SlideShare uma empresa Scribd logo
1 de 16
F5’s VMware Horizon View
Reference Architecture
© F5 Networks, Inc 2
How Many?
The average person
carries 2.9 devices*
HOW MANY DEVICES
DO YOU CARRY?
Companies Consolidating
Devices
People Accumulating Devices
© F5 Networks, Inc 3
VDI – The Reasons Why
Drivers for desktop/application virtualization, thin client, or blade PC
technologies?
11%
10%
20%
21%
27%
43%
46%
51%
55%
55%
0%
14%
16%
21%
22%
23%
36%
38%
45%
48%
48%
53%
Q3 2012
Q3 2011
Supporting employees to work from
anywhere
Increasing manageability, patching
Lowering costs
Providing flexible remote access
Disaster Recovery
Better security
Improving compliance
Reducing PC energy consumption
Supporting access for tablets
BYOPC Programs
Enable Apple Mac computers
Base: 981 (2011) & (2012) North American and European IT decision-makers
Source: Enterprise and SMB Hardware Survey, North America and Europe, Q3 2011 & Q3 2012
© F5 Networks, Inc 4
Complexity
Operational complexity of
traditional architecture
Performance
Poorer than expected
performance
Security
Multiple points of
access control
Mobility
Lack of mobility between
devices and applications
Reliability
Unreliable user experience
Keys to a Successful VDI Deployment
Complexity
Operational complexity of
traditional architecture
Performance
Poorer than expected
performance
Change
Desktop Deployment
Management Policies
Need
Low Priority
Costs
Initial Capital
Barriers
Central
Management
Granular Control
Security
Policy Driven
Access Control
Agility
Disaster Recovery
BYOD
Mobile Workforce
Cost Savings
Efficient
Benefits
© F5 Networks, Inc 5
Horizon View
Complete desktop and application virtualization
+ HORIZON SUITE
Intelligent Services Framework
Secure • Fast • Available
Horizon View
VM
VDI
Horizon Mirage
Horizon
Workspace
Anywhere, any service, any device Intelligent Dynamic, agile, adaptive
Horizon Mirage Horizon WorkspaceHorizon View
Centralized layered image
management for local deployment
Multi-device workspace
for IT services
Complete desktop and
application virtualization
Support for VMware validated solutions
• Mobile Secure Desktop
• Business Process Desktop
• AlwaysOn Desktop
• Branch Office Desktop
Intelligent traffic management and
security
• Local and global traffic management
• Multi-site and multi-pod deployments
• Access management and data center
firewall
Unique F5 solutions
• Single Namespace
• Username Persistence
• Native PCoIP Proxy
• CAC Support
© F5 Networks, Inc 6
Complex
User devices VMware Horizon View
Virtual desktops
& apps
Fragmented application access and policy management
Load Balancer View Security
Servers
Firewall View
Connection
Servers
User experience impacted
by latency, lack of
persistence, poor
reliability
Firewall
© F5 Networks, Inc 7
Simple
BIG-IP Access Policy
Manager
APM
TCP 443
UDP
4172
TCP/UDP 4172TCP 80
Authentication Logging/Reporting
Desktops
Connection
Servers
Internal
APM
SSL Decryption
Authentication
High Availability
PCoIP Proxy
DMZ
Logging/Reporting
TCP 80
Internal View Clients
External View Clients
VMware Horizon View
• Secure VDI
• Advanced AAA & Endpoint security
• Traffic management
• Scalable –200,000 concurrent users
• Offload/replace Security Server
INDUSTRY FIRST HARDENED SECURITY INCREASED SCALABILITY SIMPLIFY VIEW VDI
© F5 Networks, Inc 8
Consolidate
© F5 Networks, Inc 9
Easy
iApp for VMware View
Configure network for VMware View automatically
• Admin answers simple, goal-based questions
• iApp for VMware View configures network based on Admin’s input
Benefits
• Faster (minutes instead of days)
• Reduces errors
• Replicates to groups of servers easily
BIG-IP
Are You Using VMware
View Security
Servers?
© F5 Networks, Inc 10
Efficient
Desktop
Laptop
Smartphone
Tablet
© F5 Networks, Inc 11
Enabling
Scenario Functionality Value
L2TP SSL and VPN, AAA
functionality
Secure access to View servers over public
networks. Replaces View Security Server and
removes Windows from the DMZ.
Load balancing, policy and
global traffic management
Scale View when multiple Connection Servers
are required.
Global Load Balancing Route View traffic globally.
User Name Persistence Faster session login and restoration without re-
opening applications.
SECURITY & FIPS
COMPLIANCE
SYSTEM
SCALABILITY
MULTIPLE
DATA CENTERS
PERFORMANCE
© F5 Networks, Inc 12
Why F5 for View?
Increased
Scalability
Increased
Availability
Strengthened
Security
Simpler Architecture to
Manage
Engineered Specifically
for View
Easier for
End Users
© F5 Networks, Inc 13
Options
Description List Price
per unit
24x7
Support
Throughput Concurrent
SSL VPN
Users
Concurrent
VDI "Access"
Users
BIG-IP Virtual Edition: View
special APM (5M)
$ 95 Self Service 5M 10 10
BIG-IP Virtual Edition: View
special APM (25M)
$ 2,000 24% of list 25M 10 50
BIG-IP Virtual Edition: View
special APM (200M)
$ 4,000 24% of list 200M 10 250
BIG-IP Virtual Edition:
View special APM (1G)
$ 10,000 24% of list 1G 10 1,000
© F5 Networks, Inc 14
Solution Citrix Superior alternative
Desktop Virtualization Citrix XenApp
Citrix XenDesktop
View
Server Virtualization Citrix XenServer vSphere
Datacenter Virtualization CloudPlatform vCenter
vCloud Director
Application Delivery Citrix NetScaler BIG-IP Local Traffic Manager (LTM)
Web App Firewall Citrix NetScaler App Firewall BIG-IP Application Security Manager
(ASM)
SSL VPN Citrix NetScaler Gateway BIG-IP Access Policy Manager
(APM)
Edge Delivery Citrix Cloud Bridge BIG-IP Edge Gateway
Datacenter HA NetScaler GSLB function BIG-IP Global Traffic Manager
(GTM)
Web Application Acceleration NetScaler Web 2.0 Application
Optimization
F5 AAM
Better Choice
© F5 Networks, Inc 15
F5 BIG-IP is the Foundation for App Delivery
F5 makes
VDI better
Proven choice for End
User Computing
Market leader in
Application Delivery
Optimize the User Experience
Simplify Infrastructure
Unify Security & Access Control
Strengthen Availability
Reduce Cost
Positioned to meet end users’ needs
F5’s VMware Horizon View Reference Architecture

Mais conteúdo relacionado

Mais procurados

cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptxcloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptxVitNguyn252054
 
Docker Networking Overview
Docker Networking OverviewDocker Networking Overview
Docker Networking OverviewSreenivas Makam
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4Vepsun Technologies
 
Backups And Recovery
Backups And RecoveryBackups And Recovery
Backups And Recoveryasifmalik110
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Oracle Database Appliance 12.1.2.2.0 アップデート及びパッチ管理について
Oracle Database Appliance 12.1.2.2.0 アップデート及びパッチ管理についてOracle Database Appliance 12.1.2.2.0 アップデート及びパッチ管理について
Oracle Database Appliance 12.1.2.2.0 アップデート及びパッチ管理についてオラクルエンジニア通信
 
Real Application Security (RAS) and Oracle Application Express (APEX)
Real Application Security (RAS) and Oracle Application Express (APEX)Real Application Security (RAS) and Oracle Application Express (APEX)
Real Application Security (RAS) and Oracle Application Express (APEX)Dimitri Gielis
 
Oci object storage deep dive 20190329 ss
Oci object storage deep dive 20190329 ssOci object storage deep dive 20190329 ss
Oci object storage deep dive 20190329 ssKenichi Sonoda
 
RAC - The Savior of DBA
RAC - The Savior of DBARAC - The Savior of DBA
RAC - The Savior of DBANikhil Kumar
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. částMarketingArrowECS_CZ
 
Exception handling
Exception handlingException handling
Exception handlingxavier john
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overviewguestf6dc99b
 
Issues of OpenStack multi-region mode
Issues of OpenStack multi-region modeIssues of OpenStack multi-region mode
Issues of OpenStack multi-region modeJoe Huang
 
Alphorm.com Formation Nouveautés Windows Server 2016
Alphorm.com Formation Nouveautés Windows Server 2016Alphorm.com Formation Nouveautés Windows Server 2016
Alphorm.com Formation Nouveautés Windows Server 2016Alphorm
 
Hyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: ConceptsHyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: ConceptsNick Scuola
 

Mais procurados (20)

cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptxcloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
cloud_foundation_on_vxrail_vcf_pnp_licensing_guide.pptx
 
Docker Networking Overview
Docker Networking OverviewDocker Networking Overview
Docker Networking Overview
 
Building Oracle BIEE (OBIEE) Reports, Dashboards
Building Oracle BIEE (OBIEE) Reports, DashboardsBuilding Oracle BIEE (OBIEE) Reports, Dashboards
Building Oracle BIEE (OBIEE) Reports, Dashboards
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4
 
Backups And Recovery
Backups And RecoveryBackups And Recovery
Backups And Recovery
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
CKA_1st.pptx
CKA_1st.pptxCKA_1st.pptx
CKA_1st.pptx
 
Oracle Database Appliance 12.1.2.2.0 アップデート及びパッチ管理について
Oracle Database Appliance 12.1.2.2.0 アップデート及びパッチ管理についてOracle Database Appliance 12.1.2.2.0 アップデート及びパッチ管理について
Oracle Database Appliance 12.1.2.2.0 アップデート及びパッチ管理について
 
Real Application Security (RAS) and Oracle Application Express (APEX)
Real Application Security (RAS) and Oracle Application Express (APEX)Real Application Security (RAS) and Oracle Application Express (APEX)
Real Application Security (RAS) and Oracle Application Express (APEX)
 
Oci object storage deep dive 20190329 ss
Oci object storage deep dive 20190329 ssOci object storage deep dive 20190329 ss
Oci object storage deep dive 20190329 ss
 
RAC - The Savior of DBA
RAC - The Savior of DBARAC - The Savior of DBA
RAC - The Savior of DBA
 
Active Directory Training
Active Directory TrainingActive Directory Training
Active Directory Training
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
Workshop Docker for DSpace
Workshop Docker for DSpaceWorkshop Docker for DSpace
Workshop Docker for DSpace
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Exception handling
Exception handlingException handling
Exception handling
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overview
 
Issues of OpenStack multi-region mode
Issues of OpenStack multi-region modeIssues of OpenStack multi-region mode
Issues of OpenStack multi-region mode
 
Alphorm.com Formation Nouveautés Windows Server 2016
Alphorm.com Formation Nouveautés Windows Server 2016Alphorm.com Formation Nouveautés Windows Server 2016
Alphorm.com Formation Nouveautés Windows Server 2016
 
Hyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: ConceptsHyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: Concepts
 

Destaque

F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Networks
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Networks
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...F5 Networks
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesF5 Networks
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices Lior Rotkovitch
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionF5 Networks
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey ResultsF5 Networks
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Networks
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelF5 Networks
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersF5 Networks
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADFF5 Networks
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introductionJimmy Saigon
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancerxKinAnx
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitecturePeter Silva
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionF5 Networks
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network ThingsF5 Networks
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015F5 Networks
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5 Networks
 

Destaque (20)

F5 Application Services Reference Architecture
F5 Application Services Reference ArchitectureF5 Application Services Reference Architecture
F5 Application Services Reference Architecture
 
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture (Audio)
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
 
Using Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and servicesUsing Docker container technology with F5 Networks products and services
Using Docker container technology with F5 Networks products and services
 
F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices F5 ASM v12 DDoS best practices
F5 ASM v12 DDoS best practices
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 
F5 Networks Quick Poll Research: HTTP/2 Survey Results
F5 Networks Quick Poll Research: HTTP/2Survey ResultsF5 Networks Quick Poll Research: HTTP/2Survey Results
F5 Networks Quick Poll Research: HTTP/2 Survey Results
 
F5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS ScaleF5 Networks Intelligent DNS Scale
F5 Networks Intelligent DNS Scale
 
F5 Certified! Program Overview and Update
F5 Certified! Program Overview and UpdateF5 Certified! Program Overview and Update
F5 Certified! Program Overview and Update
 
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery ModelIntegrated SDN/NFV Framework for Transitioning to Application Delivery Model
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
 
Ensure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data CentersEnsure Application Availability Between Hybrid Data Centers
Ensure Application Availability Between Hybrid Data Centers
 
BIG-IP ADCs and ADF
BIG-IP ADCs and ADFBIG-IP ADCs and ADF
BIG-IP ADCs and ADF
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancer
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS ProtectionIntrinsic Security—The Key to Effective Hybrid DDoS Protection
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
 
Operationalize all the Network Things
Operationalize all the Network ThingsOperationalize all the Network Things
Operationalize all the Network Things
 
Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015Key Findings from the State of Application Delivery 2015
Key Findings from the State of Application Delivery 2015
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 

Semelhante a F5’s VMware Horizon View Reference Architecture

Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5MarketingArrowECS_CZ
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For VirtualizationPatricio Campos
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
管理向云的迁移过程
管理向云的迁移过程管理向云的迁移过程
管理向云的迁移过程ITband
 
View 5 competitive sales presentation
View 5 competitive sales presentationView 5 competitive sales presentation
View 5 competitive sales presentationsolarisyourep
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 Networks
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...solarisyourep
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...xKinAnx
 
Realizing the True Potential of On-Demand IT: Enterprise Cloud Architectures
Realizing the True Potential of On-Demand IT: Enterprise Cloud ArchitecturesRealizing the True Potential of On-Demand IT: Enterprise Cloud Architectures
Realizing the True Potential of On-Demand IT: Enterprise Cloud Architecturesjasonenriquez
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld
 
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLac Viet Computing Corporation
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data powersflynn073
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Presentation step into virtualization and transform your it
Presentation   step into virtualization and transform your itPresentation   step into virtualization and transform your it
Presentation step into virtualization and transform your itsolarisyourep
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft Private Cloud
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshowpatmisasi
 

Semelhante a F5’s VMware Horizon View Reference Architecture (20)

Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
Bezpečný a optimalizovaný přístup k VMware VDI pomocí technologií F5
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
管理向云的迁移过程
管理向云的迁移过程管理向云的迁移过程
管理向云的迁移过程
 
View 5 competitive sales presentation
View 5 competitive sales presentationView 5 competitive sales presentation
View 5 competitive sales presentation
 
F5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer PresentationF5 9.x to 10.x Upgrade Customer Presentation
F5 9.x to 10.x Upgrade Customer Presentation
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
 
Presentation cloud infrastructure and management – from v sphere to vcloud ...
Presentation   cloud infrastructure and management – from v sphere to vcloud ...Presentation   cloud infrastructure and management – from v sphere to vcloud ...
Presentation cloud infrastructure and management – from v sphere to vcloud ...
 
Realizing the True Potential of On-Demand IT: Enterprise Cloud Architectures
Realizing the True Potential of On-Demand IT: Enterprise Cloud ArchitecturesRealizing the True Potential of On-Demand IT: Enterprise Cloud Architectures
Realizing the True Potential of On-Demand IT: Enterprise Cloud Architectures
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam AnhLợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
Lợi ích của VDI và hiệu quả đầu tư VDI - Mr Nguyễn Trọng Nam Anh
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Presentation step into virtualization and transform your it
Presentation   step into virtualization and transform your itPresentation   step into virtualization and transform your it
Presentation step into virtualization and transform your it
 
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 PresentationMicrosoft India - Whats New in Windows Server 2008 R2 Presentation
Microsoft India - Whats New in Windows Server 2008 R2 Presentation
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
Virtualization / Cloud / SDN
Virtualization / Cloud / SDNVirtualization / Cloud / SDN
Virtualization / Cloud / SDN
 

Mais de F5 Networks

F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 Networks
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachF5 Networks
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)F5 Networks
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)F5 Networks
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)F5 Networks
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)F5 Networks
 
5 Ways to use Node in the Network
5 Ways to use Node in the Network5 Ways to use Node in the Network
5 Ways to use Node in the NetworkF5 Networks
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of ThingsF5 Networks
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Networks
 
BIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerBIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerF5 Networks
 
BIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware PlatformBIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware PlatformF5 Networks
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence ServiceF5 Networks
 

Mais de F5 Networks (15)

F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
F5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: MadnessF5 Networks Threat Analysis: Madness
F5 Networks Threat Analysis: Madness
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)The F5 Networks Application Services Reference Architecture (White Paper)
The F5 Networks Application Services Reference Architecture (White Paper)
 
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
 
The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)The F5 DDoS Protection Reference Architecture (Technical White Paper)
The F5 DDoS Protection Reference Architecture (Technical White Paper)
 
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
 
DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)DNS: Challenges in a Changing Landscape (Infographic)
DNS: Challenges in a Changing Landscape (Infographic)
 
5 Ways to use Node in the Network
5 Ways to use Node in the Network5 Ways to use Node in the Network
5 Ways to use Node in the Network
 
The DNS of Things
The DNS of ThingsThe DNS of Things
The DNS of Things
 
F5 Intelligent DNS Scale
F5 Intelligent DNS ScaleF5 Intelligent DNS Scale
F5 Intelligent DNS Scale
 
BIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement ManagerBIG-IP Policy Enforcement Manager
BIG-IP Policy Enforcement Manager
 
BIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware PlatformBIG-IP 4200v Hardware Platform
BIG-IP 4200v Hardware Platform
 
F5's IP Intelligence Service
F5's IP Intelligence ServiceF5's IP Intelligence Service
F5's IP Intelligence Service
 

Último

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Último (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

F5’s VMware Horizon View Reference Architecture

  • 1. F5’s VMware Horizon View Reference Architecture
  • 2. © F5 Networks, Inc 2 How Many? The average person carries 2.9 devices* HOW MANY DEVICES DO YOU CARRY? Companies Consolidating Devices People Accumulating Devices
  • 3. © F5 Networks, Inc 3 VDI – The Reasons Why Drivers for desktop/application virtualization, thin client, or blade PC technologies? 11% 10% 20% 21% 27% 43% 46% 51% 55% 55% 0% 14% 16% 21% 22% 23% 36% 38% 45% 48% 48% 53% Q3 2012 Q3 2011 Supporting employees to work from anywhere Increasing manageability, patching Lowering costs Providing flexible remote access Disaster Recovery Better security Improving compliance Reducing PC energy consumption Supporting access for tablets BYOPC Programs Enable Apple Mac computers Base: 981 (2011) & (2012) North American and European IT decision-makers Source: Enterprise and SMB Hardware Survey, North America and Europe, Q3 2011 & Q3 2012
  • 4. © F5 Networks, Inc 4 Complexity Operational complexity of traditional architecture Performance Poorer than expected performance Security Multiple points of access control Mobility Lack of mobility between devices and applications Reliability Unreliable user experience Keys to a Successful VDI Deployment Complexity Operational complexity of traditional architecture Performance Poorer than expected performance Change Desktop Deployment Management Policies Need Low Priority Costs Initial Capital Barriers Central Management Granular Control Security Policy Driven Access Control Agility Disaster Recovery BYOD Mobile Workforce Cost Savings Efficient Benefits
  • 5. © F5 Networks, Inc 5 Horizon View Complete desktop and application virtualization + HORIZON SUITE Intelligent Services Framework Secure • Fast • Available Horizon View VM VDI Horizon Mirage Horizon Workspace Anywhere, any service, any device Intelligent Dynamic, agile, adaptive Horizon Mirage Horizon WorkspaceHorizon View Centralized layered image management for local deployment Multi-device workspace for IT services Complete desktop and application virtualization Support for VMware validated solutions • Mobile Secure Desktop • Business Process Desktop • AlwaysOn Desktop • Branch Office Desktop Intelligent traffic management and security • Local and global traffic management • Multi-site and multi-pod deployments • Access management and data center firewall Unique F5 solutions • Single Namespace • Username Persistence • Native PCoIP Proxy • CAC Support
  • 6. © F5 Networks, Inc 6 Complex User devices VMware Horizon View Virtual desktops & apps Fragmented application access and policy management Load Balancer View Security Servers Firewall View Connection Servers User experience impacted by latency, lack of persistence, poor reliability Firewall
  • 7. © F5 Networks, Inc 7 Simple BIG-IP Access Policy Manager APM TCP 443 UDP 4172 TCP/UDP 4172TCP 80 Authentication Logging/Reporting Desktops Connection Servers Internal APM SSL Decryption Authentication High Availability PCoIP Proxy DMZ Logging/Reporting TCP 80 Internal View Clients External View Clients VMware Horizon View • Secure VDI • Advanced AAA & Endpoint security • Traffic management • Scalable –200,000 concurrent users • Offload/replace Security Server INDUSTRY FIRST HARDENED SECURITY INCREASED SCALABILITY SIMPLIFY VIEW VDI
  • 8. © F5 Networks, Inc 8 Consolidate
  • 9. © F5 Networks, Inc 9 Easy iApp for VMware View Configure network for VMware View automatically • Admin answers simple, goal-based questions • iApp for VMware View configures network based on Admin’s input Benefits • Faster (minutes instead of days) • Reduces errors • Replicates to groups of servers easily BIG-IP Are You Using VMware View Security Servers?
  • 10. © F5 Networks, Inc 10 Efficient Desktop Laptop Smartphone Tablet
  • 11. © F5 Networks, Inc 11 Enabling Scenario Functionality Value L2TP SSL and VPN, AAA functionality Secure access to View servers over public networks. Replaces View Security Server and removes Windows from the DMZ. Load balancing, policy and global traffic management Scale View when multiple Connection Servers are required. Global Load Balancing Route View traffic globally. User Name Persistence Faster session login and restoration without re- opening applications. SECURITY & FIPS COMPLIANCE SYSTEM SCALABILITY MULTIPLE DATA CENTERS PERFORMANCE
  • 12. © F5 Networks, Inc 12 Why F5 for View? Increased Scalability Increased Availability Strengthened Security Simpler Architecture to Manage Engineered Specifically for View Easier for End Users
  • 13. © F5 Networks, Inc 13 Options Description List Price per unit 24x7 Support Throughput Concurrent SSL VPN Users Concurrent VDI "Access" Users BIG-IP Virtual Edition: View special APM (5M) $ 95 Self Service 5M 10 10 BIG-IP Virtual Edition: View special APM (25M) $ 2,000 24% of list 25M 10 50 BIG-IP Virtual Edition: View special APM (200M) $ 4,000 24% of list 200M 10 250 BIG-IP Virtual Edition: View special APM (1G) $ 10,000 24% of list 1G 10 1,000
  • 14. © F5 Networks, Inc 14 Solution Citrix Superior alternative Desktop Virtualization Citrix XenApp Citrix XenDesktop View Server Virtualization Citrix XenServer vSphere Datacenter Virtualization CloudPlatform vCenter vCloud Director Application Delivery Citrix NetScaler BIG-IP Local Traffic Manager (LTM) Web App Firewall Citrix NetScaler App Firewall BIG-IP Application Security Manager (ASM) SSL VPN Citrix NetScaler Gateway BIG-IP Access Policy Manager (APM) Edge Delivery Citrix Cloud Bridge BIG-IP Edge Gateway Datacenter HA NetScaler GSLB function BIG-IP Global Traffic Manager (GTM) Web Application Acceleration NetScaler Web 2.0 Application Optimization F5 AAM Better Choice
  • 15. © F5 Networks, Inc 15 F5 BIG-IP is the Foundation for App Delivery F5 makes VDI better Proven choice for End User Computing Market leader in Application Delivery Optimize the User Experience Simplify Infrastructure Unify Security & Access Control Strengthen Availability Reduce Cost Positioned to meet end users’ needs

Notas do Editor

  1. A conflict emerges when people/consumers/employees are accumulating devices (average person carries 3) and want to use those for work while organizations are in the process of consolidating infrastructure and the amount of devices they need to manage. http://stevenduque.com/wp-content/uploads/2010/10/too-many-devices.jpg http://media.scmagazine.com/images/2013/03/14/device101_354590.gif http://www.fedtechmagazine.com/sites/default/files/imagecache/articlelarge/data-center-consolidation-gov.png
  2. As you can see, providing employees with anywhere, anytime access is the top reason for VDI interest. Other important areas include the ability to centrally manage desktops to boost efficiency, reduce the cost in upgrading or purchasing desktop computers, the ability to automate and have a robust disaster recovery plan, providing enhanced control over data security along with no limitation on end point devices. http://blogs.forrester.com/david_johnson/13-04-01-has_vdi_peaked_a_change_in_the_adoption_drivers_sheds_new_light_and_new_life
  3. http://www.business2community.com/tech-gadgets/why-vdi-is-ideal-for-small-and-medium-businesses-0492717
  4. While F5 supports the whole range of the Horizon Suite, this reference architecture focuses on the Horizon View component of VMware’s overall End User Computing solutions. F5 APM VE, optimized for VMware Horizon View, delivers secure access, traffic management, and simplified deployment for VMware Horizon View clients. F5 is able to deliver several capabilities unique to the APM/Horizon View solution, including: • Single namespace, which reduces the burden on administrators of managing user access to a globally distributed VDI, while ensuring that users are always securely connected to their preferred desktop at the appropriate data center. • PCoIP proxy, simplifying Horizon View architectures, and delivering hardened security and increased scalability. (BTW, F5 was the first vendor to provide this functionality.) • Secure remote and local access, and integration with AAA services, and single sign-on (SSO) which streamlines the user experience, while improving both security and productivity.
  5. Operational Complexities of VMware View
  6. There are a number of benefits customers will enjoy with a Horizon View optimized F5 APM VE, deployed with Horizon View, including: • Enhanced cost-efficiency and flexibility – The new APM/Horizon View solution will help organizations build virtual desktop environments more cost-efficiently, enabling them to deploy joint solutions at a variety of price points, thereby enabling a broader range of customers access to industry-leading access and security technology, regardless if they are just starting a VDI deployment, or scaling globally to tens of thousands of desktops. • Technology leadership – By aligning efforts, F5 and VMware offerings are easier to manage and configure for optimum results.
  7. The F5 BIG-IP Virtual Edition (VE) secure appliance acts as a full proxy between the client and all of the View components. Authentication connections and PCoIP traffic (from external clients) are all terminated on the appliance before being proxied to the relevant internal component. The BIG-IP authenticates the View client’s identity with the Microsoft® Active Directory® service before passing the username and password to the View Connection server. The BIG-IP provides high availability and load balancing services for the Connection Servers. The BIG-IP can provide SSL offload for the client authentication traffic, saving CPU resources on the View Connection Servers by forwarding traffic to the Connection Server unencrypted. The BIG-IP replaces the PCoIP proxy functions of the View Security Server role, eliminating a layer of infrastructure and simplifying management of the solution. The VMware Horizon View specific configuration is performed using an F5 supplied iApp® template, which creates all the configuration items required to manage the View application traffic. The created configuration follows the tested best practice design and dramatically reduces the time to deploy the solution. FYI: You’ll notice that there are multiple pods in these diagrams – this is the full solution. In this View RA specfic solution, there would probably only be 1 pod.
  8. Deploying LTM, GTM and APM for View requires thoughtful consideration to the different configuration options. For someone who is not familiar with View or BIG-IP, the process can take longer than necessary. How do you provide all the functionality of a BIG-IP to power users, but take out the configuration complexity that would otherwise slow down deployment? In order to solve this, F5 uses iApps. iApps are pre-configured packages of settings designed for specific applications that enable very rapid deployment of BIG-IP in optimal settings. F5 has invested significant time, effort and joint testing work with VMware to design and maintain an iApp for VMware View that saves significant time when deploying F5’s application delivery services for View. Additionally, by leveraging the iApp wizard-like environment, manual mistakes are avoided – saving both, time and money. F5 iApp for VMware View can reduce the amount of time it takes to deploy application delivery services from days to less than 1 hour.
  9. Improved Experience/SSO/BYOD While VMware View supports all endpoint devices (e.g. laptop, tablet, smartphone, etc.) natively, F5 provides hardened security.
  10. Lets take a look at the Products that Citrix have… now lets look at the closest competitor in each category… Now lets look at which of these technologies Citrix developed themselves… They only get credit for XenApp (AKA Metaframe) Citrix have a very powerful Marketing engine where they change product names faster than they change their underwear… Citrix offer “good” but not “great” solutions in each category F5 has technical superiority over Citrix F5 has market share over Citrix F5 / VMware Ecosystem is extremely strong Helps give customers confidence to virtualize mission critical apps. Removes performance issues caused by the Network. We are already selling to the same customers thru the same channel Citrix are afraid that we might compare notes… THEY SHOULD BE
  11. View requires SSL for its connections, and is normally handled by letting the connection servers terminate SSL. However as is well known in the networking world, having generic CPUs perform SSL termination is not the most cost effective way to handle large volumes of SSL. Function-specific devices with SSL cards are much faster at this, for a fraction of the cost. As such, offloading SSL encryption/decryption from VMware View Connection Servers (which have generic CPUs) and asking LTM to perform that function instead (using its SSL ASICs instead) allows you to run much higher SSL volumes though a relatively small and inexpensive server infrastructure. This in turn means that you have much higher virtual desktop density on your View connection servers. It’s all about economics here. Hardware and Virtual Edition both provide unique value to customers; we are in a unique position to help customers migrate to the cloud
  12. Comply with Strict Security Corporate Policies View Security Server can scale to 2000 users. It is tied in a 1:1 relationship with the Connection Server in the internal security zone. In order to scale beyond 2000 users there is a requirement to place a load balancer in front of multiple View Security Servers which are each tied in a 1:1 relationship with their own Connection Servers in the internal security zone.