DaaS is a Virtual Desktop Interface, a terminal Server help organization to use conventional desktop as conventional desktop are costlier and expensive to maintain. Go for DaaS, I is pay as you go model hence save on Capital Expenditure and maintenance.
2. Challenges
Huge desktop infrastructure Expenditure
High security issue in my desktop environment
Up-gradation of old Desktop hardware
New Software compatible issues
IT engineer Salaries / agencies AMC Expenses
Capex investment & ROI is not sufficient.
Unable access desktop when you are out of office
3. DaaS Solution
Architecture
User End Device
Remote Desktop Web Active Directory Server
Access Server in Load
Balancer
Remote Desktop
Connection Broker
Server in Failover
Cluster
Session Host Server in
LoadBalancer
Propritery & Confidential Information of
3
BSNL SIS
4. Solution - DaaS
• DaaS is a virtual desktop solution without physical Hardware
• You will get a URL / IP Address with Userid Password to login.
• A standard/low profile hardware device or even thin client to connect to IDC either
through Public Network – Internet or Private Network – MPLS, Leased Line etc.
• Once you login you will get complete separate dedicated desktop environment.
• Your profile is created and saved at safe & Secured IDC
• You can access the same from any where in the world from any computer
connected on Internet (in case of Public Cloud)
• This service is secured as communication between local client and Virtual Desktop
is encrypted.
• You can access all of your local devices like Printers, Pen Drives, Peripherals like
what you access in Physical desktop.
• You are charged on pay per use every month or every quarter or whatever
frequency you decide
6. Features
10 + year old proven technology
Rich Desktop Experience of Microsoft RDS
Applicable for SMB & Enterprise Scenarios
No data loss or recovery issue : Data stored in cloud
No need to worry about hardware upgrade, user will get
best in class hardware experience
No downtime
7. Benefits
Complete
Minimal Very Quick Rich Desktop
Scalable & Multiple
initial Provisioning SLA based Experience of
service offerings to
investment of Desktops commitment Microsoft
Management choose from
(near to zero) in IDC RDS
by SIS
8. Conventional Desktop vs DaaS
Conventional Desktop DaaS
Requires good space, power Runs on thin clients, laptops, savings on space, power
Requires AMC & FMS No Worries about AMC, FMS
Requires OS & Application Licenses OS, Application Licenses can be pay per use
Hardly 10% of CPU utilization High Power CPU shared across multiple VDIs
Loose Control on Data Leakage & loss Good Control over Data Leakage & protection against data loss
More Information Security threats like Viruses Better controlled by default centralized threat management
Less Environment Friendly – due to noise, heat, scrap issues More green – environment friendly
High TCO Least TCO
9. How to Access..?
All DaaS
Infrastructure is
There is a secured managed
connectivity with https through Captive
connection with NOC of SIS
He needs Internet Firewall in between
connectivity to his
end point
End user needs to have
any End point –
Laptop, Old
Desktop, Thin
Client, Cyber Café
enabled with Microsoft
Terminal Client
Only Screen is
transferred over Network This is Microsoft’s
and data is stored only Virtual Desktop
on VDI. Infrastructure in IDC.
Propritery & Confidential Information of
9
BSNL SIS
10. DID – Defence in Design
Security Parameters
Physical Security Vigilant Security
ITIL & ISO 27001 Operations Center (SOC)
aligned Processes Perimeter Security
Network Security Monitoring & Analysis
End Point Protection
Risk
Management
Vulnerability
DATA
Management
Compliance & Security Analysts &
Governance Experts
Version 1.0 Release Date: 18/12/2012
11. DID – Defense in Design
Physical Security End Point Protection
• 24x7 Security Guards • Anti-malware : Antivirus/Anti-
• CCTV Monitoring spyware
• Biometric (2 factor) Access Control • Host Based Firewall
• Multilevel Authentication Process • Patch Management
• Visitor Management with Escorting
• Tier III Data Center
• No Single Point of Failure
Perimeter Security Network Protection
• Cisco Adaptive Security Appliance Firewall • Separate VLAN for Customer
• Cisco Network Intrusion Prevention System • Secured VPN Connectivity
• Signature Based : To Mitigate Known • 128-bit SSL Encryption over the
Attacks Internet for Server Management
• Anomaly Based: To Mitigate Zero Day • Vulnerability Management &
Attacks Hardening as per the security best
• Continuous monitoring of the Alerts & Logs practices (VAPT)
by Security Analysts in SOC Center
Compliance & Governance Security Operations Centre (SOC)
Risk Management Process Continues Monitoring of the Alerts
Compliance to ISO 27001Standard & ITIL Event & Incident Management
Processes Event Classification & Notification
Regular Vulnerability Assessments Event Analysis with Correlation
Incident Identification
Incident Response
Version 1.0 Release Date: 18/12/2012
12. TCO of Conventional Desktop
Nos. of Desktops Required 300 Date 01.01.2013
Per Unit Type of
Sr Expense Item Assumption Cost Multiplier Cost Cost Y1 Cost Y2 Cost Y3 Cost Y4 Cost Y5 TCO
Config - i5 Dual Core@ 3 GHZ, 2 GB
Initial Desktop Memory, 500 GB HDD, 15" Monitor, KB,
1Purchase Mouse, 20,000 300 Capex 6,000,000 0 0 0 0 6,000,000
2OS License Windows 7 Business 6,000 300 Capex 1,800,000 0 0 0 0 1,800,000
MS Office 2010 - use of 4 hrs per desktop
3Office per day 32,000 300 Capex 9,600,000 0 0 0 0 9,600,000
Trend Micro / Symantec Enterprise Edition
4Antivirus with Centralized Monitoring 1,000 300 Opex 300,000 300,000 300,000 300,000 300,000 1,500,000
150 Watts @ 8 Hrs per day = 1200 WHr =
5Power 1.2kWH @ 6 Rs per Unit 7 9,000 Opex 64,800 64,800 64,800 64,800 64,800 324,000
2 TR for 20 Desktops @ Rs.3000 Electricity
6Cooling Bill for 8 Hrs 3,000 15 Opex 540,000 540,000 540,000 540,000 540,000 2,700,000
Rental Space - 500 SFT for 10 Desktops with
7Space 10000 Rs per 500 SFT per month 1000 30 Opex 30,000 30,000 30,000 30,000 30,000 150,000
HW & SW AMC &
8FMS 10% per Capex cost per year 2,000 300 Opex 600,000 600,000 600,000 600,000 600,000 3,000,000
Security Controls -
9AD, Policies Not Available -
18,934,800 1,534,800 1,534,800 1,534,800 1,534,800 25,074,000
13. Support
24 x 7 NOC with L1 & L2 & L3 in General Shift
ITIL / ITSM based Service Management
Service Desk & Tool based Call Logging
Incident, Problem, Change, Release, Configuration management
SLA based monitoring
Automatic Alerts, event management through Tool
Incident based tie ups with OEM for L4 and above calls
14. Support
Tier-III Service Model
Level 3
• Senior technical staff, SMEs
• Advance support and new infrastructure/service
development
Level 2
• NOC staff
• Daily/weekly operations checks
• First level resolution for core infrastructure incidents
Level 1
• Help Desk for call logging
• End user incidents and requests
• New user setups, user coordination
15. Thanks
Contact : Satyaveer Pal
Manager Marketing and PreSales
Satyaveer.pal@saicare.com I satyaveer.pal@gmail.com
Mob : +91.968.767.0237, +91.966.247.7740
www.sisdatacentre.com