Presentation is loading. Please wait.

Presentation is loading. Please wait.

How to develop a successful Desktop Strategy (Thin, Slate, Thick, VDI... V6) Ritu Patney Optimized Desktop Specialist Microsoft Corporation.

Similar presentations


Presentation on theme: "How to develop a successful Desktop Strategy (Thin, Slate, Thick, VDI... V6) Ritu Patney Optimized Desktop Specialist Microsoft Corporation."— Presentation transcript:

1 How to develop a successful Desktop Strategy (Thin, Slate, Thick, VDI... V6) Ritu Patney Optimized Desktop Specialist Microsoft Corporation

2 Focus is on the latest generation of devices We have location based workers on almost every industry Office workers who are still dependent on 1 or 2 screens The evolution of the desktop Task Worker CashierFactory lineCall center Deskless Worker Power User Anywhere - Anytime Office Worker Today’s Office Explosion of devices Multiple of devices Physical Location1 Fixed Screen1 Mobile ScreenN Mobile ScreensUbiquity / Synchronicity Multi-screen

3 PerformanceIT ControlUser Satisfaction Phones Slates New form factors So in this new reality…How are you going to enable, control, secure, manage ? NEW PC ~4 Years ~7 Years ~1 Years ~3 Years Current Inventory Current List of user complains Slow Environment Application failure Complicated to manage Complicated to mantain Hard to update Etc

4 What used to be a clear future…

5 For the last 20 years the solution has been… Jump to hardware selection Explosion of devices Multiple of devices Tower Desktop All in One Small Form Factor Netbook Laptop Tablet Slate Thin Client Embedd ed Kiosk Phone

6 We have moved form a Desktop Strategy to a Digital Workspace Strategy

7 Lets look at some analyst research 2009 Worldwide Shipments Thin Clients – 3 Million units (1% WW) PCs – 301 million units Source : Dataquest Insight: Global Thin-Client Terminal Market Disappointing, but It's Poised to Turn Positive, 17 June 2009, ID:G00168475 1999 Worldwide Shipments Thin Clients – 700,000 units (0.6% WW) PCs - 113 million units Source : IDC 1999 Enterprise Thin Client Year in Review - Jan 2000 Update IDC, 9/7/01 After 10 years… Thin client remain 1% of the market Even after 2 years of VDI existence There is no cost benefit related to thin client There is no cost benefit related to thin client Analyst and independent TCO calculations show the differential between a a well managed “fat client” and a thin client to be negligible. Analyst and independent TCO calculations show the differential between a a well managed “fat client” and a thin client to be negligible. Based on : Dataquest Insight: “The Emergence of Thin-Client-Based Desktop Support Services in Europe”, Rob Addy, 3 September 2009, ID Number: G00170696 VDI provides an average of 10% TCO benefit vs Unmanaged Desktop, but only 2% on a managed environment. Based on Gartner: “Total Cost of Ownership Comparison of PCs with Hosted Virtual Desktops”, Mark A. Margevicius, Michael Silvewr, Federica Troni, Publication Date: 4 August 2008, ID Number: G00155498 Virtualized applications can reduce the cost of testing, packaging and supporting an application by 60%, and they reduced overall TCO of a desktop environment by 5% to 7% Source Gartner: “TCO of Traditional Software Distribution vs. Application Virtualization”, Michael A. Silver, Terrence Cosgrove, Mark A. Margevicius, Brian Gammage. Publication Date: 16 April 2008 ID Number: G00155897

8 PDA, Pocket PC, Phone Thin Client or Old PC Managed Smart Client VDI Application Architecture Drive Device Options Where does it Run / Render? VDI Remote Desktop Services Local Private Cloud Public Cloud Public Internet Offline Where does it Run / Render? VDI Remote Desktop Services Local Private Cloud Public Cloud Public Internet Offline What format is it Presented in? Mobile Web Rich Emulation What format is it Presented in? Mobile Web Rich Emulation Is Development Stack supported?.Net C#, C++ Java Ajax Silverlight Flash Is Development Stack supported?.Net C#, C++ Java Ajax Silverlight Flash Is the Application Stack supported? Office Unified Communications Security Utilities (Doc Reader, Compression) User Profiling Custom Business Legacy Emulation Is the Application Stack supported? Office Unified Communications Security Utilities (Doc Reader, Compression) User Profiling Custom Business Legacy Emulation Diskless Smart Client PresentationPresentation Dev. Stack App. Stack RenderingRendering App3App3 App4App4 PresentationPresentation Dev. Stack App. Stack RenderingRendering App1App1 App2App2 App3App3 App4App4 PresentationPresentation Dev. Stack App. Stack RenderingRendering App2App2 App3App3 PresentationPresentation Dev. Stack App. Stack RenderingRendering PresentationPresentation Dev. Stack App. Stack RenderingRendering App3App3 App4App4 App3App3 App4App4

9 High Med Low Each architecture requires different expertise ApplicationCertificationTesting Image Mgmt Patch Mgmt Inventory Mgmt OS or App Deployment VDI Remote Desktop Services Thin Client, Diskless Client or Old PC Managed Smart Client Mobile Device Tablet, PDA, Pocket PC, Phone Security Anti – Malware Anti-Spam Directory Access Roles / Profiles / Personas Monitoring PerimeterSecurity Remote Support NetworkBandwidthMgmt StorageManagement Lifecycle 3-8yrs avg Lifecycle 3-8yrs avg Lifecycle 3-8yrs avg Lifecycle 2-3yrs avg

10 So what do analyst recommend… Gartner: “Top 10 Issues With Hosted Virtual Desktops”,, Mark A. Margevicius, Publication Date: 10 June 2010 ID Number: G00201182 Gartner:” Organizational and Staffing Considerations When Planning for Hosted Virtual Desktops”, Mark A. Margevicius, Terrence Cosgrove. Publication Date: 15 June 2010, ID: G00201376 Gartner: “Best Use Scenarios for Hosted Virtual Desktops”, Mark A. Margevicius. 24 February 2009,ID:G00165252 Gartner: “Organizations That Unlock PCs Unnecessarily Will Face High Costs“, Michael A. Silver, Ronni J. Colville, Publication Date: 19 December 2008 ID Number: G00161951 Gartner: “How to Reduce Your PC TCO 30% in 2011 “, Federica Troni, Brian Gammage, Michael A. Silver, Publication Date: 20 March 2009 ID Number: G00166195 “Choosing From 10 Client Computing Architectural Options”, Brian Gammage, Mark A. Margevicius. 10 December 2007, Publication Date: 27 February 2009 ID Number: G00164331 Gartner: “Market Trends: x86 Virtualization Market Driven by Consolidation, Promise of Cost Reduction, and Management Advantages”, 17 November 2009, ID:G00172438 ANY ARCHITECTURE involves moving all aspects of managing a desktop (HW,SW, Management, Configuration, Processes, etc) ANY ARCHITECTURE will not cure the today’s poor desktop management, it makes it even harder ANY ARCHITECTURE requires more tools and different skills than traditional desktop management Existing PC Support structures are not appropriate for other architectures There are still some heavy entry costs to consider for some of these architectures… Infrastructure dependencies, Licensing, Legal, Operational workload shift, Manageability The biggest factor to reduce TCO is based on how managed are your profiles, unlocked users could cost up to 36% more than appropriately locked down one’s. VDI / Thin Client is not appropriate for all user, applications or deployment scenarios, segment and use accordingly

11 Thin Client Choices Thin Client Form Factors Zero Client A terminal with no local storage, operating system or processing Extremely low device TCO No OS to manage on device Highest reliability – no moving parts Has all the benefits of traditional thin clients Requires additional processing on server to translate I/O calls Cannot run browser based applications or be upgraded Requires VDA License, which includes SA benefits Windows Fundamentals for Legacy PCs (WinFLP) A repurposed PC running a smaller footprint locked down version of Windows, making it behave like a Thin Client No upfront costs - Extend existing investments by repurposing PCs All the advantages of traditional thin clients Enterprise-grade manageability and security Large PC inventory capable of running Windows 7 Reduced CapEx budgets for device purchases Strategy is not locked to Thin Client – flexibility to revert back to PCs WinFLP is a benefit of SA / VDA Benefits Considerations Definition Traditional Thin Client A device with a reduced hardware and software footprint, intended to connect to a remote desktop Smaller attack surface than PC Fewer breakable parts than PC Lower energy costs than PC Excellent choice for pure server based desktop scenarios Thin Clients need security and management updates Needs to be always connected to network Requires VDA License, which includes SA benefits Licensing

12 When Is Thin Client an Option? If You Have Server- Based Desktops (SBD) VDI / Sessions Scenario Recommended Access Device Windows PC Hybrid SBD Scenarios Local desktop + hosted desktop Local desktop + hosted applications Unmanaged Device as Thin Client Unmanaged devices Tablets, iPads, smartphones, employee owned PCs Device choice precedes SBD choice OR Thin ClientWindows PC Pure SBD Scenarios No local desktop functionality required No local applications or data

13 Netbook Embedded Tablets Slates Phones Level of access is determined by managability Unmanaged BIOS Access Admin Access Root Kits Key Loggers Spyware Basic Profiles Remote Wipe Password Policies Domain Joined Enterprise OS Local User Group Policy Data Sync Offline Data Synchronization Remote Support Corp-Managed Deployment Patching DRM Deployment IPsec Deployment HW/SW Inventory Smart Card VPN DirectAccess HD Encryption USB Policies The levels of Trust define the access level LaptopsDesktops

14 Please answer: How well do you manage ? The biggest factor to reduce TCO is based on how managed are your profiles, unlocked users could cost up to 36% more than appropriately locked down one’s. Gartner: “Organizations That Unlock PCs Unnecessarily Will Face High Costs“, Michael A. Silver, Ronni J. Colville, Publication Date: 19 December 2008 ID Number: G00161951 The biggest factor to reduce TCO is based on how managed are your profiles, unlocked users could cost up to 36% more than appropriately locked down one’s. Gartner: “Organizations That Unlock PCs Unnecessarily Will Face High Costs“, Michael A. Silver, Ronni J. Colville, Publication Date: 19 December 2008 ID Number: G00161951

15 What’s needed to build a well managed desktop environment… Group Policy User Configuration Software Settings Windows Settings Scripts Security Settings Policy based QoS Deployed Printers IE Maintenance Administrative Templates Computer Configuration Software Settings Software Settings Windows Settings Windows Settings Control Panel Control Panel Network Network Printers Printers System System Windows Components Windows Components Security Policy Account Policies Account Policies Password Password Lockout Lockout Local Policies Local Policies Audit Audit User Rights Assignment User Rights Assignment Security Options Security Options Windows Firewall Windows Firewall Network List Manager Network List Manager Public Key Public Key Software Restriction Software Restriction Application Control Application Control IP Security IP Security Advanced Audit Advanced Audit Corporate Base Image Regular & Flexible management of: Regular & Flexible management of: Drivers Drivers Languages Languages Common Apps Common Apps Offline servicing and updating Offline servicing and updating Client for Virtualized Desktop environment Client for Virtualized Desktop environment Client for Virtualized applications Client for Virtualized applications DataSynchronization Policy based quota Policy based quota Backup on the server side Backup on the server side Offline file management Offline file management Roaming Profiles Roaming Profiles Folder Redirection Folder Redirection

16 Each virtualization solution offers different benefits Benefits: Centralized Controlled Locked Environments VDI Well Managed Device ApplicationVirtualization SessionVirtualization Thin Client, Diskless Client or Old PC User State Virtualization Local Encrypted Data Local applications Virtualized Local / Remote applications / Remote applications Benefits: Application Compatibility Inventory & Usage Mgmt Application Lifecycle Mgmt Client Hosted Virtual Machine Local Browser Virtual Browser Benefits: Application Compatibility Migration mitigation Application Isolation Benefits: Centralized Controlled Flexible Environments Benefits: Decouple HW, Apps, and Data from the physical device Corporate Office Home Local OS HW Dependent Remote OS HW Independent Corporate Managed Desktop Corporate Managed Laptop Consumer Unmanaged Device Internet Unmanaged Device Secure & Controlled access Remote OS HW Independent Local / Synchronized Encrypted Data Roaming Virtual applications Virtual applications Local / Synchronized Virtual Browser Virtual Browser Roaming OS Preferences / Settings HW Independent Change RDS to Session Virtualization

17 What about consumerization? Allow your employees to bring to work their own pc’s Managed device Unmanaged device Managed Data Data in Rest: Group Policy Encryption Data location enforcement Data synchronization Data recoverability Data in Transit: Group Policy Rights management security IP security enforcement Unmanaged Data: Local Data in rest: Employee backup/restore responsibility Theft of PC = loss of data Who owns intellectual property How to control access to sensitive data Web Service Data in rest: Undetermined location of data (compliance) Who owns intellectual property How to control access to sensitive data Data in transit: Undetermined Uncontrollable Managed Applications: Secure use of data through Patch management Inventory Audit Group Policy Access Configuration Error monitoring Compliance Reporting Unmanaged Consumerized Applications: Limited use of corporate data due to; Unknown state of applications Managed Computers: Secure use of corporate applications and data through; Hardware inventory HW audit BIOS and driver updates HW error monitoring Intel vPro™ management Group Policy HD encryption Device Management (Installation and Access) USB drive encryption Unmanaged Computer: Limited use of corporate applications and data due to; BIOS access Root kits HD access Access corporate applications and data through Remote Desktop or Web based applications Managed Operating System: Secure use of applications and data through; OS patch management Group Policy Firewall management Device management (Installation and Access) Application access (Application Locker) Security management Lockdown templates Network Access Protection OS inventory OS audit OS error monitoring Compliance Reporting Direct Access Unmanaged Operating Systems: Limited use of corporate applications and data due to; Key loggers Screen capture Viruses Root kits Admin access

18 Enable Consumerization of IT Then people started brining in unmanaged computers that also gave people access to business information

19 Guidance based on the best practices we have found Who Where What Role / Profile Management Directory management Directory management Group policy Group policy Security groups Security groups Roaming profiles Roaming profiles Compliance logging and auditing Compliance logging and auditing Digital Right Management Digital Right Management Security Access Management Certificates / IPsec Certificates / IPsec Direct Access / IP V6 / VPN Direct Access / IP V6 / VPN Smartcard Smartcard Threat Management Gateway Threat Management Gateway Access Gateway Access Gateway NAP / Quarantine NAP / Quarantine Patching Patching Application Lifecycle Management Application Certification Application Certification Application Virtualization Application Virtualization Application Catalogue Application Catalogue and Inventory Use Management Use Management Data Management HD Encryption HD Encryption USB Policies USB Policies Backup / Restore processes Backup / Restore processes Data Synchronization Data Synchronization policies / tools Data Archiving Data Archiving Compliance Compliance

20 What should drive the client selection… DeviceDeviceApplicationsApplications Role / Function of the end user Role / Function of the end user Role / Function of the end user Role / Function of the end user ApplicationsApplicationsDeviceDevice

21 Let’s see what is possible today…

22 Scenario 1 Migrate from Windows Xp to Windows 7 Manage application compatibility The power of Mobility via Group Policy

23

24 End User Considerations Huge increase in mobility New regulatory and compliance rules Increasing system performance needs Maintaining productivity while reducing costs Use of consumer devices for work

25 Segment End Users in 4 Simple Steps Mobile Workers Senior Executive Business Consultant Field Sales Representative Office Workers Highly independent connected workers Task Workers Bank Teller Call Center Associate Deskless Workers Retail Associate Nurse Manufacturing Floor Manager

26 Office Workers are a Diverse Group Office Workers Highly independent connected workers All have high autonomy and are always connected But some have special compliance requirements Mainstream Office Worker Engineer Designer Architect Office Worker with Special Compliance Requirements Financial Trader Government Worker Contractor

27 VDI Server-based VDI hosting Working from remote locations, secure, remote access, Cloud Desktop Transformation-Enabled Scenarios Contractors Home Home PC Enablement – Use home assets for work or emergency access Hosted Image security, right apps and data Bitlocker + BitLocker To Go Application Virtualization Folder Redirection Secure/Shared Laptop Assets for Travel, Hot-Desking, Shift Workers Sharing Windows Fundamentals for Legacy PCs Terminal Services (Desktop) Extending PC life, Training Rooms And Task Workers, low cost, carbon– neutral Task Remote Access Reducing Laptop Deployments Sharing Assets Enabling Mobile Workforce Secure, Centralized Architecture Server-based VDI hosting VDI Folder Redirection BranchCache Enterprise Search Application Virtualization

28 Windows 7 Windows Server 2008 R2 MDOP System Center Optimized Desktop Solution Accelerator Microsoft Services

29 Roadmap Example 0-6 Months 6-12 Months 12+ Months Image Image Engineering Image- Deployment Engineering Application Application Compatibility App-V Application Strategy Deployment Proof of Concep t Pilot Full Deployment Infrastructure System Center Configuration Manager Active Directory ® Configurat ion Network Remediati on Security Configurat ion Patch Managem ent Envisioning Visi on Architect ure and Planning

30 Foundation elements for a well managed desktop

31 Windows Optimized Desktop Scenarios Features Simplify collection of desktop user requirements with assessment tool Simplify collection of desktop user requirements with assessment tool Map technology requirements to users’ needs with proven best practice Map technology requirements to users’ needs with proven best practice Covers desktop solutions including Windows 7, App-V, MED-V, VDI, etc. Covers desktop solutions including Windows 7, App-V, MED-V, VDI, etc.Benefits Streamline user requirements gathering Streamline user requirements gathering Enable fast planning and deployment for optimized desktop solutions Enable fast planning and deployment for optimized desktop solutions Free up IT administrators and support staff from break-fix issues Free up IT administrators and support staff from break-fix issues www.microsoft.com/WODS

32 Microsoft Services Solutions ChallengesChallenges Reduce Costs of deployment & IT Management Anywhere Access to information & Application Manage Risk and Empower People BenefitsBenefits Streamline PC Management & Automated Software Update Make Users Productive Anywhere Comprehensive Security and Compliance Desktop Planning & Deployment Desktop Image Engineering IT Enterprise Management: Configuration Management Desktop Planning & Deployment Desktop Application Compatibility Security, Identity, and Access Management Desktop Planning & Deployment Client Virtualization with Advanced Management Security, Identity, and Access Management

33 Next Steps

34 Kaun Banega IT Pro Champion Quiz Contest 1:30-2:00 PM on 24 th & 25 th March Here’s an opportunity to prove your knowledge/skills around IT Pro topics – Desktop Deployment, Security & Virtualization Technologies Win exciting prizes Those interested in nominating yourself, please stay back!

35 Resources Software Application Developers http://msdn.microsoft.com/ Infrastructure Professionals http://technet.microsoft.com/ msdnindia technetindia @msdnindia @technetindia

36 © 2011 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

37

38 Recommended References –Gartner: “Top 10 Issues With Hosted Virtual Desktops”,, Mark A. Margevicius, Publication Date: 10 June 2010 ID Number: G00201182 –Gartner:” Organizational and Staffing Considerations When Planning for Hosted Virtual Desktops”, Mark A. Margevicius, Terrence Cosgrove. Publication Date: 15 June 2010, ID: G00201376 –Gartner: “Best Use Scenarios for Hosted Virtual Desktops”, Mark A. Margevicius. 24 February 2009,ID:G00165252 –Gartner: “How to Reduce Your PC TCO 30% in 2011 “, Federica Troni, Brian Gammage, Michael A. Silver, Publication Date: 20 March 2009 ID Number: G00166195 –“Choosing From 10 Client Computing Architectural Options”, Brian Gammage, Mark A. Margevicius. 10 December 2007, Publication Date: 27 February 2009 ID Number: G00164331 –Gartner: “Market Trends: x86 Virtualization Market Driven by Consolidation, Promise of Cost Reduction, and Management Advantages”, 17 November 2009, ID:G00172438 –Gartner: “TCO of Traditional Software Distribution vs. Application Virtualization”, Michael A. Silver, Terrence Cosgrove, Mark A. Margevicius, Brian Gammage. Publication Date: 16 April 2008 ID Number: G00155897 –Gartner, “Total Cost of Ownership Comparison of PCs With Hosted Virtual Desktops”, Mark A. Margevicius, Michael A. Silver, Federica Troni, 4 August 2008 ID Number: G00155498 –Gartner, “Desktop Total Cost of Ownership: 2008 Update”, Publication Date: 24 January 2008 ID Number: G00153705 –Gartner PC Configuration Magic Quadrant Dec 2008 –Gartner, “The TCO of Employee-Owned Notebooks Running a Corporate Virtual Machine”, Brian Gammage, Publication Date: 5 May 2008 ID Number: G00156851 –Gartner: “How to Reduce Your PC TCO 30% in 2011 “, Federica Troni, Brian Gammage, Michael A. Silver, Publication Date: 20 March 2009 ID Number: G00166195 –Gartner: “Organizations That Unlock PCs Unnecessarily Will Face High Costs“, Michael A. Silver, Ronni J. Colville, Publication Date: 19 December 2008 ID Number: G00161951 –Gartner: “Hosted Virtual-Desktop Deployments Are Set to Accelerate” –Gartner, Brian Gammage, Mark A. Margevicius, 28 July 2008, ID Number: G00159683 –Gartner: “Choosing From 10 Client Computing Architectural Options”, Brian Gammage, Mark A. Margevicius. 10 December 2007, Publication Date: 27 February 2009 ID Number: G00164331 –Gartner Hype Cycle for PC Technologies 2008, Publication Date: 1 July 2008, ID Number G00158516 –Gartner - Dataquest, “Dataquest Insight: Growth in Thin-Client Terminal Markets Points to a Fundamental Shift in Computing Architecture”, 2 October 2008 ID Number: G00160724


Download ppt "How to develop a successful Desktop Strategy (Thin, Slate, Thick, VDI... V6) Ritu Patney Optimized Desktop Specialist Microsoft Corporation."

Similar presentations


Ads by Google