i mpact van byod en m obiele devices op uw huidige desktop en client architectuur

31
IMPACT VAN BYOD EN MOBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Upload: angelique-holby

Post on 29-Mar-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

IMPACT VAN BYOD EN MOBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT

ARCHITECTUUR

Page 2: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

#Name: Filip Roelandt #Function: Technology Expert#Email: [email protected] #Twitter: filip_roelandt #Mobile: +32 477 28 84 65

Company: www.realdolmen.com

Page 3: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

PEOPLE & PROCESSES TRACK

WHY MOBILITY ? WHY BYOD?

Page 4: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

PEOPLE & PROCESSES TRACK

WHAT IS MOBILITY ?

A device that moves between Different geographical locations Between different networks

A person who moves between Different geographical locations Different networks Different communication devices Different applications

Page 5: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

PEOPLE & PROCESSES TRACK

WHAT IS MOBILITY ?

But even within your company walls

A user moving to a meetingroom A doctor visits his patients

in a hospital

Page 6: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

LOOK FROM USER VIEW

I own a device Just want my application

Device

Connection

Application

… SIMPLE

Page 7: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Does not stop with one user Not always “plug and play” Management / hosting Security

Security

Backend Infrastructure

LOOK FROM ADMINISTRATION VIEW

Device

Connection

Application

- HOW TO TACKLE

Page 8: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Device

DEVICE - CHALLENGES

Page 9: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Today smartphone Tomorrow computer

DEVICE - CHALLENGES

Page 10: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

“show me”

“empower me”

“alert me”

snack dine create

Page 11: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Laptops - Workstations Management softwares Microsoft SCCM – SCOM Symantec Endpoint protection …

Smartphones – Tablets Require New management types Mobile device management

DEVICE - MANAGEMENT

Page 12: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

WHAT IS MOBILE DEVICE MANAGEMENT ?

WindowsMobile

Database

Files

Directory

Applications

Certificate Services

Messaging

Enterprise Environment

Symbian

Android

webOS

BlackBerry

iPhone

iPad

MdM

VPN

Secure email, calendar and contacts

Push VPN and WiFi Settings and Certificates

Device restrictions and policies

Remote full and selective wipe

Self provisioning

Page 13: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Device

Determine the varying levels of service and support options for the segmented workforce

Reserve the right to manage all mobile devices with access to corporate resources like PCs.

Require users to back up their own personal data

DEVICE - ADVICE

Page 14: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Connection

CONNECTION

Page 15: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Mobility starts within your company walls By default Everybody on guest network

Allow access to internet (limited) Allow access to all external company services

(webmail – citrix)

Proactively monitor ongoing voice data usage Expenses – international Roaming bills

Determine a tiered reimbursement policy for voice and data services costs

CONNECTION - ADVICE

Page 16: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Application

APPLICATION

Page 17: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

How to bring your application to your mobile device ?

Client Different apps on different environments Custom development Processing on the client

Central Terminal server Virtual desktops Processing on backend

Application types can determine device

APPLICATION - LOCATION

Page 18: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Not always possible Custom development can be required Heterogeneous environments Licensing model User interface is different on Android, IOS, Windows Available bandwidth Authentication requirements

APPLICATION – CLIENT SERVER

Execute Application on your mobile device

Connect

Access Data on central infrastructure

Page 19: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Published applications / shared desktops is an architecture where the application executes 100% on the

server, and the application’s user interface is accessed via a mobile device.

APPLICATION – CENTRAL

ConnectExecute application on

central infrastructureAccess data

View Application on your mobile device

Keyboard / mousevideo

Page 20: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Another way… VDI – Virtual Desktop Infrastructure

APPLICATION – CENTRAL

Hardware

Win 7Hypervisor

Windows Server

CPS/TS

Apps

Hardware

user

Dedicated Virtual Desktop

user user

Apps

Win 7 Win 7

Apps

user user

Apps

user

TotalIsolation

Session isolated at “application” level (shared OS) Server OS desktop (e.g. Win2k8)

Dedicated OS to user User, OS and application are isolated Client OS desktop (e.g. Windows 7)

Shared Desktop

Page 21: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Published applications / shared desktops

APPLICATION – CENTRAL

Strong on security Wide device support (printer, PDA, …) Very good TCO Global accessibility.

Real Desktop Operating System• Better application compatibility

(no modifications necessary)• No registry or DLL restrictions• Existing desktops can be imported

Full Isolation: each Virtual Desktop runs separately

Virtual Desktop Infrastructure

Page 22: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Published applications / shared desktops / VDI

APPLICATION – CENTRAL

Limit user control or personalization Locked down - one user impacts hundreds No linux support Challenges

• Check application compatibility – shared / VDI• Some apps might have problems (i.e. multimedia, web apps)• Printing and printer driver management• client device connectivity (i.e. USB, COM ports)• User overhead like IE, AntiVirus, Windows User Profiles, …

Page 23: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Determine how users will be provisioned with enterprise-class applications

Custom development or Standard applications

Centralize applications and data

Choose shared desktops first

For Users that don’t fit this environment

Choose virtualized desktops (VDI)

APPLICATIONS - ADVICE

Page 24: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Backend Infrastructure

BACKEND

Page 25: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Private cloud Public cloud

Bpos Office 365 …

Considerations : data location Bridges between clouds

Vmware Vcloud Citrix bridge software …

BACKEND

Page 26: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Hybrid Cloud

PublicCloud

• On premise• High fixed cost• Full control• Known security

• On/off premise• Low utility cost• Self-service• Fully elastic• Trusted security• Corporate control

• Off premise• Low utility cost• Self-service• Fully elastic

TraditionalDatacenter

Hybrid Cloud

TraditionalDatacenter Public

Cloud

Page 27: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Determine Cloud main Entry point and backup entry

Check your Data location

Authentication between datacenters

Know what your SLA’s are covering

BACKEND - ADVICE

Page 28: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Security

SECURITY

Page 29: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

Consider disabling features and user activities in heavily regulated environments

Extend acceptable use policies to all current and future mobile devices.

Protect the integrity and privacy of corporate data by isolating it from personal data.

Enforce strong security policies that prevent data security breaches

SECURITY - ADVICE

Page 30: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

The illiterate of the 21st century will not be those who cannot read and write, but those who cannot learn, unlearn, and relearn.(Alvin Toffler)

PREPARE YOUR ENVIRONMENT FOR THE FUTURE

Page 31: I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR

For more information:visit our website WWW.REALDOLMEN.COM

Follow us on:

Or scan this QR code with your Smartphone to immediately go to the websiteTHANK YOU