SlideShare a Scribd company logo
1 of 22
Download to read offline
User Owned Devices




                     © Siemens AG 2009. All All rights reserved.
                           © Siemens AG 2009. rights reserved.
                        Siemens IT Solutions and Services / PTM DDC
Agenda



  1      Situation


  2      Solution


  3      Benefits


  4      Next Steps

                      © Siemens AG 2009. All rights reserved.
Page 2                       Siemens IT Solutions and Services
Often personal devices have more capabilities than
the professional ones


                     I carry two notebooks around with me as I use one for my development
                     work but I cannot access my email and business applications from it. Its
                     very frustrating!

                                                         And I use my personal laptop for
                                                         company presentations because it's
                                                         better set-up and easier to use.




     "My Tools vs. Our System"




                                                                   © Siemens AG 2009. All rights reserved.
Page 3                                                                    Siemens IT Solutions and Services
Boosting employee's satisfaction while reducing
costs – what a challenge!



                                My users are frustrated




         They love to use
          their own PC's


                    And my IT department
                     has many different
                      cost pressures!




             What if I could reduce the costs of procuring and managing devices?

                                                              © Siemens AG 2009. All rights reserved.
Page 4                                                               Siemens IT Solutions and Services
With Siemens, It's possible to combine private and
professional PC's in one device


IT Challenges

                                                                        What if you could
                 Security is paramount and it is too risky to          find a solution for a
 IT Department
                 allow                                                 secure and flexible
                                                                      working environment
                                                                           which is less
                 Its getting more expensive to stop our                    expensive …
 IT Department   employees using their personal devices
                 such as Mac Books and IPhones
                                                                        … and at the same
                                                                        time helps making
                                                                            users more
                 Can I reduce the costs of my IT                          productive and
 IT Department
                 infrastructure further?                                 satisfied at work?


With the User Owned Devices solution we enable people to work with a device of
their choice and use it for business use as well as for private purposes

                                                                © Siemens AG 2009. All rights reserved.
Page 5                                                                 Siemens IT Solutions and Services
Agenda



  1      Situation


  2      Solution


  3      Benefits


  4      Next Steps

                      © Siemens AG 2009. All rights reserved.
Page 6                       Siemens IT Solutions and Services
Virtualization is the heart of the User Owned Devices
solution




                                                Virtual Client
                                                Managed OS



                Apple (OS X)               Fujitsu Technology (XP)     Fujitsu Technology (Win 7)




                                              Lenovo (Linux)

The User Owned Device (UOD) approach supports the use of personal devices in the Enterprise.
The solution supports all types of hardware and any Operating System capable of running VM player
software.
                                                                       © Siemens AG 2009. All rights reserved.
Page 7                                                                        Siemens IT Solutions and Services
In a world of knowledge workers interaction takes
place in and out of the enterprise




                                               © Siemens AG 2009. All rights reserved.
Page 8                                                Siemens IT Solutions and Services
The solution covers several aspects with an
integrated approach


                               User Owned Devices

         Technical Solution       Legal Support          Financial Solution
   Desktop Virtualization     Clear understanding    Business Case / TCO
    "OS in an OS"               of device use,          Calculation
                                including formal
   VM user management                                 Tax Regulation
                                agreements
    portal for self-service                             Consulting
                               Legal Support and
   Cloning of physical                                Tax Consulting for
                                Consulting
    systems to VM – no                                  User Donations
    software installation      Optional Deployment
    and data migration          of Virtual Machines
   Secure data
    destruction and
    compliance processes


                                                      © Siemens AG 2009. All rights reserved.
Page 9                                                       Siemens IT Solutions and Services
The lifecycle is as simple as in a normal desktop
environment


                              User can use the                    User can request
                             managed corporate                    virtual OS images
                                  Normal               Order    Service Catalog
                             image. Security and                 alongside standard
                               Operations
                            patches are deployed
                                                      Process   and Order Entry
                                                                physical devices from
                            as per physical device                    a portal site

                                   Maintain                     Service Request




                                                                                                 User enters required
  The virtual image is
                                                                                                    metadata e.g.
  now installed like a                                                                                 Order
   Installations
    normal physical      Install                                             Workflow           personal data and cost
                                                                                                    Approvals
                                                                                                centre and passes for
 managed client device
                                                                                                      approval


                                            PC / Notebook / Apple MAC

                                   Deliver                              Build
                            Requested VM Image
                                                                   User downloads
                              is created by zero                 Virtual Machine
                              Deployments
                            touch installation into
                                                                 software to create an
                                                                      Creation
                                                                     empty image
                               the empty image


                                                                                © Siemens AG 2009. All rights reserved.
Page 10                                                                                  Siemens IT Solutions and Services
With User Owned Devices you can operate desktop
services according to your companies guidelines


                  Strict separation between host device and virtualized corporate
    LAN            layer
1   Security      Virtual hub divides corporate network traffic to the corporate
                   network and private network traffic to other / no network




    Data          Device- / File Encryption can be operated "as normal"
2   Protection    File transfer between personal / corporate layer can be restricted



                  Virus Protection on host system is operated by end-user /
    Virus          corporate virus protection on guest system "as normal"
3   Protection    Malware / virus transfer between personal / corporate layer can
                   be avoided effectively

                                                            © Siemens AG 2009. All rights reserved.
Page 11                                                            Siemens IT Solutions and Services
Your users partly take over the device responsibility



    Software       All software contained within the Virtual Application Is licensed
1   Licensing       and managed centrally in the same way as physical devices




    Application    Applications provided to users devices are secure within the
2   Integrity       virtual environment and cannot be saved locally



                   Software Management is administered in the same way as
                    physical devices, allowing central patching and upgrades to
    Software        applications
3   Management
                   It is responsibility of end user to ensure that local software and
                    operating systems are correctly licensed
                                                             © Siemens AG 2009. All rights reserved.
Page 12                                                             Siemens IT Solutions and Services
Agenda



  1       Situation


  2       Solution


  3       Benefits


  4       Next Steps

                       © Siemens AG 2009. All rights reserved.
Page 13                       Siemens IT Solutions and Services
User Owned Devices reduce the working capital tied
up in the business and increases the productivity



                Cost Reduction
                Flexibility and Reduced Dependency on Hardware, Operating
1   Customer
                 Systems, and Service Provider
                Reduces and Simplifies Transformation Efforts




                Increases User Productivity and Satisfaction

2   End User    Device Choice and Familiarity
                Opportunity to install / customize software



                                                         © Siemens AG 2009. All rights reserved.
Page 14                                                         Siemens IT Solutions and Services
How User Owned Devices reduce the TCO of
your company


          Workplace Services                                          User Owned Device

              Active Directory                                           Active Directory


  Client Configuration Management     Costs remain the same      Client Configuration Management
                                         as still required
          Customer Administration                                    Customer Administration

           Software Management                                        Software Management


          Hardware Procurement          Costs lower as UOD            Hardware Procurement
                                     Solution has less demands
    On-Site Incident Management                                   On-Site Incident Management


            Asset Management                                           Asset Management

               PC Hardware             Costs removed as not                PC Hardware
                                         required for UOD
  Help Desk (for Hardware Support)                               Help Desk (for Hardware Support)


                                                                   © Siemens AG 2009. All rights reserved.
Page 15                                                                   Siemens IT Solutions and Services
User Owned Devices leads you consequently to
                 Desktop Cloud Services – if you want
Business Value




                           Local Virtual              Desktop                    Host Based                     Desktop
                             Machine                Virtualisation             Virtual Machine               Cloud Services

                  User own Device concept     Siemens can centralize      With technology
                  to allow users to use       the delivery of these       enhancements, the
                  their own devices at work   services from its Global    virtual machine can
                                              Network of Data Centers     either be stored locally or
                                                                          in the data centre. This
                                              Siemens can deliver one
                                                                          enables the user to use
                                              standard solution
                                                                          the best possible
                                              worldwide to its global
                                                                          solution depending if
                                              customers
                                                                          they are mobile or in the
                                                                          office




                                              By delivery from its
                                              Global Production           By combining the              As cloud type services develop Siemens will
                                              Centers, Siemens can        benefits of the Local         be able to deliver the User Owned Device
                                              increase the availability   Virtual Machine and           services from Global Locations worldwide
                                              and locations that the      Desktop Virtualisation,       It will be possible to price the services on a
                  Hardware and Support        services are available      all hosted desktops can       usage model giving true value to the
                  costs lower as assets are   from, delivering at the     be administered and           customer that they are only charged when
                  no longer held at the       same price as a local       maintained from a central     their users are using the services provided to
                  company                     solution                    location                      them, from anywhere in the world

                                                                                                                      Technology Enhancements

                                                                                                               © Siemens AG 2009. All rights reserved.
                 Page 16                                                                                               Siemens IT Solutions and Services
Agenda



  1       Situation


  2       Solution


  3       Benefits


  4       Next Steps

                       © Siemens AG 2009. All rights reserved.
Page 17                       Siemens IT Solutions and Services
Interested in? Let's start with a Pilot!


                                       Account Manager and Service Offering manager
 Customer Readiness Check              meet to check criteria of customer to determine if
                                       suitable for a pilot

                                       Account Manager and Service Offering manager
 Customer Visit                        meet with the concept


                                       This is a 2 week study where the customer image
 Feasibility Study                     is used to develop a rough concept for UOD pilot

                                       Concept is presented to the customer to
 Present Basic concept                 demonstrate how the User Owned Device will look
                                       if developed
                                       2 week development where support for internal
 Customize Concept                     communications, support of workers council and
                                       internal communications are developed
                                       Customer feedback on Pilot concept with
 Customer Decision                     opportunity to clarify any open issues ahead of the
                                       pilot realisation

                                       All agreed and the pilot goes live with users
 Realize Pilot                         working on their own devices in the pilot group


                                                          © Siemens AG 2009. All rights reserved.
Page 18                                                          Siemens IT Solutions and Services
Contact



          Global Contact
          Korbinian Lehner
          Tel: +49-(0)89-636 48312
          Email: korbinian.lehner@siemens.com

          Country Contact
          < Given name Surname >
          Tel: +?? (???) ??? ????
          Email: email.address@siemens.com

          Website
          www.siemens.com/user-owned-devices



                               © Siemens AG 2009. All rights reserved.
                                     © Siemens AG 2009. All rights reserved.
                                  Siemens IT Solutions and Services / PTM DDC
Thank You!




             © Siemens AG 2009. All All rights reserved.
                   © Siemens AG 2009. rights reserved.
                Siemens IT Solutions and Services / PTM DDC
Backup




            © Siemens AG 2009. All rights reserved.
         Siemens IT Solutions and Services / PTM DDC
User Owned Devices also covers the most important
compliance aspects



    Compliance       Easier to secure and store compliance data, because all data is
1   Handling          included in the image




    Strict Layer     Strict separation between private and corporate data
2   Separation       If desired, local saving of corporate data can be restricted




                     Effective reporting of virtual layer management
    Central Layer
3   Management       Environment can be operated centrally complied to compliance
                      aspects

                                                               © Siemens AG 2009. All rights reserved.
Page 22                                                               Siemens IT Solutions and Services

More Related Content

What's hot

IBM Cloud Privé - White paper présentation EN
IBM Cloud Privé - White paper présentation ENIBM Cloud Privé - White paper présentation EN
IBM Cloud Privé - White paper présentation ENYves Bienenfeld
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplacebpaternoster
 
Essential Arb 2
Essential Arb 2Essential Arb 2
Essential Arb 2hinser14
 
Hp Fortify Mobile Application Security
Hp Fortify Mobile Application SecurityHp Fortify Mobile Application Security
Hp Fortify Mobile Application SecurityEd Wong
 
Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?vDesk.Works
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Khazret Sapenov
 
Techaisle-Desktop Virtualization-White Paper
Techaisle-Desktop Virtualization-White PaperTechaisle-Desktop Virtualization-White Paper
Techaisle-Desktop Virtualization-White PaperTechaisle
 
Virtual Desktop Infrastructure (VDI) Printing
Virtual Desktop Infrastructure (VDI) PrintingVirtual Desktop Infrastructure (VDI) Printing
Virtual Desktop Infrastructure (VDI) PrintingPlus Technologies
 
Electric Supply Distributor deploys virtual desktops for increased mobility, ...
Electric Supply Distributor deploys virtual desktops for increased mobility, ...Electric Supply Distributor deploys virtual desktops for increased mobility, ...
Electric Supply Distributor deploys virtual desktops for increased mobility, ...RingCube Technologies, Inc.
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityEd Wong
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyPrasanna Kumar Valluri
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Desktone
 

What's hot (17)

IBM Cloud Privé - White paper présentation EN
IBM Cloud Privé - White paper présentation ENIBM Cloud Privé - White paper présentation EN
IBM Cloud Privé - White paper présentation EN
 
VMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud EraVMworld 2014: End-User Computing for the Mobile-Cloud Era
VMworld 2014: End-User Computing for the Mobile-Cloud Era
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
 
Empower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, AmytimeEmpower Employee to Work Anyplace, Amytime
Empower Employee to Work Anyplace, Amytime
 
WTM Technical Writing example.pdf
WTM Technical Writing example.pdfWTM Technical Writing example.pdf
WTM Technical Writing example.pdf
 
Essential Arb 2
Essential Arb 2Essential Arb 2
Essential Arb 2
 
Hp Fortify Mobile Application Security
Hp Fortify Mobile Application SecurityHp Fortify Mobile Application Security
Hp Fortify Mobile Application Security
 
Data center terminology photostory
Data center terminology photostoryData center terminology photostory
Data center terminology photostory
 
Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?Why Should Businesses Deploy DaaS in 2021?
Why Should Businesses Deploy DaaS in 2021?
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...
 
Techaisle-Desktop Virtualization-White Paper
Techaisle-Desktop Virtualization-White PaperTechaisle-Desktop Virtualization-White Paper
Techaisle-Desktop Virtualization-White Paper
 
Virtual Desktop Infrastructure (VDI) Printing
Virtual Desktop Infrastructure (VDI) PrintingVirtual Desktop Infrastructure (VDI) Printing
Virtual Desktop Infrastructure (VDI) Printing
 
Electric Supply Distributor deploys virtual desktops for increased mobility, ...
Electric Supply Distributor deploys virtual desktops for increased mobility, ...Electric Supply Distributor deploys virtual desktops for increased mobility, ...
Electric Supply Distributor deploys virtual desktops for increased mobility, ...
 
Hp Fortify Cloud Application Security
Hp Fortify Cloud Application SecurityHp Fortify Cloud Application Security
Hp Fortify Cloud Application Security
 
Living in the Cloud
Living in the CloudLiving in the Cloud
Living in the Cloud
 
Discusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective StudyDiscusion on Cloud Computing Services:A Selective Study
Discusion on Cloud Computing Services:A Selective Study
 
Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?Virtual Desktops: How Secure Can They Be?
Virtual Desktops: How Secure Can They Be?
 

Viewers also liked

TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010Kim Jensen
 
Editingglossary
EditingglossaryEditingglossary
EditingglossaryRubiah69
 
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)Juan Jesús Baño Egea
 
Professionalisering af arbejdet_med_it_projekter_i_staten_web
Professionalisering af arbejdet_med_it_projekter_i_staten_webProfessionalisering af arbejdet_med_it_projekter_i_staten_web
Professionalisering af arbejdet_med_it_projekter_i_staten_webKim Jensen
 
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...RAMP Group
 
Czuję, że Białystok to moje miasto
Czuję, że Białystok to moje miastoCzuję, że Białystok to moje miasto
Czuję, że Białystok to moje miastoporanny24
 

Viewers also liked (7)

Blue train - África
Blue train - ÁfricaBlue train - África
Blue train - África
 
TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010TOP10 Security Predictions for 2010
TOP10 Security Predictions for 2010
 
Editingglossary
EditingglossaryEditingglossary
Editingglossary
 
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
Marco Común de COMPETENCIA DIGITAL DOCENTE (Borrador)
 
Professionalisering af arbejdet_med_it_projekter_i_staten_web
Professionalisering af arbejdet_med_it_projekter_i_staten_webProfessionalisering af arbejdet_med_it_projekter_i_staten_web
Professionalisering af arbejdet_med_it_projekter_i_staten_web
 
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
Giving up Gutenberg: Shaping the future of Internet publishing by shrugging o...
 
Czuję, że Białystok to moje miasto
Czuję, że Białystok to moje miastoCzuję, że Białystok to moje miasto
Czuję, że Białystok to moje miasto
 

Similar to User owned devices

OIB Brochure (Eng)
OIB Brochure (Eng)OIB Brochure (Eng)
OIB Brochure (Eng)dyanger
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudChris Pepin
 
VMware View 4
VMware View 4VMware View 4
VMware View 4netlogix
 
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization DayPresenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization DayThomas Kunz
 
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Peter Ocasek
 
Enabling Your Service Desk to be the Front Face to IT
Enabling Your Service Desk to be the Front Face to ITEnabling Your Service Desk to be the Front Face to IT
Enabling Your Service Desk to be the Front Face to ITCA Nimsoft
 
9sept2009 fujitsu
9sept2009 fujitsu9sept2009 fujitsu
9sept2009 fujitsuAgora Group
 
Symantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuiteSymantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuitePipeline Srl
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Omega Peripherals
 
Gen-i Cloud 101 presentation
Gen-i Cloud 101 presentationGen-i Cloud 101 presentation
Gen-i Cloud 101 presentationSimmy_online
 
Cut Costs - Fight Recession
Cut Costs - Fight RecessionCut Costs - Fight Recession
Cut Costs - Fight RecessionMomir Boskovic
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003bjhutt
 
Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5ukdpe
 

Similar to User owned devices (20)

OIB Brochure (Eng)
OIB Brochure (Eng)OIB Brochure (Eng)
OIB Brochure (Eng)
 
IBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM CloudIBM Smart Business Desktop on the IBM Cloud
IBM Smart Business Desktop on the IBM Cloud
 
VMware View 4
VMware View 4VMware View 4
VMware View 4
 
Ceedo Sales training
Ceedo Sales trainingCeedo Sales training
Ceedo Sales training
 
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization DayPresenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
 
Enterprise virtual machine on IBM Cloud
Enterprise virtual machine on IBM CloudEnterprise virtual machine on IBM Cloud
Enterprise virtual machine on IBM Cloud
 
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
 
Enabling Your Service Desk to be the Front Face to IT
Enabling Your Service Desk to be the Front Face to ITEnabling Your Service Desk to be the Front Face to IT
Enabling Your Service Desk to be the Front Face to IT
 
9sept2009 fujitsu
9sept2009 fujitsu9sept2009 fujitsu
9sept2009 fujitsu
 
Symantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization SuiteSymantec Endpoint Virtualization Suite
Symantec Endpoint Virtualization Suite
 
Dynamic Infrastructures Keynote
Dynamic Infrastructures KeynoteDynamic Infrastructures Keynote
Dynamic Infrastructures Keynote
 
Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1Presentación Novedades vSphere 5.1
Presentación Novedades vSphere 5.1
 
Gen-i Cloud 101 presentation
Gen-i Cloud 101 presentationGen-i Cloud 101 presentation
Gen-i Cloud 101 presentation
 
VISIT2008 Client Virtualization
VISIT2008 Client VirtualizationVISIT2008 Client Virtualization
VISIT2008 Client Virtualization
 
Cut Costs - Fight Recession
Cut Costs - Fight RecessionCut Costs - Fight Recession
Cut Costs - Fight Recession
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
VISIT2008 Client Virtualization
VISIT2008 Client VirtualizationVISIT2008 Client Virtualization
VISIT2008 Client Virtualization
 
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
Käyttäjien omat laitteet ja ohjelmistot työpaikoilla - Esa Aho 31.5.2012
 
Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003Virtual Insight Linked In Wi 2003
Virtual Insight Linked In Wi 2003
 
Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5Overview of Microsoft App-V 4.5
Overview of Microsoft App-V 4.5
 

More from Kim Jensen

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter packKim Jensen
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Kim Jensen
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Kim Jensen
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportKim Jensen
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat ReportKim Jensen
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UKKim Jensen
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Kim Jensen
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012Kim Jensen
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Kim Jensen
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Kim Jensen
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011Kim Jensen
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Kim Jensen
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web SecurityKim Jensen
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011Kim Jensen
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Kim Jensen
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Kim Jensen
 
Sådan kommer du i gang med skyen (pdf)
Sådan kommer du i gang med skyen (pdf)Sådan kommer du i gang med skyen (pdf)
Sådan kommer du i gang med skyen (pdf)Kim Jensen
 

More from Kim Jensen (20)

Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
OpenDNS presenter pack
OpenDNS presenter packOpenDNS presenter pack
OpenDNS presenter pack
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015Hewlett-Packard Enterprise- State of Security Operations 2015
Hewlett-Packard Enterprise- State of Security Operations 2015
 
Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014Secunia Vulnerability Review 2014
Secunia Vulnerability Review 2014
 
Cisco 2013 Annual Security Report
Cisco 2013 Annual Security ReportCisco 2013 Annual Security Report
Cisco 2013 Annual Security Report
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Security Survey 2013 UK
Security Survey 2013 UKSecurity Survey 2013 UK
Security Survey 2013 UK
 
Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report Miercom Security Effectiveness Test Report
Miercom Security Effectiveness Test Report
 
DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012DK Cert Trend Rapport 2012
DK Cert Trend Rapport 2012
 
Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)Bliv klar til cloud med Citrix Netscaler (pdf)
Bliv klar til cloud med Citrix Netscaler (pdf)
 
Data Breach Investigations Report 2012
Data Breach Investigations Report 2012Data Breach Investigations Report 2012
Data Breach Investigations Report 2012
 
State of Web Q3 2011
State of Web Q3 2011State of Web Q3 2011
State of Web Q3 2011
 
Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011Wave mobile collaboration Q3 2011
Wave mobile collaboration Q3 2011
 
Corporate Web Security
Corporate Web SecurityCorporate Web Security
Corporate Web Security
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Cloud rambøll mgmt - briefing d. 28. januar 2011
Cloud   rambøll mgmt - briefing d. 28. januar 2011Cloud   rambøll mgmt - briefing d. 28. januar 2011
Cloud rambøll mgmt - briefing d. 28. januar 2011
 
Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011Cloud security deep dive infoworld jan 2011
Cloud security deep dive infoworld jan 2011
 
Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010Cloud services deep dive infoworld july 2010
Cloud services deep dive infoworld july 2010
 
Sådan kommer du i gang med skyen (pdf)
Sådan kommer du i gang med skyen (pdf)Sådan kommer du i gang med skyen (pdf)
Sådan kommer du i gang med skyen (pdf)
 

Recently uploaded

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 

Recently uploaded (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 

User owned devices

  • 1. User Owned Devices © Siemens AG 2009. All All rights reserved. © Siemens AG 2009. rights reserved. Siemens IT Solutions and Services / PTM DDC
  • 2. Agenda 1 Situation 2 Solution 3 Benefits 4 Next Steps © Siemens AG 2009. All rights reserved. Page 2 Siemens IT Solutions and Services
  • 3. Often personal devices have more capabilities than the professional ones I carry two notebooks around with me as I use one for my development work but I cannot access my email and business applications from it. Its very frustrating! And I use my personal laptop for company presentations because it's better set-up and easier to use. "My Tools vs. Our System" © Siemens AG 2009. All rights reserved. Page 3 Siemens IT Solutions and Services
  • 4. Boosting employee's satisfaction while reducing costs – what a challenge! My users are frustrated They love to use their own PC's And my IT department has many different cost pressures! What if I could reduce the costs of procuring and managing devices? © Siemens AG 2009. All rights reserved. Page 4 Siemens IT Solutions and Services
  • 5. With Siemens, It's possible to combine private and professional PC's in one device IT Challenges What if you could Security is paramount and it is too risky to find a solution for a IT Department allow secure and flexible working environment which is less Its getting more expensive to stop our expensive … IT Department employees using their personal devices such as Mac Books and IPhones … and at the same time helps making users more Can I reduce the costs of my IT productive and IT Department infrastructure further? satisfied at work? With the User Owned Devices solution we enable people to work with a device of their choice and use it for business use as well as for private purposes © Siemens AG 2009. All rights reserved. Page 5 Siemens IT Solutions and Services
  • 6. Agenda 1 Situation 2 Solution 3 Benefits 4 Next Steps © Siemens AG 2009. All rights reserved. Page 6 Siemens IT Solutions and Services
  • 7. Virtualization is the heart of the User Owned Devices solution Virtual Client Managed OS Apple (OS X) Fujitsu Technology (XP) Fujitsu Technology (Win 7) Lenovo (Linux) The User Owned Device (UOD) approach supports the use of personal devices in the Enterprise. The solution supports all types of hardware and any Operating System capable of running VM player software. © Siemens AG 2009. All rights reserved. Page 7 Siemens IT Solutions and Services
  • 8. In a world of knowledge workers interaction takes place in and out of the enterprise © Siemens AG 2009. All rights reserved. Page 8 Siemens IT Solutions and Services
  • 9. The solution covers several aspects with an integrated approach User Owned Devices Technical Solution Legal Support Financial Solution  Desktop Virtualization  Clear understanding  Business Case / TCO "OS in an OS" of device use, Calculation including formal  VM user management  Tax Regulation agreements portal for self-service Consulting  Legal Support and  Cloning of physical  Tax Consulting for Consulting systems to VM – no User Donations software installation  Optional Deployment and data migration of Virtual Machines  Secure data destruction and compliance processes © Siemens AG 2009. All rights reserved. Page 9 Siemens IT Solutions and Services
  • 10. The lifecycle is as simple as in a normal desktop environment User can use the User can request managed corporate virtual OS images Normal Order Service Catalog image. Security and alongside standard Operations patches are deployed Process and Order Entry physical devices from as per physical device a portal site Maintain Service Request User enters required The virtual image is metadata e.g. now installed like a Order Installations normal physical Install Workflow personal data and cost Approvals centre and passes for managed client device approval PC / Notebook / Apple MAC Deliver Build Requested VM Image User downloads is created by zero Virtual Machine Deployments touch installation into software to create an Creation empty image the empty image © Siemens AG 2009. All rights reserved. Page 10 Siemens IT Solutions and Services
  • 11. With User Owned Devices you can operate desktop services according to your companies guidelines  Strict separation between host device and virtualized corporate LAN layer 1 Security  Virtual hub divides corporate network traffic to the corporate network and private network traffic to other / no network Data  Device- / File Encryption can be operated "as normal" 2 Protection  File transfer between personal / corporate layer can be restricted  Virus Protection on host system is operated by end-user / Virus corporate virus protection on guest system "as normal" 3 Protection  Malware / virus transfer between personal / corporate layer can be avoided effectively © Siemens AG 2009. All rights reserved. Page 11 Siemens IT Solutions and Services
  • 12. Your users partly take over the device responsibility Software  All software contained within the Virtual Application Is licensed 1 Licensing and managed centrally in the same way as physical devices Application  Applications provided to users devices are secure within the 2 Integrity virtual environment and cannot be saved locally  Software Management is administered in the same way as physical devices, allowing central patching and upgrades to Software applications 3 Management  It is responsibility of end user to ensure that local software and operating systems are correctly licensed © Siemens AG 2009. All rights reserved. Page 12 Siemens IT Solutions and Services
  • 13. Agenda 1 Situation 2 Solution 3 Benefits 4 Next Steps © Siemens AG 2009. All rights reserved. Page 13 Siemens IT Solutions and Services
  • 14. User Owned Devices reduce the working capital tied up in the business and increases the productivity  Cost Reduction  Flexibility and Reduced Dependency on Hardware, Operating 1 Customer Systems, and Service Provider  Reduces and Simplifies Transformation Efforts  Increases User Productivity and Satisfaction 2 End User  Device Choice and Familiarity  Opportunity to install / customize software © Siemens AG 2009. All rights reserved. Page 14 Siemens IT Solutions and Services
  • 15. How User Owned Devices reduce the TCO of your company Workplace Services User Owned Device Active Directory Active Directory Client Configuration Management Costs remain the same Client Configuration Management as still required Customer Administration Customer Administration Software Management Software Management Hardware Procurement Costs lower as UOD Hardware Procurement Solution has less demands On-Site Incident Management On-Site Incident Management Asset Management Asset Management PC Hardware Costs removed as not PC Hardware required for UOD Help Desk (for Hardware Support) Help Desk (for Hardware Support) © Siemens AG 2009. All rights reserved. Page 15 Siemens IT Solutions and Services
  • 16. User Owned Devices leads you consequently to Desktop Cloud Services – if you want Business Value Local Virtual Desktop Host Based Desktop Machine Virtualisation Virtual Machine Cloud Services User own Device concept Siemens can centralize With technology to allow users to use the delivery of these enhancements, the their own devices at work services from its Global virtual machine can Network of Data Centers either be stored locally or in the data centre. This Siemens can deliver one enables the user to use standard solution the best possible worldwide to its global solution depending if customers they are mobile or in the office By delivery from its Global Production By combining the As cloud type services develop Siemens will Centers, Siemens can benefits of the Local be able to deliver the User Owned Device increase the availability Virtual Machine and services from Global Locations worldwide and locations that the Desktop Virtualisation, It will be possible to price the services on a Hardware and Support services are available all hosted desktops can usage model giving true value to the costs lower as assets are from, delivering at the be administered and customer that they are only charged when no longer held at the same price as a local maintained from a central their users are using the services provided to company solution location them, from anywhere in the world Technology Enhancements © Siemens AG 2009. All rights reserved. Page 16 Siemens IT Solutions and Services
  • 17. Agenda 1 Situation 2 Solution 3 Benefits 4 Next Steps © Siemens AG 2009. All rights reserved. Page 17 Siemens IT Solutions and Services
  • 18. Interested in? Let's start with a Pilot! Account Manager and Service Offering manager Customer Readiness Check meet to check criteria of customer to determine if suitable for a pilot Account Manager and Service Offering manager Customer Visit meet with the concept This is a 2 week study where the customer image Feasibility Study is used to develop a rough concept for UOD pilot Concept is presented to the customer to Present Basic concept demonstrate how the User Owned Device will look if developed 2 week development where support for internal Customize Concept communications, support of workers council and internal communications are developed Customer feedback on Pilot concept with Customer Decision opportunity to clarify any open issues ahead of the pilot realisation All agreed and the pilot goes live with users Realize Pilot working on their own devices in the pilot group © Siemens AG 2009. All rights reserved. Page 18 Siemens IT Solutions and Services
  • 19. Contact Global Contact Korbinian Lehner Tel: +49-(0)89-636 48312 Email: korbinian.lehner@siemens.com Country Contact < Given name Surname > Tel: +?? (???) ??? ???? Email: email.address@siemens.com Website www.siemens.com/user-owned-devices © Siemens AG 2009. All rights reserved. © Siemens AG 2009. All rights reserved. Siemens IT Solutions and Services / PTM DDC
  • 20. Thank You! © Siemens AG 2009. All All rights reserved. © Siemens AG 2009. rights reserved. Siemens IT Solutions and Services / PTM DDC
  • 21. Backup © Siemens AG 2009. All rights reserved. Siemens IT Solutions and Services / PTM DDC
  • 22. User Owned Devices also covers the most important compliance aspects Compliance  Easier to secure and store compliance data, because all data is 1 Handling included in the image Strict Layer  Strict separation between private and corporate data 2 Separation  If desired, local saving of corporate data can be restricted  Effective reporting of virtual layer management Central Layer 3 Management  Environment can be operated centrally complied to compliance aspects © Siemens AG 2009. All rights reserved. Page 22 Siemens IT Solutions and Services