Presentation is loading. Please wait.

Presentation is loading. Please wait.

This deck along with some prior sales training will be sufficient to explain the LoginVSI solution vision. Modify as necessary to fit the specific situation.

Similar presentations


Presentation on theme: "This deck along with some prior sales training will be sufficient to explain the LoginVSI solution vision. Modify as necessary to fit the specific situation."— Presentation transcript:

1 This deck along with some prior sales training will be sufficient to explain the LoginVSI solution vision. Modify as necessary to fit the specific situation The VDI Lifecycle Deliver the best end-user experience with the Login VSI product suite Name Job Title Contact Information

2 Agenda About Login VSI VDI lifecycle Our Solutions Login VSI Login PI
Modify as nessasary About Login VSI VDI lifecycle Our Solutions Login VSI Login PI Login AM

3 Who is Login VSI? Login VSI is all about end user experience in virtualized desktops. Headquarters: Santa Clara, CA and Amsterdam, The Netherlands Sales: Direct sales and through SIs and VARs Origin: Sprung from Login Consultants (150 consultants) which also spun off Immidio (Flex Profiles, aquired Vmware 2015) and Automation Machine C-team: Eric-Jan van Leeuwen (CEO, founder), Jeroen van de Kamp (CTO, founder) and Gerhard van der Zwan (CFO/COO, founder). Dennis Damen (head of development) . We deliver the confidence to move forward successfully, from proof of concept, to pilot, to full production and launch.

4 Technology Alliances that comfortably rely on Login VSI
LoginVSI is an industry standard

5 Deployed users Login VSI/PI: Millions !
Our customers Enterprise benefits: Deliver and maintain the best experience of their own end-users. Avoid performance problems. MSPs benefits: Deliver and maintain the best experience of the end-users of their customers. Deliver on SLA’s. Vendors benefits: Build and validate the best performing VDI hardware and software solutions. Login VSI/PI Enterprise Customers Login AM Enterprises and MSPs Login VSI Tech Providers Deployed users Login AM: >500,000 ! Deployed users Login VSI/PI: Millions !

6 Login VSI software Benchmarking and predictive change
Quick slide to set up the presentation. Say something like…there are three discrete products that make up the complete LoginVSI solution or vision…. Then go to the next slide. Don’t spend a lot of time on this slide…The deck gets in detail on each product Benchmarking and predictive change Sizing, scaling, capacity planning, change impact on performance Unique selling point: Virtual users Continuous proactive monitoring of end user experience in production environments Unique selling point: Virtual users Automation Machine, the engine behind your agile workspace. Deploy and maintain virtual desktop environments Unique selling point: Automated change

7 The life cycle vision Automated scaling advice IT Service Catalog
This is the vision or solution that the discrete products deliver. Important concept to get across. The slides following get into each product in the LoginVSI solution stack. Automated scaling advice IT Service Catalog Blueprints: Complete infrastructures Packages : Applications and Features Automated QA testing Automated change Automated Break-Fix Repository for automated deployment of applications Service level monitoring and reporting

8 Login VSI is our flagship product
Login VSI is our flagship product. Login VSI deploys virtual users with realistic work loads to test your environment. Our customers use Login VSI in all phases of their virtual desktop deployments. For Use-cases like. Stress /Load Testing What ifs sceanarious. Change Impact Analysis. What changes will adding this application or updating/patching application “X” have on performance? Capacity Planning Validating environments Will this hardware accommodate “X’ amount of users with an acceptable performance?

9 Login VSI – Test, Compare and Validate
Predict the performance impact of necessary updates and upgrades Learn the maximum user capacity of your current infrastructure Find hidden performance problems Predict capacity changes Better allocate resources

10 Simulate Realistic Work-Loads
What our software does? We simulate real-users Use-cases Bakeoff Large Enterprise customers may do this Which hardware is the best fit Validating environments Will this hardware accommodate “X’ amount of users with an acceptable performance? Stress testing What ifs Change Impact Analysis What changes will adding this application or updating/patching application “X” have on performance? Do I need to purchase additional hardware? Should I warn our users this application might be a bit slower then normal?

11 Turnkey workloads mean fast startup
What sets us apart from our competition is our Out-of-the-box workloads. Login VSI simulates user workloads with realistic user behavior. The user workloads use the same the applications as a typical user such as Word, Excel, Outlook or IE. We provide 4 different works loads: We have a task worker workload (a casual User) working with 2-3 different applications. Our Office worker workload working with more applications including video. Our Knowledge Worker workload with more applications & utilizing more CPU power, requiring more resources. And finally our Power worker workload with even more applications and CPU power, requiring even more resources. You can Customize these Workloads You can create a workload for any type of application including in-house applications. You can Mix and match workloads by creating custom scripts on top of the out-of-the-box workloads *Knowledge worker is our Industry standard used by Vendors. Vendors use the Knowledge worker as Their reference architecture which includes ,Office Suites, Adobe, Internet Explorer, etc Turnkey workloads mean fast startup POWER OFFICE KNOWLEDGE TASK 1 vCPU 2-3 Apps No Video 1 vCPU 4-6 Apps 240p Video 2 vCPU 4-7 Apps 360p Video 2-4 vCPU 5-9 Apps 720p Video

12 How it works to benefit you. Real workloads with virtual users
How it works to benefit you. Real workloads with virtual users. This an actual Login VSI test in progress. Displaying the virtual users executing various workloads.

13 VSIMax An end users’ view of performance SAFE CHECK MAX
The results of test is an accurate maximum load the infrastructure can deal with. We call this the VSIMAX An end users’ view of performance VSIMax SAFE CHECK MAX

14 Testing Microsoft Office
Here is an example of a pretty heavy update. The result of the test on updating from office 2010 to office 2013 shows a 20% reduction on the number of users that the infrastructure can handle #VDILIKEAPRO Moving from Office 2010 to Office 2013 can reduce performance by 20% User Density, Microsoft Office 2010 (VSI Max 148) User Density, Microsoft Office 2013 (VSI Max 114)

15 Put our virtual users to work for you
Product selection & configuration Test scenarios at scale but also test exceptions like logon storms, disaster and recovery, etc. Understand the impact of changes in your VM (e.g., anti-virus, patches, upgrades)

16 Environment overview VSI Launcher RDP / Citrix / VMware client
Explain environment overview Any questions SE addresses if unable to be answered by DEMO VSI Launcher RDP / Citrix / VMware client VSI Share Binaries Logfiles Configuration Target Machine User simulation scripts Microsoft office Active Directory (optional) VSI users and groups VSI policy

17 Login PI Used in production environments, provides performance insights based on real-world information for virtualized desktop environments. Login PI gives you tracking of performance from the end users’ perspective You can Use Login PI to: Monitor the end user experience, without affecting end-user productivity Provide early warnings on performance, before they are experienced by end users Regularly test and manage your virtualized desktop environment

18 Login PI = Performance Assurance
Monitor the environment with Virtual Users No agent to install Receive alerts in the consoles you already use – not Yet Another Console Real-time monitoring – alerts as they happen Don’t rely on Helpdesk calls to learn about outages SLA reporting, performance trends, all in one place

19 How it works Virtual user logs on to existing environment
The way it works: The virtual user logs in and launches common applications, recording how long it takes for the tasks to complete. The system then watches for any large discrepancies in the results and will generate alerts based on those discrepancies Virtual user logs on to existing environment Virtual user starts launching applications and recording response times If application times are below acceptable thresholds, alerts are generated Reports generated to show performance over time

20

21 Efficiently Automate, Maintain and Deploy Virtual Desktop Environments

22 AM in the VDI Lifecycle LoginAM is a comprehensive solution. The following slides get into a subset of the capability, the power of AM has with Image management. Both Infrastructure image management “blueprints” as well as Desktop “Golden Images”. For the enterprise think Cost/time savings and end user experience confidence. Senior Architects see the value right off. Engineers not so quick on the uptake. Other points: “Cloud war” either become as agile and cost effective as the cloud or get your infrastructure replaced by the cloud. Speed of delivery Consistent delivery Scalability Reference Architectures/ blueprints AM Blueprints for rapid deployment of new desktop virtualization platforms Instant QA for high-quality, first time right deployment of change Image Management creation and maintenance of golden images Dynamic packaging for easy creation and transfer of applications and changes from one environment to the next Lights-out deployment for safe and scheduled to production systems Superstructure imposes a proven and scalable methodology for deploying change in a virtual desktop

23 Login AM Image Management: Desktop Images
Let’s separate the desktop or workspace image from the infrastructure that hosts it. Enterprises tailor these for their end-users—all with different apps, policies, personalization, etc… Desktop virtualization platform Call Agent Desktop Software deployment Dynamic application configuration Application authorization User Environment Management Desktop personalization Application publication Operating System Hypervisor Virtual Machine(s) Software deployment Dynamic application configuration Application authorization User Environment Management Desktop personalization Application publication Operating System Networking Storage

24 Image Management: Desktop Images
Many users, roles and desktops THAT CAN BE A LOT OF DESKTOP IMAGES TO MANAGE!!!

25 Image Management: Desktop Images
But, there is also a lot of overlap and it is important that they are consistent across all images 2. and automatically push it here Operating System 1. change it here in Login AM

26 Image Management: Desktop Images
With Login AM you just manage each one of these components in one place, outside of the complete desktop image. Login AM will manage building the new images after these little changes, and it will do it the same way every time, for every image that needs changing. Office Worker Desktop Software deployment Dynamic application configuration Application authorization User Environment Management Desktop personalization Application publication Operating System components

27 Image Management: Infrastructure Images
While there are unique desktop images that you need to roll out consistent, there are also SERVER images that need to be deployed consistently Infrastructure Images Include these types of servers: XenApp Session Hosts Storefront Servers Desktop Delivery Controllers VMware Horizon Composer Remote Desktop Session Hosts Etc… Office Worker Desktop Software deployment Dynamic application configuration Application authorization User Environment Management Desktop personalization Application publication Operating System components

28 Blueprints at a high level
Blueprints are a collection of server and desktop images necessary to build a fully configured and self sufficient environment. Desktop Session Host Software deployment Dynamic application configuration Application authorization User Environment Management Desktop personalization Application publication Operating System Storefront Server Software deployment Dynamic application configuration Application authorization User Environment Management Desktop personalization Application publication Operating System Datastore Server Software deployment Dynamic application configuration Application authorization User Environment Management Desktop personalization Application publication Operating System Desktop Delivery Controller Software deployment Dynamic application configuration Application authorization User Environment Management Desktop personalization Application publication Operating System License Server Software deployment Dynamic application configuration Application authorization User Environment Management Desktop personalization Application publication Operating System

29 Login AM Image Management
Manage your virtual images by automating the maintenance, creation and update process Reduce number of images Due to the dynamic configuration, the number of images can be reduced because settings are used for the image creation Easily create and manage multiple images Maintain multiple tailored images for each customer or department automatically and decease to provide the ultimate experience Standardize image creation and maintenance The software can be integrated into the Citrix Provisioning Server or VMware vSphere, automating the entire creation and deployment process

30 The VDI Lifecycle Finish up with a statement on the vision created by the product suite. Its not needed to do everything all at once. You can start with any one of the products and build to the ultimate vision.

31 Questions?


Download ppt "This deck along with some prior sales training will be sufficient to explain the LoginVSI solution vision. Modify as necessary to fit the specific situation."

Similar presentations


Ads by Google