SlideShare una empresa de Scribd logo
1 de 15
DaaS
Desktop as a Service
Challenges
Huge desktop infrastructure Expenditure

   High security issue in my desktop environment

     Up-gradation of old Desktop hardware

     New Software compatible issues

     IT engineer Salaries / agencies AMC Expenses

   Capex investment & ROI is not sufficient.

Unable access desktop when you are out of office
DaaS Solution
                             Architecture
       User End Device




    Remote Desktop Web                                                 Active Directory Server
    Access Server in Load
          Balancer




      Remote Desktop
     Connection Broker
      Server in Failover
           Cluster




                                                                         Session Host Server in
                                                                             LoadBalancer




                            Propritery & Confidential Information of
3
                                           BSNL SIS
Solution - DaaS
•   DaaS is a virtual desktop solution without physical Hardware
•   You will get a URL / IP Address with Userid Password to login.
•   A standard/low profile hardware device or even thin client to connect to IDC either
    through Public Network – Internet or Private Network – MPLS, Leased Line etc.
•   Once you login you will get complete separate dedicated desktop environment.
•   Your profile is created and saved at safe & Secured IDC
•   You can access the same from any where in the world from any computer
    connected on Internet (in case of Public Cloud)
•   This service is secured as communication between local client and Virtual Desktop
    is encrypted.
•   You can access all of your local devices like Printers, Pen Drives, Peripherals like
    what you access in Physical desktop.
•   You are charged on pay per use every month or every quarter or whatever
    frequency you decide
Realize Desktop Experience
                 Look as a


Windows 7 Enterprise   Windows Server 2008 R2
Features
10 + year old proven technology


Rich Desktop Experience of Microsoft RDS


Applicable for SMB & Enterprise Scenarios


No data loss or recovery issue : Data stored in cloud

No need to worry about hardware upgrade, user will get
best in class hardware experience

No downtime
Benefits



                                               Complete
   Minimal        Very Quick                                Rich Desktop
                                               Scalable &                     Multiple
    initial      Provisioning    SLA based                  Experience of
                                                 service                    offerings to
 investment      of Desktops    commitment                    Microsoft
                                              Management                    choose from
(near to zero)      in IDC                                      RDS
                                                  by SIS
Conventional Desktop vs DaaS
 Conventional Desktop                                            DaaS
Requires good space, power                                     Runs on thin clients, laptops, savings on space, power

Requires AMC & FMS                                             No Worries about AMC, FMS

Requires OS & Application Licenses                             OS, Application Licenses can be pay per use

Hardly 10% of CPU utilization                                  High Power CPU shared across multiple VDIs

Loose Control on Data Leakage & loss                           Good Control over Data Leakage & protection against data loss

More Information Security threats like Viruses                 Better controlled by default centralized threat management

Less Environment Friendly – due to noise, heat, scrap issues   More green – environment friendly

High TCO                                                       Least TCO
How to Access..?
                                                                                               All DaaS
                                                                                           Infrastructure is
                                        There is a secured                                     managed
                                      connectivity with https                              through Captive
                                         connection with                                      NOC of SIS
               He needs Internet       Firewall in between
               connectivity to his
                   end point




    End user needs to have
       any End point –
          Laptop, Old
         Desktop, Thin
      Client, Cyber Café
    enabled with Microsoft
        Terminal Client




                                                        Only Screen is
                                                  transferred over Network        This is Microsoft’s
                                                    and data is stored only        Virtual Desktop
                                                           on VDI.              Infrastructure in IDC.

                                     Propritery & Confidential Information of
9
                                                    BSNL SIS
DID – Defence in Design
                       Security Parameters
                                   Physical Security              Vigilant Security
 ITIL & ISO 27001                                                 Operations Center (SOC)
 aligned Processes               Perimeter Security


                                  Network Security                     Monitoring & Analysis


                                End Point Protection
Risk
Management
                                                                            Vulnerability
                                       DATA
                                                                            Management




Compliance &                                                           Security Analysts &
Governance                                                             Experts




                           Version 1.0 Release Date: 18/12/2012
DID – Defense in Design
Physical Security                                      End Point Protection
      • 24x7 Security Guards                                 • Anti-malware : Antivirus/Anti-
      • CCTV Monitoring                                          spyware
      • Biometric (2 factor) Access Control                  • Host Based Firewall
      • Multilevel Authentication Process                    • Patch Management
      • Visitor Management with Escorting
      • Tier III Data Center
      • No Single Point of Failure
Perimeter Security                                     Network Protection
     • Cisco Adaptive Security Appliance Firewall           • Separate VLAN for Customer
     • Cisco Network Intrusion Prevention System            • Secured VPN Connectivity
            • Signature Based : To Mitigate Known           • 128-bit SSL Encryption over the
                Attacks                                         Internet for Server Management
            • Anomaly Based: To Mitigate Zero Day           • Vulnerability Management &
                Attacks                                         Hardening as per the security best
     • Continuous monitoring of the Alerts & Logs               practices (VAPT)
         by Security Analysts in SOC Center

Compliance & Governance                                Security Operations Centre (SOC)
     Risk Management Process                                 Continues Monitoring of the Alerts
     Compliance to ISO 27001Standard & ITIL                  Event & Incident Management
     Processes                                               Event Classification & Notification
     Regular Vulnerability Assessments                       Event Analysis with Correlation
                                                             Incident Identification
                                                             Incident Response
                                  Version 1.0 Release Date: 18/12/2012
TCO of Conventional Desktop
               Nos. of Desktops Required                                        300                   Date 01.01.2013
                                                                    Per Unit              Type of
Sr Expense Item         Assumption                                  Cost       Multiplier Cost      Cost Y1     Cost Y2   Cost Y3   Cost Y4   Cost Y5   TCO
                        Config - i5 Dual Core@ 3 GHZ, 2 GB
  Initial Desktop       Memory, 500 GB HDD, 15" Monitor, KB,
 1Purchase              Mouse,                                      20,000     300        Capex     6,000,000       0         0         0         0     6,000,000

 2OS License            Windows 7 Business                          6,000      300        Capex     1,800,000       0         0         0         0     1,800,000
                        MS Office 2010 - use of 4 hrs per desktop
 3Office                per day                                     32,000     300        Capex     9,600,000       0         0         0         0     9,600,000

                        Trend Micro / Symantec Enterprise Edition
 4Antivirus             with Centralized Monitoring               1,000        300        Opex      300,000     300,000   300,000   300,000   300,000   1,500,000

                        150 Watts @ 8 Hrs per day = 1200 WHr =
 5Power                 1.2kWH @ 6 Rs per Unit                      7                9,000 Opex     64,800      64,800    64,800    64,800    64,800    324,000

                        2 TR for 20 Desktops @ Rs.3000 Electricity
 6Cooling               Bill for 8 Hrs                             3,000       15         Opex      540,000     540,000   540,000   540,000   540,000   2,700,000

                        Rental Space - 500 SFT for 10 Desktops with
 7Space                 10000 Rs per 500 SFT per month              1000       30         Opex      30,000      30,000    30,000    30,000    30,000    150,000
  HW & SW AMC &
 8FMS                   10% per Capex cost per year                 2,000      300        Opex      600,000     600,000   600,000   600,000   600,000   3,000,000

  Security Controls -
 9AD, Policies          Not Available                                                                                                                   -

                                                                                                    18,934,800 1,534,800 1,534,800 1,534,800 1,534,800 25,074,000
Support
                 24 x 7 NOC with L1 & L2 & L3 in General Shift

                       ITIL / ITSM based Service Management

                       Service Desk & Tool based Call Logging

Incident, Problem, Change, Release, Configuration management

                                        SLA based monitoring

            Automatic Alerts, event management through Tool

        Incident based tie ups with OEM for L4 and above calls
Support
    Tier-III Service Model


Level 3
          • Senior technical staff, SMEs
          • Advance support and new infrastructure/service
            development




Level 2
          • NOC staff
          • Daily/weekly operations checks
          • First level resolution for core infrastructure incidents




Level 1
          • Help Desk for call logging
          • End user incidents and requests
          • New user setups, user coordination
Thanks

                                Contact : Satyaveer Pal
                       Manager Marketing and PreSales
Satyaveer.pal@saicare.com I satyaveer.pal@gmail.com
             Mob : +91.968.767.0237, +91.966.247.7740
                               www.sisdatacentre.com

Más contenido relacionado

La actualidad más candente

Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data Governance
DATAVERSITY
 
MDM Strategy & Roadmap
MDM Strategy & RoadmapMDM Strategy & Roadmap
MDM Strategy & Roadmap
victorlbrown
 
Introduction to SQL Server Security
Introduction to SQL Server SecurityIntroduction to SQL Server Security
Introduction to SQL Server Security
Jason Strate
 

La actualidad más candente (20)

Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Data Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data AnonymizationData Security & Data Privacy: Data Anonymization
Data Security & Data Privacy: Data Anonymization
 
Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data Governance
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
MDM for product data with Talend
MDM for product data with Talend MDM for product data with Talend
MDM for product data with Talend
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
CobiT Foundation Free Training
CobiT Foundation Free TrainingCobiT Foundation Free Training
CobiT Foundation Free Training
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
 
MDM Strategy & Roadmap
MDM Strategy & RoadmapMDM Strategy & Roadmap
MDM Strategy & Roadmap
 
Gartner: Master Data Management Functionality
Gartner: Master Data Management FunctionalityGartner: Master Data Management Functionality
Gartner: Master Data Management Functionality
 
Clover Infotech Corporate PPT
Clover Infotech Corporate PPTClover Infotech Corporate PPT
Clover Infotech Corporate PPT
 
Database Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention PeriodsDatabase Archiving - Managing Data for Long Retention Periods
Database Archiving - Managing Data for Long Retention Periods
 
Introduction to SQL Server Security
Introduction to SQL Server SecurityIntroduction to SQL Server Security
Introduction to SQL Server Security
 
Data Warehouse Design and Best Practices
Data Warehouse Design and Best PracticesData Warehouse Design and Best Practices
Data Warehouse Design and Best Practices
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Customer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer ExperiencesCustomer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer Experiences
 
ADV Slides: Strategies for Fitting a Data Lake into a Modern Data Architecture
ADV Slides: Strategies for Fitting a Data Lake into a Modern Data ArchitectureADV Slides: Strategies for Fitting a Data Lake into a Modern Data Architecture
ADV Slides: Strategies for Fitting a Data Lake into a Modern Data Architecture
 

Destacado

Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
Gokulan Subramani
 
Logistics,warehouse,mrp,drp
Logistics,warehouse,mrp,drpLogistics,warehouse,mrp,drp
Logistics,warehouse,mrp,drp
Vipul Patil
 

Destacado (10)

Virtual Desktops in Educational Environments
Virtual Desktops in Educational EnvironmentsVirtual Desktops in Educational Environments
Virtual Desktops in Educational Environments
 
Data Center Infrastructure Optimized for Desktop Virtualization
Data Center Infrastructure Optimized for Desktop VirtualizationData Center Infrastructure Optimized for Desktop Virtualization
Data Center Infrastructure Optimized for Desktop Virtualization
 
Hardware VDI vs. Software VDI
Hardware VDI vs. Software VDIHardware VDI vs. Software VDI
Hardware VDI vs. Software VDI
 
The Evolution of the Datacenter
The Evolution of the DatacenterThe Evolution of the Datacenter
The Evolution of the Datacenter
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Logistics,warehouse,mrp,drp
Logistics,warehouse,mrp,drpLogistics,warehouse,mrp,drp
Logistics,warehouse,mrp,drp
 
VDI Design Guide
VDI Design GuideVDI Design Guide
VDI Design Guide
 
10 warehouse management
10 warehouse management10 warehouse management
10 warehouse management
 
Génie Logiciels : Introduction aux architectures
Génie Logiciels : Introduction aux architecturesGénie Logiciels : Introduction aux architectures
Génie Logiciels : Introduction aux architectures
 
L Architecture Logicielle En Pratique
L Architecture Logicielle En PratiqueL Architecture Logicielle En Pratique
L Architecture Logicielle En Pratique
 

Similar a Desktop as a Service DaaS in India by BSNL SIS

Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
Digicomp Academy AG
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
247 Invest
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
eblake
 

Similar a Desktop as a Service DaaS in India by BSNL SIS (20)

Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Virtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure OverviewVirtual Desktop Infrastructure Overview
Virtual Desktop Infrastructure Overview
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
New Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the CloudNew Solutions for Security and Compliance in the Cloud
New Solutions for Security and Compliance in the Cloud
 
IBM BP Kickoff 2013 VDI Solutions
IBM BP Kickoff 2013    VDI SolutionsIBM BP Kickoff 2013    VDI Solutions
IBM BP Kickoff 2013 VDI Solutions
 
Desktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of ITDesktop Virtualization and the Consumerization of IT
Desktop Virtualization and the Consumerization of IT
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend MicroVmware Seminar Security & Compliance for the cloud with Trend Micro
Vmware Seminar Security & Compliance for the cloud with Trend Micro
 
Vss Security And Compliance For The Cloud
Vss Security And Compliance For The CloudVss Security And Compliance For The Cloud
Vss Security And Compliance For The Cloud
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)Gateway RIMS (Remote Infrastructure Management Services)
Gateway RIMS (Remote Infrastructure Management Services)
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 

Más de SATYAVEER PAL (6)

Cloud storage services
Cloud storage servicesCloud storage services
Cloud storage services
 
Cloud computing Services in India with Tier 3 certification
Cloud computing Services in India with Tier 3 certificationCloud computing Services in India with Tier 3 certification
Cloud computing Services in India with Tier 3 certification
 
Project Management as a Service
Project Management as a ServiceProject Management as a Service
Project Management as a Service
 
Cloud infrastructure, IaaS
Cloud infrastructure,  IaaSCloud infrastructure,  IaaS
Cloud infrastructure, IaaS
 
Microsoft Exchange Service on Cloud
Microsoft Exchange Service on CloudMicrosoft Exchange Service on Cloud
Microsoft Exchange Service on Cloud
 
BSNL-SIS Data Center Services
BSNL-SIS Data Center ServicesBSNL-SIS Data Center Services
BSNL-SIS Data Center Services
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Desktop as a Service DaaS in India by BSNL SIS

  • 2. Challenges Huge desktop infrastructure Expenditure High security issue in my desktop environment Up-gradation of old Desktop hardware New Software compatible issues IT engineer Salaries / agencies AMC Expenses Capex investment & ROI is not sufficient. Unable access desktop when you are out of office
  • 3. DaaS Solution Architecture User End Device Remote Desktop Web Active Directory Server Access Server in Load Balancer Remote Desktop Connection Broker Server in Failover Cluster Session Host Server in LoadBalancer Propritery & Confidential Information of 3 BSNL SIS
  • 4. Solution - DaaS • DaaS is a virtual desktop solution without physical Hardware • You will get a URL / IP Address with Userid Password to login. • A standard/low profile hardware device or even thin client to connect to IDC either through Public Network – Internet or Private Network – MPLS, Leased Line etc. • Once you login you will get complete separate dedicated desktop environment. • Your profile is created and saved at safe & Secured IDC • You can access the same from any where in the world from any computer connected on Internet (in case of Public Cloud) • This service is secured as communication between local client and Virtual Desktop is encrypted. • You can access all of your local devices like Printers, Pen Drives, Peripherals like what you access in Physical desktop. • You are charged on pay per use every month or every quarter or whatever frequency you decide
  • 5. Realize Desktop Experience Look as a Windows 7 Enterprise Windows Server 2008 R2
  • 6. Features 10 + year old proven technology Rich Desktop Experience of Microsoft RDS Applicable for SMB & Enterprise Scenarios No data loss or recovery issue : Data stored in cloud No need to worry about hardware upgrade, user will get best in class hardware experience No downtime
  • 7. Benefits Complete Minimal Very Quick Rich Desktop Scalable & Multiple initial Provisioning SLA based Experience of service offerings to investment of Desktops commitment Microsoft Management choose from (near to zero) in IDC RDS by SIS
  • 8. Conventional Desktop vs DaaS Conventional Desktop DaaS Requires good space, power Runs on thin clients, laptops, savings on space, power Requires AMC & FMS No Worries about AMC, FMS Requires OS & Application Licenses OS, Application Licenses can be pay per use Hardly 10% of CPU utilization High Power CPU shared across multiple VDIs Loose Control on Data Leakage & loss Good Control over Data Leakage & protection against data loss More Information Security threats like Viruses Better controlled by default centralized threat management Less Environment Friendly – due to noise, heat, scrap issues More green – environment friendly High TCO Least TCO
  • 9. How to Access..? All DaaS Infrastructure is There is a secured managed connectivity with https through Captive connection with NOC of SIS He needs Internet Firewall in between connectivity to his end point End user needs to have any End point – Laptop, Old Desktop, Thin Client, Cyber Café enabled with Microsoft Terminal Client Only Screen is transferred over Network This is Microsoft’s and data is stored only Virtual Desktop on VDI. Infrastructure in IDC. Propritery & Confidential Information of 9 BSNL SIS
  • 10. DID – Defence in Design Security Parameters Physical Security Vigilant Security ITIL & ISO 27001 Operations Center (SOC) aligned Processes Perimeter Security Network Security Monitoring & Analysis End Point Protection Risk Management Vulnerability DATA Management Compliance & Security Analysts & Governance Experts Version 1.0 Release Date: 18/12/2012
  • 11. DID – Defense in Design Physical Security End Point Protection • 24x7 Security Guards • Anti-malware : Antivirus/Anti- • CCTV Monitoring spyware • Biometric (2 factor) Access Control • Host Based Firewall • Multilevel Authentication Process • Patch Management • Visitor Management with Escorting • Tier III Data Center • No Single Point of Failure Perimeter Security Network Protection • Cisco Adaptive Security Appliance Firewall • Separate VLAN for Customer • Cisco Network Intrusion Prevention System • Secured VPN Connectivity • Signature Based : To Mitigate Known • 128-bit SSL Encryption over the Attacks Internet for Server Management • Anomaly Based: To Mitigate Zero Day • Vulnerability Management & Attacks Hardening as per the security best • Continuous monitoring of the Alerts & Logs practices (VAPT) by Security Analysts in SOC Center Compliance & Governance Security Operations Centre (SOC) Risk Management Process Continues Monitoring of the Alerts Compliance to ISO 27001Standard & ITIL Event & Incident Management Processes Event Classification & Notification Regular Vulnerability Assessments Event Analysis with Correlation Incident Identification Incident Response Version 1.0 Release Date: 18/12/2012
  • 12. TCO of Conventional Desktop Nos. of Desktops Required 300 Date 01.01.2013 Per Unit Type of Sr Expense Item Assumption Cost Multiplier Cost Cost Y1 Cost Y2 Cost Y3 Cost Y4 Cost Y5 TCO Config - i5 Dual Core@ 3 GHZ, 2 GB Initial Desktop Memory, 500 GB HDD, 15" Monitor, KB, 1Purchase Mouse, 20,000 300 Capex 6,000,000 0 0 0 0 6,000,000 2OS License Windows 7 Business 6,000 300 Capex 1,800,000 0 0 0 0 1,800,000 MS Office 2010 - use of 4 hrs per desktop 3Office per day 32,000 300 Capex 9,600,000 0 0 0 0 9,600,000 Trend Micro / Symantec Enterprise Edition 4Antivirus with Centralized Monitoring 1,000 300 Opex 300,000 300,000 300,000 300,000 300,000 1,500,000 150 Watts @ 8 Hrs per day = 1200 WHr = 5Power 1.2kWH @ 6 Rs per Unit 7 9,000 Opex 64,800 64,800 64,800 64,800 64,800 324,000 2 TR for 20 Desktops @ Rs.3000 Electricity 6Cooling Bill for 8 Hrs 3,000 15 Opex 540,000 540,000 540,000 540,000 540,000 2,700,000 Rental Space - 500 SFT for 10 Desktops with 7Space 10000 Rs per 500 SFT per month 1000 30 Opex 30,000 30,000 30,000 30,000 30,000 150,000 HW & SW AMC & 8FMS 10% per Capex cost per year 2,000 300 Opex 600,000 600,000 600,000 600,000 600,000 3,000,000 Security Controls - 9AD, Policies Not Available - 18,934,800 1,534,800 1,534,800 1,534,800 1,534,800 25,074,000
  • 13. Support 24 x 7 NOC with L1 & L2 & L3 in General Shift ITIL / ITSM based Service Management Service Desk & Tool based Call Logging Incident, Problem, Change, Release, Configuration management SLA based monitoring Automatic Alerts, event management through Tool Incident based tie ups with OEM for L4 and above calls
  • 14. Support Tier-III Service Model Level 3 • Senior technical staff, SMEs • Advance support and new infrastructure/service development Level 2 • NOC staff • Daily/weekly operations checks • First level resolution for core infrastructure incidents Level 1 • Help Desk for call logging • End user incidents and requests • New user setups, user coordination
  • 15. Thanks Contact : Satyaveer Pal Manager Marketing and PreSales Satyaveer.pal@saicare.com I satyaveer.pal@gmail.com Mob : +91.968.767.0237, +91.966.247.7740 www.sisdatacentre.com