SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Desktop Transformation:
                                               How to Transform Windows
                                               Desktops into Managed Workspaces

Executive Summary
IT departments are continuously changing their             removable disk security - are often solved using so-
desktop infrastructure following requests for new          called “point solutions”. A point solution is standalone
functionality, cost savings and overall quality            technology for a specific problem often requiring
improvements (e.g. integrity and performance). These       additional management and understanding. Multiple
days, such changes often have an impact on the way         point solutions are difficult to sustain in the long run.
end users work with desktops.                              They lead to more complexity and increase the
                                                           overhead costs of operating desktop infrastructures
Some examples of potential desktop infrastructure          and IT departments.
changes are:
                                                           In order ensure that the transition to a new or
        Centralization through virtual desktop            improved desktop infrastructure runs smoothly, user
         computing / hosted desktop computing              workspace management solutions as essential. Once
        Upgrade from Microsoft Windows XP to              user workspaces are in place, any component of the
         Microsoft Windows 7                               desktop infrastructure can be replaced without
        Upgrade from Microsoft Office 2003 to             impacting user productivity or losing maximum control
         Microsoft Office 2010                             throughout the transition process.
        Implementation of location-based printing
        Implementation removable disk security            Desktop Transformation solves the problem of how to
                                                           make the move from a desktop situation to managed
The first three examples represent comprehensive           user workspaces. This technology enables IT
projects involving moving end users to a “new”             professionals to transform desktops into managed user
desktop infrastructure. The complexity of these            workspaces step-by-step, while maintaining a clear
projects makes them difficult to plan and control due      picture of the effects each action has.
to the time and resources required, which means the
impact on the end user’s productivity can be               This paper describes the concepts of Desktop
substantial and unpredictable.                             Transformation and how Desktop Transformation
                                                           technology can help organizations progress towards
The last two examples of changes - implementation of       managed user workspaces without having a negative
location-based printing and the implementation of          impact on user productivity.



What is Desktop Transformation?
Desktop Transformation is the step-by-step                 The desktop transformation process consists of 5
transformation of static, user- and computer-centric       consecutive steps:
desktop items into a user workspace that allows
dynamic, context-aware and independent access to                1.   Gather live data from existing desktops
any configuration of applications, data and printers            2.   Analyze the data for context
without changing the following:                                 3.   Create workspace items and review impact
                                                                4.   Set up the workspace model
        Desktop and application delivery                       5.   Transform existing desktops in small steps, by
         infrastructure                                              focusing on today’s challenges first
        Operating system
        Applications (version)                            Gathering Live Data
                                                           To get from the current desktop situation to managed
The user workspace does not substitute the desktop;        user workspaces without impacting users, it is
instead it works dynamically with it to manage             essential to gather information about how desktops
desktop items independently from the underlying            are currently being used. This information can be
computer and user technologies.                            gathered in the form of desktop samples, which are




Desktop Transformation                               v.1.0-9.16.10                                        Page 1 of 3
created by Desktop Sampler. This runs unobtrusively          Setting Up the Workspace Model
as a standalone component on users’ desktops.                The Workspace Model, another Desktop
                                                             Transformation component of the management
The samples hold encrypted information on available          console, enables IT professionals to control which
desktop items, such as applications, mappings and            parts of the user workspace will be composed and
printers, as well as a user’s context (name, group           secured by the Workspace Composer. These managed
membership, IP address, type of computer etc.). This         workspace items will co-exist on a user’s desktop with
information is stored in a central location.                 all the unmanaged workspace items, so that any
                                                             impact is minimal.
Analyzing the Data
The Workspace Designer, a Desktop Transformation
                                                             A mix of different workspace models can
component which is a part of the management
                                                             accommodate different kinds of users and desktops. A
console, helps IT professionals set up user workspaces.
                                                             workspace model evolves over time, so a
First of all, the IT professional sets up how context
                                                             transformation can now be controlled step-by-step,
should be established for:
                                                             tackling one challenge at a time.
        Directory services
                                                             Transforming the Desktop
        Location and devices                                The Workspace Composer running on the Windows
                                                             desktop will use the workspace model and other
The Workspace Designer then analyzes the context             information from the management console to establish
information in the desktop samples and suggests              the context of the user and to compose and secure the
suitable rules for establishing context.                     user workspace (or parts of it being managed at the
                                                             time) without altering the rest of the desktop.
The IT professional is now ready to start analyzing
desktop items and starts off by selecting a category:
                                                             Components of Desktop Transformation
                                                             Desktop Transformation consists of the following key
        Applications
                                                             components:
        Data Sources
        Drive and port mapping                                       Desktop Sampler
        Drive substitutes                                            Management Console
        Printers                                                     Workspace Designer
                                                                      Workspace Model
The Workspace Designer then analyzes the samples                      Workspace Composer
and provides a list of items found (from most common
to least common).                                            Together, these components ensure a successful and
                                                             safe transformation from the current desktop situation
Creating Workspace Items                                     to managed user workspaces.
The IT professional selects one desktop item from the        The Desktop Sampler is standalone technology capable
list for further processing. The Workspace Designer          of unobtrusively collecting information on how
compares each possible context with the actual               existing unmanaged desktops are being used. The
desktop samples and analyzes:                                information that is collected is stored in a central
        Which users have access and would keep it           location for later use by the Workspace Designer.
        Which users have access but would lose it           IT professionals use a management console to create a
        Which users that currently do not have access       list of all possible desktop items that need to be
         would be given it                                   composed and secured in a user workspace. This
                                                             console is the main interface for IT professionals. It
This information allows IT professionals to pick the
                                                             features the Workspace Designer that helps IT
right set of suggested access rules. The Workspace
                                                             professionals create workspace items.
Designer creates and configures the new workspace
item according to the chosen desktop item and the
access rules selected.




Desktop Transformation                                 v.1.0-9.16.10                                      Page 2 of 3
The Workspace Model controls which items should be       Workspace Composer running on a Windows desktop
composed and secured. It is the only place IT            will use this local information and the context of the
professionals needs to go to manage user workspaces.     user to compose and secure the user workspace, or
The management console stores all the supplied           parts of it. As someone works in their user workspace,
information in a database.                               information is collected by the Workspace Composer
                                                         in transactions. These transactions are applied to the
Each desktop with the Workspace Composer installed
                                                         central database by the agent service whenever it can
has an agent service that retrieves the information
                                                         access the central database.
from the database and stores it locally. The


Conclusion
Desktop Transformation solves the problem of how to
make the move from a desktop situation to managed        Desktop Transformation is an integral part of RES
user workspaces.                                         Workspace Manager 2011 user workspace management
                                                         software from RES Software. For more information
By using the Desktop Sampler, the Workspace              please visit www.ressoftware.com. In addition to
Designer, and the Workspace Model together, IT           learning more about Workspace Manager, you can also
professionals are able to transform desktops to          download a 60-day evaluation version, so you can see
managed user workspaces step-by-step, while              for yourself how Desktop Transformation can help your
monitoring each action’s effects on users.               organization.


RES Software

RES Software, the proven leader in dynamic desktop solutions, is driving a transformation in the way
organizations manage, maintain and reduce the cost of their desktop infrastructure. The RES Software award-
winning, patented products enable IT professionals to manage and deliver secure, personalized and compliant
desktops independent of the underlying computing infrastructure – thin clients, virtual desktops, physical
desktops, or server-based computing environments. The company empowers customers, from small to medium-
sized businesses to global enterprises, to reduce desktop complexity and meet the essential needs of a dynamic
workforce that requires on-demand access to their personalized workspaces. For more information, follow
updates on Twitter @RESSoftware and visit www.ressoftware.com.




Desktop Transformation                             v.1.0-9.16.10                                      Page 3 of 3

Mais conteúdo relacionado

Mais de GuardEra Access Solutions, Inc.

Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
GuardEra Access Solutions, Inc.
 

Mais de GuardEra Access Solutions, Inc. (20)

Deepwater Horizon
Deepwater HorizonDeepwater Horizon
Deepwater Horizon
 
Cloud Computing Payback
Cloud Computing PaybackCloud Computing Payback
Cloud Computing Payback
 
10844 5415 The Value Of Corporate Secrets
10844 5415 The Value Of Corporate Secrets10844 5415 The Value Of Corporate Secrets
10844 5415 The Value Of Corporate Secrets
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
2010 New Guidelines Hipaa Checklist V1
2010 New Guidelines Hipaa Checklist V12010 New Guidelines Hipaa Checklist V1
2010 New Guidelines Hipaa Checklist V1
 
2010 Hipaa Rules 011310
2010 Hipaa Rules 0113102010 Hipaa Rules 011310
2010 Hipaa Rules 011310
 
Og Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact ReportOg Disparate It Mgmt Tool Impact Report
Og Disparate It Mgmt Tool Impact Report
 
Accel Ops Brochure0609
Accel Ops Brochure0609Accel Ops Brochure0609
Accel Ops Brochure0609
 
Healthcare Data Security Update
Healthcare Data Security UpdateHealthcare Data Security Update
Healthcare Data Security Update
 
HITECH Act
HITECH ActHITECH Act
HITECH Act
 
EMR Yes- No
EMR Yes- NoEMR Yes- No
EMR Yes- No
 
SourceFire IPS Overview
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS Overview
 
Closing the Clinical IT Chasm
Closing the Clinical IT ChasmClosing the Clinical IT Chasm
Closing the Clinical IT Chasm
 
Valiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & CostValiente Balancing It SecurityCompliance, Complexity & Cost
Valiente Balancing It SecurityCompliance, Complexity & Cost
 
2009 Databreach Report
2009 Databreach Report2009 Databreach Report
2009 Databreach Report
 
Mini IT Security Assessment
Mini IT Security AssessmentMini IT Security Assessment
Mini IT Security Assessment
 
Enabling Healthcare Reform Using IT
Enabling Healthcare Reform Using ITEnabling Healthcare Reform Using IT
Enabling Healthcare Reform Using IT
 
Thisa Lite Message
Thisa Lite MessageThisa Lite Message
Thisa Lite Message
 
Thisa Customer Presentation Ga
Thisa Customer Presentation GaThisa Customer Presentation Ga
Thisa Customer Presentation Ga
 
Medappz Thisa Isuite Presentation
Medappz Thisa Isuite PresentationMedappz Thisa Isuite Presentation
Medappz Thisa Isuite Presentation
 

How To Transform Windows Desktops Into Managed Workspaces

  • 1. Desktop Transformation: How to Transform Windows Desktops into Managed Workspaces Executive Summary IT departments are continuously changing their removable disk security - are often solved using so- desktop infrastructure following requests for new called “point solutions”. A point solution is standalone functionality, cost savings and overall quality technology for a specific problem often requiring improvements (e.g. integrity and performance). These additional management and understanding. Multiple days, such changes often have an impact on the way point solutions are difficult to sustain in the long run. end users work with desktops. They lead to more complexity and increase the overhead costs of operating desktop infrastructures Some examples of potential desktop infrastructure and IT departments. changes are: In order ensure that the transition to a new or  Centralization through virtual desktop improved desktop infrastructure runs smoothly, user computing / hosted desktop computing workspace management solutions as essential. Once  Upgrade from Microsoft Windows XP to user workspaces are in place, any component of the Microsoft Windows 7 desktop infrastructure can be replaced without  Upgrade from Microsoft Office 2003 to impacting user productivity or losing maximum control Microsoft Office 2010 throughout the transition process.  Implementation of location-based printing  Implementation removable disk security Desktop Transformation solves the problem of how to make the move from a desktop situation to managed The first three examples represent comprehensive user workspaces. This technology enables IT projects involving moving end users to a “new” professionals to transform desktops into managed user desktop infrastructure. The complexity of these workspaces step-by-step, while maintaining a clear projects makes them difficult to plan and control due picture of the effects each action has. to the time and resources required, which means the impact on the end user’s productivity can be This paper describes the concepts of Desktop substantial and unpredictable. Transformation and how Desktop Transformation technology can help organizations progress towards The last two examples of changes - implementation of managed user workspaces without having a negative location-based printing and the implementation of impact on user productivity. What is Desktop Transformation? Desktop Transformation is the step-by-step The desktop transformation process consists of 5 transformation of static, user- and computer-centric consecutive steps: desktop items into a user workspace that allows dynamic, context-aware and independent access to 1. Gather live data from existing desktops any configuration of applications, data and printers 2. Analyze the data for context without changing the following: 3. Create workspace items and review impact 4. Set up the workspace model  Desktop and application delivery 5. Transform existing desktops in small steps, by infrastructure focusing on today’s challenges first  Operating system  Applications (version) Gathering Live Data To get from the current desktop situation to managed The user workspace does not substitute the desktop; user workspaces without impacting users, it is instead it works dynamically with it to manage essential to gather information about how desktops desktop items independently from the underlying are currently being used. This information can be computer and user technologies. gathered in the form of desktop samples, which are Desktop Transformation v.1.0-9.16.10 Page 1 of 3
  • 2. created by Desktop Sampler. This runs unobtrusively Setting Up the Workspace Model as a standalone component on users’ desktops. The Workspace Model, another Desktop Transformation component of the management The samples hold encrypted information on available console, enables IT professionals to control which desktop items, such as applications, mappings and parts of the user workspace will be composed and printers, as well as a user’s context (name, group secured by the Workspace Composer. These managed membership, IP address, type of computer etc.). This workspace items will co-exist on a user’s desktop with information is stored in a central location. all the unmanaged workspace items, so that any impact is minimal. Analyzing the Data The Workspace Designer, a Desktop Transformation A mix of different workspace models can component which is a part of the management accommodate different kinds of users and desktops. A console, helps IT professionals set up user workspaces. workspace model evolves over time, so a First of all, the IT professional sets up how context transformation can now be controlled step-by-step, should be established for: tackling one challenge at a time.  Directory services Transforming the Desktop  Location and devices The Workspace Composer running on the Windows desktop will use the workspace model and other The Workspace Designer then analyzes the context information from the management console to establish information in the desktop samples and suggests the context of the user and to compose and secure the suitable rules for establishing context. user workspace (or parts of it being managed at the time) without altering the rest of the desktop. The IT professional is now ready to start analyzing desktop items and starts off by selecting a category: Components of Desktop Transformation Desktop Transformation consists of the following key  Applications components:  Data Sources  Drive and port mapping  Desktop Sampler  Drive substitutes  Management Console  Printers  Workspace Designer  Workspace Model The Workspace Designer then analyzes the samples  Workspace Composer and provides a list of items found (from most common to least common). Together, these components ensure a successful and safe transformation from the current desktop situation Creating Workspace Items to managed user workspaces. The IT professional selects one desktop item from the The Desktop Sampler is standalone technology capable list for further processing. The Workspace Designer of unobtrusively collecting information on how compares each possible context with the actual existing unmanaged desktops are being used. The desktop samples and analyzes: information that is collected is stored in a central  Which users have access and would keep it location for later use by the Workspace Designer.  Which users have access but would lose it IT professionals use a management console to create a  Which users that currently do not have access list of all possible desktop items that need to be would be given it composed and secured in a user workspace. This console is the main interface for IT professionals. It This information allows IT professionals to pick the features the Workspace Designer that helps IT right set of suggested access rules. The Workspace professionals create workspace items. Designer creates and configures the new workspace item according to the chosen desktop item and the access rules selected. Desktop Transformation v.1.0-9.16.10 Page 2 of 3
  • 3. The Workspace Model controls which items should be Workspace Composer running on a Windows desktop composed and secured. It is the only place IT will use this local information and the context of the professionals needs to go to manage user workspaces. user to compose and secure the user workspace, or The management console stores all the supplied parts of it. As someone works in their user workspace, information in a database. information is collected by the Workspace Composer in transactions. These transactions are applied to the Each desktop with the Workspace Composer installed central database by the agent service whenever it can has an agent service that retrieves the information access the central database. from the database and stores it locally. The Conclusion Desktop Transformation solves the problem of how to make the move from a desktop situation to managed Desktop Transformation is an integral part of RES user workspaces. Workspace Manager 2011 user workspace management software from RES Software. For more information By using the Desktop Sampler, the Workspace please visit www.ressoftware.com. In addition to Designer, and the Workspace Model together, IT learning more about Workspace Manager, you can also professionals are able to transform desktops to download a 60-day evaluation version, so you can see managed user workspaces step-by-step, while for yourself how Desktop Transformation can help your monitoring each action’s effects on users. organization. RES Software RES Software, the proven leader in dynamic desktop solutions, is driving a transformation in the way organizations manage, maintain and reduce the cost of their desktop infrastructure. The RES Software award- winning, patented products enable IT professionals to manage and deliver secure, personalized and compliant desktops independent of the underlying computing infrastructure – thin clients, virtual desktops, physical desktops, or server-based computing environments. The company empowers customers, from small to medium- sized businesses to global enterprises, to reduce desktop complexity and meet the essential needs of a dynamic workforce that requires on-demand access to their personalized workspaces. For more information, follow updates on Twitter @RESSoftware and visit www.ressoftware.com. Desktop Transformation v.1.0-9.16.10 Page 3 of 3