Download presentation
Presentation is loading. Please wait.
1
Benefits, Risks and Service Desk Impact
2
Robert Half Technology Kelly O’Connell Robert Half International Branch Manager 2/11/2010
3
Unique Value with SA+MDOP Core PC Platform
4
Make Users Productive Anywhere Improve Security and Control Streamline PC Management to Save Costs At their desk In a branch On the road Direct Access BranchCache Federated Search NavigationApp-VMED-V Protect data & PCs Built on Windows Vista foundation BitLocker BitLocker To Go AppLocker Security development lifecycle AIS Protect data & PCs Built on Windows Vista foundation BitLocker BitLocker To Go AppLocker Security development lifecycle AIS Easy migration Keep PCs running VirtualizationPowerShell Windows Troubleshooting Platform Deployment Tools VDI Enhancements DEMDARTAGPM Performance | Reliability | Compatibility MDOP Windows 7 Enterprise Scenarios
5
Vision Development & Test Pre-Beta Beta ReleaseVision Development & Test Pre-Beta Beta Release Spend more time on planning & vision phase analyzing trends and needs before building features. Focus on end-to-end business scenarios – not just new features and technologies. Give customer and partners a timeframe for the release and stick to our plan – 3 years for Windows 7. Disclose with higher degree of certainty and minimize changesDisclose with higher degree of certainty and minimize changes Engaging with partners earlier and more closely to enable seamless experiences and compatibility across hardware, software and services We are hereWe are here
6
FundamentalsFundamentals Improving User Productivity;Mobility Productivity;MobilityIncreasing Security and Data Protection Increasing Security and Data Protection OptimizingDesktopinfrastructureOptimizingDesktopinfrastructure Make Users Productive Anywhere Improving Security and ControlImproving Control Streamlining PC Management Management
7
New network paradigm enables same experience inside & outside the office Seamless access to network resources increases productivity of mobile users Infrastructure investments also make it easy to service mobile PCs and distribute updates and polices Difficult for users to access corporate resources from outside the office Challenging for IT to manage, update, patch mobile PCs while disconnected from company network HomeOfficeHomeOffice
8
Caches content downloaded from file and Web servers Users in the branch can quickly open files stored in the cache Frees up network bandwidth for other uses Application and data access over WAN is slow in branch offices Slow connections hurt user productivity Improving network performance is expensive and difficult to implement
9
Consistent experience to find data from multiple locations, including SharePoint sites Users and IT can pre-populate Favorites in Windows Explorer to remote search sites that support OpenSearch protocol IT can point users to select search sites w/Enterprise Search Scopes Current desktop and Enterprise search solutions are good, but not integrated Users need to take different steps to find data on PC and data on servers Data sources are hard to discoverData sources are hard to discover
10
Users store increasing volumes of data, including sensitive or confidential data on the removable storage devices Removable storage devices are easy to lose and, unlike PC, the loss may go unnoticed for a while Users store increasing volumes of data, including sensitive or confidential data on the removable storage devices Removable storage devices are easy to lose and, unlike PC, the loss may go unnoticed for a while Protect data on internal and removable drives Mandate the use of encryption with Group Policies Store recovery information in Active Directory for manageability Simplify BitLocker setup and configuration of primary hard drive +
11
Eliminate unwanted/unknown applications in your network Enforce application standardization within your organization Easily create and manage flexible rules using Group Policy Users can install and run unapproved applications Even standard users can install some types of software Unauthorized applications may:Unauthorized applications may: Introduce malwareIntroduce malware Increase helpdesk callsIncrease helpdesk calls Reduce user productivityReduce user productivity Undermine compliance effortsUndermine compliance efforts
12
Windows PowerShell 2.0 Integrated Scripting Environment Windows Troubleshooting Platform Remoteable Reliability Data Problem Steps Recorder Enhanced Group Policy Scenarios Group Policy Scripting Group Policy Preferences
13
Deploying desktops in virtual machines on server hardware Centralized management & securityCentralized management & security Users can access their desktop and applications wherever they are Richer Remote Experience Richer graphics with improved multi-monitor support Use voice for telephony & applications with microphone support Improved printingImproved printing Using Windows for VDI scenarios requires additional VECD licenseUsing Windows for VDI scenarios requires additional VECD license * What is Virtual Desktop Infrastructure? Maintain VHD: Offline servicing of VHD images with same tools used for WIM Boot from VHD: Reuse VHD files for deployment to managed desktop PCs Do More With VHDs
14
Deployment Image Servicing and Management Add/Remove Drivers and Packages WIM and VHD Image Management User State Migration Tool Hardlink Migration Offline File Gather Improved user file detection Microsoft Assessment and Planning Windows Deployment Services Multiple Stream Transfer Dynamic Driver Provisioning VHD and WIM Support Application Compatibility Toolkit Microsoft Deployment Toolkit
15
2008 SP1 v4.5 V3.0 V1.5 V6.0 2006 2007 Centralized Desktop v4.2 v2.5 V5.0 V1.0 V3.0 SA Customer Satisfaction
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.