps are provided in the
solution design document
RADIUS Integration
• More choices for RADIUS integration
• Plan for extra connection servers to
provide redundant support for users
authenticating with RADIUS
• Validated solution uses Microsoft
RADIUS in the design.
Persona Management
• Considerations for virtual machines hosting
profile volumes
• Tuning the profile upload interval for scale
• When possible use Persona instead of
Windows Roaming profiles to avoid conflict
• Folder redirection balanced with roaming
data
• Application specific requirements such as
ThinApp sandbox roaming
• AV strategy using Persona, in band scanning
as part of vShield Endpoint or out of band on
the persona management fileservers
vSphere and View considerations
vDS
• Where possible leverage vDS in
management and View VDI infrastructure
• Auto-Deploy and host profiles for rollout
and ongoing compliance, conformity at
scale
• vCNS Edge for network services such as
DHCP, load balancing
• vMA for host management and
administration, vSphere web client
vCNS – App Firewall and Edge
VMware vSphere
Knowledge
Workers
Power
Users
LOB Apps
• vCNS App and Edge services
to provide security for our
logical groupings of VMs
• Define in advance the access
rules that will be required to
secure your resources
effectively
• Remember to define rules for
View agent/client/server
communication and display
protocols!
• Get familiar with the
troubleshooting techniques
required for vShield, you
*WILL* need to debug at some
stage!
Start with an open policy then
lock it down as you go
vSphere Feature – vShield Endpoint
Partner Solution: Trend
Micro Deep Security
Security API
ESX
Anti-Virus
Workload VM’s
VMDK
EPSec
• Understand the impact
on density, plan for
dedicated resources
required by security
VM per host
• Fully evaluate performance characteristics
• Look out for gotcha’s in on-access scanning and scheduled
scanning defaults
• Ensure all hosts successfully install vShield Endpoint as part of the
deployment process prior to deploying infrastructure or VDI
services. If possible integrate the vendor specific VIBs into your
ESXi installation image.
Deep Security Virtual Appliance
• Intrusion prevention
• Firewall
Virtualization Security with Deep Security
Agentless Security Platform for Private Cloud Environments
• Anti-malware
• Web reputation
• Integrity monitoring
VM VM VM
The Old Way
Security
Virtual
Appliance
VM VM VM
With Deep Security
VM
Easier
Manageability
Higher
Density
Fewer
Resources
Stronger
Security
VM
More VMs
1310/17/2013 Confidential | Copyright 2012 Trend Micro Inc.
Horizon Workspace vApp
Workspace vApp
Configurator
VA
OS (SLES)
tcserver
Service VA
OS (SLES)
App
API
DBtcserver
Data VA
OS (SLES)
App
API
DB LDAPJetty
App
Connector
VA
OS (SLES)
tcserver
App
Gateway
VA
OS (SLES)
Nginx
Modules
• Central Wizard UI
• Distributes settings
across VAs
• Network, Gateway,
vCenter, SMTP
attributes
• Add / remove modules
• Manage certs, security
• User authentication (RSA SecureID)
• AD secure bind and synchronization
• Set replication schedule
• Sync View pools and ThinApp
• Enables single user-
facing domain
• Routes requests to
correct node
• Workspace Admin UI
• Application Catalog
• Manage user entitlements
• Workspace Groups
• Reporting
• Stores files
• Controls file sharing policy for
internal and external users
• Manage file preview server
• Serves end user web UI
Horizon Workspace Deploy Considerations
• Ensure DNS name resolution is prepared in advance
• Split brain considerations for Gateway FQDN
• Prepare Signed Certificates in advance, the entire SSL chain
must be exported
• Create an Active Directory BIND DN account
• Ensure Active Directory group structure is in place to support
Workspace services (applications, data)
Horizon Workspace Deploy Considerations
• Prepare ThinApp repositories
• Configure SAML settings for View, the
default the SAML Timeout is 15 minutes
• Decide on a preview strategy (LibreOffice or
Microsoft Preview Server)
• User Principal Name (UPN) set as a required
attribute for View
• Horizon Data storage sizing
Horizon Workspace – Gateway-va Diagram
L7 Load Balancer
Load balancing strategy and technical preparation complete
Virtualization on Android (Mobile Virtualization Platform)
Personal Corporate
Corporate Workspace
Enterprise Catalog
Mail/Calendar App
Custom Apps
3rd Party Apps
 Own your full version of Android OS
 Consistent native mobile experience
 Deploy applications without modifying them
Solve Android fragmentation
 Strict corporate assets isolation
 Corporate data encryption
 VPN policy for corporate traffic
Prevent data leakage
 Exchange email, calendar, secure browser,
file browser and contacts
 Your Line Of Business application
Provide productivity features
How do Employees Obtain VMware Horizon Workspace/Mobile?
Employees’ Device
VMware Switch
Confidential
Sony is supporting Vmware Ready devices as standard feature
Coming soon: Xperia Z1
and Xperia Ultra Z will be
VMware Ready for
World Wide coverage.
Today’s Attacks: Social, Sophisticated, Stealthy!
Attacker
Moves laterally across network
seeking valuable data
Establishes Command
& Control server
Extracts data of interest – can go
undetected for months!
$$$$
Gathers intelligence about
organization and individuals
Targets individuals
using social engineering
Employees
MOBILE MALWARE
Yes… It’s real.
It’s not just “malware”, but, privacy leaks..
Well Known Apps Leak Data ..
Device Management & Control
Employees
Trend Micro
Mobile Security
Email SharePoint Corp Data Web Traffic
• Easy onboarding: email, URL, QR code
• Apple (iOS), Android, Blackberry, Windows Phone 7
and 8
• Optional Cloud Communication Server
• Device Discovery
• Device Provisioning
• Remote Control
• Reporting
• Inventory Management
Cloud
Comm.
Server
Threat Protection
Employees
Email SharePoint Corp Data Web Traffic
Trend Micro
Mobile Security
• Android AV and Website
Reputation
• Leveraging Smart Protection
Network
• Anti-Malware
• Firewall
• Web Threat Protection
• Call Filtering
• SMS/WAP Anti-Spam
Complete End User Protection
Email &
Messaging
Web
Access
Device Hopping
Collaboration
Cloud Sync
& Sharing
Social
Networking
File/Folder &
Removable Media
Anti-Malware Encryption
Application
Control
Device
Management
Data Loss
Prevention
Content
Filtering
Employees
IT Admin
Security
Trend Micro Mobile Security
Manage Device
Management
• Device Discovery
• Device Enrollment
• Device Provisioning
• Asset Tracking
• S/W Management
• Remote Control
• Reporting
• Summary Views
• Summery Reports
Mobile Device
Security
• Anti-Malware
• Firewall
• Web Threat Protection
• Call Filtering
• SMS/WAP Anti-Spam
• Jail break detection
• App Reputation
Data Protection
• Encryption Enforcement
• Remote Wipe
• Selective Wipe
• Remote Lock
• Feature Lock
• Password Policy
Application
Management
• App Black Listing
• App White Listing
• App Push
• Required
• Optional
• App Inventory
Stand Alone/Integrated
Horizon Virtual Workspace
Windows Management
and Delivery
(server hosted & local)
(apps and desktops)
VMware Horizon View & Mirage
Secure Mobile
Workspace
(across all devices)
(apps, data, collaboration)
VMware Horizon Workspace
Virtual
Workspace
Secure access to all my
stuff, anywhere, anytime
Next Steps
For more information on Mobile Secure Desktop design, please visit:
Mobile Secure Desktop Validated Design
Guidehttp://www.vmware.com/files/pdf/view/Mobile-Secure-Desktop-Solution-Brief.pdf
Mobile Secure Desktop Solution Guidehttp://www.vmware.com/files/pdf/view/Mobile-
Secure-Desktop-Solution-Brief.pdf
View Design
Resourceshttp://www.vmware.com/products/desktop_virtualization/view/technical-
resources.html#Design
Horizon Workspace Reviewer’s Guide
http://www.vmware.com/files/pdf/techpaper/vmware-horizon-workspace-reviewers-
guide.pdf
Integrating Horizon Workspace and Horizon View
http://www.vmware.com/files/pdf/techpaper/vmware-horizon-view-integration-horizon-
workspace.pdf
Configuring Horizon Switch
http://blogs.vmware.com/horizontech/2013/08/configuring-vmware-switch-for-android-
with-vmware-horizon-workspace-1-5.html
THANK YOU
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace

Más contenido relacionado

La actualidad más candente

Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM DatapowerSigortam.net
 
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...Jürgen Ambrosi
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for znick_garrod
 
Unraveling the mystery of Cloud Computing
Unraveling the mystery of Cloud ComputingUnraveling the mystery of Cloud Computing
Unraveling the mystery of Cloud ComputingByron Patrick
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageINSPIRIT BRASIL
 
V mware v realize automation 6.2 knowledge transfer kit
V mware v realize  automation 6.2 knowledge transfer kitV mware v realize  automation 6.2 knowledge transfer kit
V mware v realize automation 6.2 knowledge transfer kitsolarisyougood
 
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access GatewaySichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access GatewayDigicomp Academy AG
 
Zimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentationZimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentationsolarisyourep
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxsolarisyougood
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security ProcessesAmazon Web Services Japan
 
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computingpallavikhandekar212
 

La actualidad más candente (20)

Web Api services using IBM Datapower
Web Api services using IBM DatapowerWeb Api services using IBM Datapower
Web Api services using IBM Datapower
 
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
1° Sessione - Tecnologie hyperconvergenti e di virtualizzazione storage: VMwa...
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
Unraveling the mystery of Cloud Computing
Unraveling the mystery of Cloud ComputingUnraveling the mystery of Cloud Computing
Unraveling the mystery of Cloud Computing
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
Barracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantageBarracuda web application_firewall_wp_advantage
Barracuda web application_firewall_wp_advantage
 
VAS - VMware CMP
VAS - VMware CMPVAS - VMware CMP
VAS - VMware CMP
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
vRA7 What's New
vRA7 What's NewvRA7 What's New
vRA7 What's New
 
V mware v realize automation 6.2 knowledge transfer kit
V mware v realize  automation 6.2 knowledge transfer kitV mware v realize  automation 6.2 knowledge transfer kit
V mware v realize automation 6.2 knowledge transfer kit
 
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access GatewaySichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
Sichere Bereitstellung von virtuellen Desktops mit Citrix Access Gateway
 
Zimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentationZimbra versus exchange 2010 presentation
Zimbra versus exchange 2010 presentation
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
Self service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsxSelf service it with v realizeautomation and nsx
Self service it with v realizeautomation and nsx
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
 
Security Avalanche
Security AvalancheSecurity Avalanche
Security Avalanche
 
Zimbra Overview
Zimbra OverviewZimbra Overview
Zimbra Overview
 
Bright and Gray areas of Clound Computing
Bright and Gray areas of Clound ComputingBright and Gray areas of Clound Computing
Bright and Gray areas of Clound Computing
 

Similar a VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace

Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityScott Hoag
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Amazon Web Services
 
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero Amazon Web Services
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSDeploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSAmazon Web Services
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the CloudAmazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the CloudAmazon Web Services
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformShashi Kiran
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureK.Mohamed Faizal
 
KoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersKoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersTobias Koprowski
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon Web Services
 
Por trás da infraestrutura do Cloud - Campus Party 2014
Por trás da infraestrutura do Cloud - Campus Party 2014Por trás da infraestrutura do Cloud - Campus Party 2014
Por trás da infraestrutura do Cloud - Campus Party 2014Gleicon Moraes
 
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...Amazon Web Services
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?Digicomp Academy AG
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your AzureHolly Plude
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine Erin Banks
 
Windows Azure Overview for IT Professionals
Windows Azure Overview for IT ProfessionalsWindows Azure Overview for IT Professionals
Windows Azure Overview for IT ProfessionalsAlex Melching
 

Similar a VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace (20)

Global Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network SecurityGlobal Azure Bootcamp 2018 - Azure Network Security
Global Azure Bootcamp 2018 - Azure Network Security
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep DiveVMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
VMworld 2013: What's New with VMware Horizon Workspace: Technical Deep Dive
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWSDeploy a DoD Secure Cloud Computing Architecture Environment in AWS
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the CloudAmazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
Connect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft AzureConnect your datacenter to Microsoft Azure
Connect your datacenter to Microsoft Azure
 
KoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginnersKoprowskiT_session1_SDNEvent_WASDforBeginners
KoprowskiT_session1_SDNEvent_WASDforBeginners
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud Amazon WorkSpaces - Fully Managed Desktops in the Cloud
Amazon WorkSpaces - Fully Managed Desktops in the Cloud
 
Por trás da infraestrutura do Cloud - Campus Party 2014
Por trás da infraestrutura do Cloud - Campus Party 2014Por trás da infraestrutura do Cloud - Campus Party 2014
Por trás da infraestrutura do Cloud - Campus Party 2014
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
 
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure6 Ways to Get More From Your Azure
6 Ways to Get More From Your Azure
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
resumeLF_201503
resumeLF_201503resumeLF_201503
resumeLF_201503
 
Windows Azure Overview for IT Professionals
Windows Azure Overview for IT ProfessionalsWindows Azure Overview for IT Professionals
Windows Azure Overview for IT Professionals
 

Más de VMworld

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld
 

Más de VMworld (20)

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep Dive
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco InfrastructureVMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep Dive
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations!
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts Panel
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way!
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SAN
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace

  • 1. Enhancing Workplace Mobility and BYOD with the VMware Mobile Secure Workplace Marilyn Basanta Technical Solutions Architect VMware End User Computing @marilynbasanta EUC5509 #EUC5509
  • 2. Agenda  Solution overview  Breakdown of elements  Load balancing and namespace services  AD configuration for PKI and Certificate Services  RADIUS integration  Persona management  vCloud Network and Security  vShield Endpoint and Anti Malware  vSphere and View configuration considerations  Horizon Workspace configuration considerations  Horizon Workspace - Mobile  Partner Solution – Trend Micro Mobile Security  Final comments
  • 3. Solution Overview L7 End User Devices Internal Network External Network/ INTERNET AD SSO CA RADIUS F&P BACKUP vC VCNS AV Knowledge Workers Mobile Knowledge Power Users MOBILITY SECURITY USER EXPERIENCE VMware View Security Server VMware View Connection Managers HW: Gateway VM vCOPs Horizon Workspace vApp Trend Micro Mobile Security
  • 4. Before we dive in, some top level items to consider… TCP/IP Schema, VLANs, routing and name resolution considerations Active Directory topology and requirements Network security requirements and policies Application workload requirements, user roles and behavior LAN/WAN Topology and design for real time protocols Compliance requirements
  • 5. Load Balancing and namespace services L7 VMware View Security Servers VMware View Connection Managers End User Devices Internal Network External Network/ INTERNET • Ensure dedicated LB networks are planned for and exist in advance of deployment INTERNAL EXTERNAL HA DMZ • Plan for redundant configurations, N+1 and vSphere HA/DRS affinity rules
  • 6. Active Directory considerations • Evaluate any existing AD infrastructure • New child domain? Security requirements • Enough DC resources in the necessary sites? • Enterprise CA will need to be configured from the FRD down if you are deploying a Windows based PKI • Sites and subnets configured appropriately to localize domain operations to the closest DCs
  • 7. • Configuration steps are provided in the solution design document RADIUS Integration • More choices for RADIUS integration • Plan for extra connection servers to provide redundant support for users authenticating with RADIUS • Validated solution uses Microsoft RADIUS in the design.
  • 8. Persona Management • Considerations for virtual machines hosting profile volumes • Tuning the profile upload interval for scale • When possible use Persona instead of Windows Roaming profiles to avoid conflict • Folder redirection balanced with roaming data • Application specific requirements such as ThinApp sandbox roaming • AV strategy using Persona, in band scanning as part of vShield Endpoint or out of band on the persona management fileservers
  • 9. vSphere and View considerations vDS • Where possible leverage vDS in management and View VDI infrastructure • Auto-Deploy and host profiles for rollout and ongoing compliance, conformity at scale • vCNS Edge for network services such as DHCP, load balancing • vMA for host management and administration, vSphere web client
  • 10. vCNS – App Firewall and Edge VMware vSphere Knowledge Workers Power Users LOB Apps • vCNS App and Edge services to provide security for our logical groupings of VMs • Define in advance the access rules that will be required to secure your resources effectively • Remember to define rules for View agent/client/server communication and display protocols! • Get familiar with the troubleshooting techniques required for vShield, you *WILL* need to debug at some stage! Start with an open policy then lock it down as you go
  • 11. vSphere Feature – vShield Endpoint Partner Solution: Trend Micro Deep Security Security API ESX Anti-Virus Workload VM’s VMDK EPSec • Understand the impact on density, plan for dedicated resources required by security VM per host • Fully evaluate performance characteristics • Look out for gotcha’s in on-access scanning and scheduled scanning defaults • Ensure all hosts successfully install vShield Endpoint as part of the deployment process prior to deploying infrastructure or VDI services. If possible integrate the vendor specific VIBs into your ESXi installation image.
  • 12. Deep Security Virtual Appliance • Intrusion prevention • Firewall Virtualization Security with Deep Security Agentless Security Platform for Private Cloud Environments • Anti-malware • Web reputation • Integrity monitoring VM VM VM The Old Way Security Virtual Appliance VM VM VM With Deep Security VM Easier Manageability Higher Density Fewer Resources Stronger Security VM More VMs 1310/17/2013 Confidential | Copyright 2012 Trend Micro Inc.
  • 13. Horizon Workspace vApp Workspace vApp Configurator VA OS (SLES) tcserver Service VA OS (SLES) App API DBtcserver Data VA OS (SLES) App API DB LDAPJetty App Connector VA OS (SLES) tcserver App Gateway VA OS (SLES) Nginx Modules • Central Wizard UI • Distributes settings across VAs • Network, Gateway, vCenter, SMTP attributes • Add / remove modules • Manage certs, security • User authentication (RSA SecureID) • AD secure bind and synchronization • Set replication schedule • Sync View pools and ThinApp • Enables single user- facing domain • Routes requests to correct node • Workspace Admin UI • Application Catalog • Manage user entitlements • Workspace Groups • Reporting • Stores files • Controls file sharing policy for internal and external users • Manage file preview server • Serves end user web UI
  • 14. Horizon Workspace Deploy Considerations • Ensure DNS name resolution is prepared in advance • Split brain considerations for Gateway FQDN • Prepare Signed Certificates in advance, the entire SSL chain must be exported • Create an Active Directory BIND DN account • Ensure Active Directory group structure is in place to support Workspace services (applications, data)
  • 15. Horizon Workspace Deploy Considerations • Prepare ThinApp repositories • Configure SAML settings for View, the default the SAML Timeout is 15 minutes • Decide on a preview strategy (LibreOffice or Microsoft Preview Server) • User Principal Name (UPN) set as a required attribute for View • Horizon Data storage sizing
  • 16. Horizon Workspace – Gateway-va Diagram L7 Load Balancer Load balancing strategy and technical preparation complete
  • 17. Virtualization on Android (Mobile Virtualization Platform) Personal Corporate Corporate Workspace Enterprise Catalog Mail/Calendar App Custom Apps 3rd Party Apps  Own your full version of Android OS  Consistent native mobile experience  Deploy applications without modifying them Solve Android fragmentation  Strict corporate assets isolation  Corporate data encryption  VPN policy for corporate traffic Prevent data leakage  Exchange email, calendar, secure browser, file browser and contacts  Your Line Of Business application Provide productivity features
  • 18. How do Employees Obtain VMware Horizon Workspace/Mobile? Employees’ Device VMware Switch Confidential
  • 19. Sony is supporting Vmware Ready devices as standard feature Coming soon: Xperia Z1 and Xperia Ultra Z will be VMware Ready for World Wide coverage.
  • 20. Today’s Attacks: Social, Sophisticated, Stealthy! Attacker Moves laterally across network seeking valuable data Establishes Command & Control server Extracts data of interest – can go undetected for months! $$$$ Gathers intelligence about organization and individuals Targets individuals using social engineering Employees
  • 21.
  • 23.
  • 24. It’s not just “malware”, but, privacy leaks..
  • 25. Well Known Apps Leak Data ..
  • 26. Device Management & Control Employees Trend Micro Mobile Security Email SharePoint Corp Data Web Traffic • Easy onboarding: email, URL, QR code • Apple (iOS), Android, Blackberry, Windows Phone 7 and 8 • Optional Cloud Communication Server • Device Discovery • Device Provisioning • Remote Control • Reporting • Inventory Management Cloud Comm. Server
  • 27. Threat Protection Employees Email SharePoint Corp Data Web Traffic Trend Micro Mobile Security • Android AV and Website Reputation • Leveraging Smart Protection Network • Anti-Malware • Firewall • Web Threat Protection • Call Filtering • SMS/WAP Anti-Spam
  • 28. Complete End User Protection Email & Messaging Web Access Device Hopping Collaboration Cloud Sync & Sharing Social Networking File/Folder & Removable Media Anti-Malware Encryption Application Control Device Management Data Loss Prevention Content Filtering Employees IT Admin Security
  • 29. Trend Micro Mobile Security Manage Device Management • Device Discovery • Device Enrollment • Device Provisioning • Asset Tracking • S/W Management • Remote Control • Reporting • Summary Views • Summery Reports Mobile Device Security • Anti-Malware • Firewall • Web Threat Protection • Call Filtering • SMS/WAP Anti-Spam • Jail break detection • App Reputation Data Protection • Encryption Enforcement • Remote Wipe • Selective Wipe • Remote Lock • Feature Lock • Password Policy Application Management • App Black Listing • App White Listing • App Push • Required • Optional • App Inventory Stand Alone/Integrated
  • 30. Horizon Virtual Workspace Windows Management and Delivery (server hosted & local) (apps and desktops) VMware Horizon View & Mirage Secure Mobile Workspace (across all devices) (apps, data, collaboration) VMware Horizon Workspace Virtual Workspace Secure access to all my stuff, anywhere, anytime
  • 31. Next Steps For more information on Mobile Secure Desktop design, please visit: Mobile Secure Desktop Validated Design Guidehttp://www.vmware.com/files/pdf/view/Mobile-Secure-Desktop-Solution-Brief.pdf Mobile Secure Desktop Solution Guidehttp://www.vmware.com/files/pdf/view/Mobile- Secure-Desktop-Solution-Brief.pdf View Design Resourceshttp://www.vmware.com/products/desktop_virtualization/view/technical- resources.html#Design Horizon Workspace Reviewer’s Guide http://www.vmware.com/files/pdf/techpaper/vmware-horizon-workspace-reviewers- guide.pdf Integrating Horizon Workspace and Horizon View http://www.vmware.com/files/pdf/techpaper/vmware-horizon-view-integration-horizon- workspace.pdf Configuring Horizon Switch http://blogs.vmware.com/horizontech/2013/08/configuring-vmware-switch-for-android- with-vmware-horizon-workspace-1-5.html