SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Zero Client Computing
     Taking the Desktop into the Cloud
Zero Client Computing
 Radical Centralization. Simple. Complete. Here for Name
                                       Click
                                         Click Here for Title
                                         Click Here for Date
What is Client Computing?



  Excessive Costs               Overburdened                          Security and
   Capex & Opex                 Management                           Compliance Risk
• 3-5 Year Refresh Cycles   • Multiple Vendors                    • Endpoint Breaches
• Hidden Costs from Gap     • Multiple Products                   • Regulatory Compliance
  Filling Technologies                                            HIPAA, SEC, Grahm Leach-
                            • User Customizations with            Bliley
• High Operating Expenses   Different Systems, Users,
                            Images, Applications                  • Intellectual Assets at Risk
• Exorbitant Energy Costs
                            • Distributed PC Architecture         • Unpredictable user activity




                              Copyright © 2010 Pano Logic, Inc.
What is Zero Client Computing?
• Eliminate the desktop PC.
• Move 100% of client software into the
  cloud.
• Leverage the power of cloud computing.
• No Management at the Desk.




               Copyright © 2010 Pano Logic, Inc.
Why Move Desktop to the Cloud?
                               Centralized Management
Management                     Automation & Orchestration
                               No Break-fix Cycle


                               No Data Leaves the Cloud
    Security                   Centralized Security & Policy
                               No Viruses

                               Access from Anywhere
  Flexibility                  Policy-Based Provisioning
                               Business Agility

                Copyright © 2010 Pano Logic, Inc.
Desktop Management in the Cloud
                  Brokering

 Monitoring                                         Provisioning



Reporting                                            Orchestration



    Security                                       Entitlement

                       Policy
               Copyright © 2010 Pano Logic, Inc.
What’s at the desk?
• Ideally, nothing.
• Need some sort of I/O Concentrator.

                                                     +
• Definitely, no compute capability.




                 Copyright © 2010 Pano Logic, Inc.
Zero Client
     No Processor (CPU)

     No System Memory (RAM)

     No Persistent Memory (e.g. Disk or SSD)

     No Software

     No Firmware

     No Drivers
                  Copyright © 2010 Pano Logic, Inc.
Why Not a Thin Client?
Thin Clients Require Management.
Thin Clients are for Terminal Services.
Thin Clients are Expensive.
Thin Clients are Complex.


     Zero Clients are the Future.
        Simple. Secure. Affordable.


                 Copyright © 2010 Pano Logic, Inc.
Cloud Ready Desktop Computing
                                             Cloud                                            Endpoint
                                                                                          Data
                                                                                      Applications
                         PC




                                                                                                          Management Complexity
                                                                                                          Management Complexity
                                                                                      Management
                                                                                        Drivers
        Centralization




                                                                                    Operating System



                                                                                          Data
                         Services
                         Terminal




                                            Applications                              Applications
                                            Management                                Management
                                                                                        Drivers
                                          Operating System                          Operating System
                         Virtualization




                                                                                          Data
                           (PC/TC)




                                                                                      Applications
                                            Management            VM                  Management
                                                                  VM                    Drivers
                                          Operating System        VM                Operating System



                                                                                          Data
                         Pano Zero




                                                                                      Applications        Eliminates
                           Client




                                                                  VM
      100%                                                                            Management           Endpoint
                                                                  VM                    Drivers
    Centralized                                                                                          Management
                                                                  VM                Operating System




9                                                            Copyright © 2010 Pano Logic, Inc.
What is a PC?
    O/S, Software, Drivers, Compute




             Input/Output

              Copyright © 2010 Pano Logic, Inc.
What is a Thin Client?
  Two PC’s to do what my one
       PC used to do???
 PC in the Cloud                                                  PC # 2



            Cloud                                       Thin Client




                    Copyright © 2010 Pano Logic, Inc.
What is a Zero Client?
                                                  No CPU
   100% of Software                             No Software
     in the Cloud                              No Management
          Cloud                                        Zero Client

                                                   Input/Output
                                                    At the Desk




 O/S, Software,
Drivers, Compute
                   Copyright © 2010 Pano Logic, Inc.
  In the Cloud
Summary
        Compute = Management

         Compute in the Cloud                     100%


            I/O at the Desk

  Brokering. Provisioning. Automation.

        Save Money. Save Time.

       Choose the Right Vendor.

              Copyright © 2010 Pano Logic, Inc.
Simple. Secure. Complete.
                            Click Here for Name
             Info Security Exhibition - for Title
                             Click Here Kuwait
                             Click Here for 20-21
                                  Stand # Date

Mais conteúdo relacionado

Mais procurados

Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...IBM Danmark
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Managementdavidzucker
 
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!wwwally
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guidenajeeb625
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcarejckirby
 
IBM SmartCloud Enterprise
IBM SmartCloud EnterpriseIBM SmartCloud Enterprise
IBM SmartCloud EnterpriseIBM Danmark
 
IT FUTURE 2011 - Le future du poste de travail
IT FUTURE 2011 - Le future du poste de travailIT FUTURE 2011 - Le future du poste de travail
IT FUTURE 2011 - Le future du poste de travailFujitsu France
 
Pb 0160 I Pedge Rev4 Fyi
Pb 0160 I Pedge Rev4 FyiPb 0160 I Pedge Rev4 Fyi
Pb 0160 I Pedge Rev4 FyiBridget Deets
 
Comprendre l’offre IBM SmartCloud Foundation, Zoom sur PureSystems
Comprendre l’offre  IBM SmartCloud Foundation, Zoom sur PureSystems Comprendre l’offre  IBM SmartCloud Foundation, Zoom sur PureSystems
Comprendre l’offre IBM SmartCloud Foundation, Zoom sur PureSystems Claude Riousset
 
Jobo 1 ims_tm_value_2012_q2
Jobo 1 ims_tm_value_2012_q2Jobo 1 ims_tm_value_2012_q2
Jobo 1 ims_tm_value_2012_q2Helene Lyon
 
PCTY 2012, SmartCloud Control Desk v. Mikkel Koenig
PCTY 2012, SmartCloud Control Desk v. Mikkel KoenigPCTY 2012, SmartCloud Control Desk v. Mikkel Koenig
PCTY 2012, SmartCloud Control Desk v. Mikkel KoenigIBM Danmark
 
Advanced Automation Appliances 6.21.09
Advanced Automation Appliances 6.21.09Advanced Automation Appliances 6.21.09
Advanced Automation Appliances 6.21.09mgk918
 
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...Spiffy
 
IT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented AbstractionIT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented AbstractionBob Rhubart
 
Galil galil's new accelera controller; sizzling speed, fully loaded 2007 p...
Galil   galil's new accelera controller;  sizzling speed, fully loaded 2007 p...Galil   galil's new accelera controller;  sizzling speed, fully loaded 2007 p...
Galil galil's new accelera controller; sizzling speed, fully loaded 2007 p...Electromate
 

Mais procurados (20)

Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
Konsolider, optimer og automatiser dit servermiljø med IBM PureApplications S...
 
It's time to optimize
It's time to optimizeIt's time to optimize
It's time to optimize
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Management
 
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!TechEd 2012 NA - MGT332 - fighting fire to the cloud!
TechEd 2012 NA - MGT332 - fighting fire to the cloud!
 
Hp nni installation guide
Hp nni installation guideHp nni installation guide
Hp nni installation guide
 
System Center
System CenterSystem Center
System Center
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
Res Software In Healthcare
Res Software In HealthcareRes Software In Healthcare
Res Software In Healthcare
 
IBM SmartCloud Enterprise
IBM SmartCloud EnterpriseIBM SmartCloud Enterprise
IBM SmartCloud Enterprise
 
IT FUTURE 2011 - Le future du poste de travail
IT FUTURE 2011 - Le future du poste de travailIT FUTURE 2011 - Le future du poste de travail
IT FUTURE 2011 - Le future du poste de travail
 
Pb 0160 I Pedge Rev4 Fyi
Pb 0160 I Pedge Rev4 FyiPb 0160 I Pedge Rev4 Fyi
Pb 0160 I Pedge Rev4 Fyi
 
Overview of IBM PureSystems
Overview of IBM PureSystemsOverview of IBM PureSystems
Overview of IBM PureSystems
 
Comprendre l’offre IBM SmartCloud Foundation, Zoom sur PureSystems
Comprendre l’offre  IBM SmartCloud Foundation, Zoom sur PureSystems Comprendre l’offre  IBM SmartCloud Foundation, Zoom sur PureSystems
Comprendre l’offre IBM SmartCloud Foundation, Zoom sur PureSystems
 
Jobo 1 ims_tm_value_2012_q2
Jobo 1 ims_tm_value_2012_q2Jobo 1 ims_tm_value_2012_q2
Jobo 1 ims_tm_value_2012_q2
 
PCTY 2012, SmartCloud Control Desk v. Mikkel Koenig
PCTY 2012, SmartCloud Control Desk v. Mikkel KoenigPCTY 2012, SmartCloud Control Desk v. Mikkel Koenig
PCTY 2012, SmartCloud Control Desk v. Mikkel Koenig
 
Advanced Automation Appliances 6.21.09
Advanced Automation Appliances 6.21.09Advanced Automation Appliances 6.21.09
Advanced Automation Appliances 6.21.09
 
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
MS TechDays 2011 - Operation Manager 2012 - New features to Enhance Enterpris...
 
Pos vs pc
Pos vs pcPos vs pc
Pos vs pc
 
IT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented AbstractionIT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented Abstraction
 
Galil galil's new accelera controller; sizzling speed, fully loaded 2007 p...
Galil   galil's new accelera controller;  sizzling speed, fully loaded 2007 p...Galil   galil's new accelera controller;  sizzling speed, fully loaded 2007 p...
Galil galil's new accelera controller; sizzling speed, fully loaded 2007 p...
 

Semelhante a Hisham Dalle - Zero client computing - taking the desktop into the cloud

Service Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustextService Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustextMicrosoft Norge AS
 
Cloud Computing and VCE
Cloud Computing and VCECloud Computing and VCE
Cloud Computing and VCECenk Ersoy
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 PredictionsFlexera
 
EMC Cloud Management
EMC Cloud ManagementEMC Cloud Management
EMC Cloud ManagementCenk Ersoy
 
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Xenesys
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudwwwally
 
Unified FlexPod Management and Automation
Unified FlexPod Management and AutomationUnified FlexPod Management and Automation
Unified FlexPod Management and Automationsubtitle
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Centerdavidzucker
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...CloudOps Summit
 
彭—Elastic architecture in cloud foundry and deploy with openstack
彭—Elastic architecture in cloud foundry and deploy with openstack彭—Elastic architecture in cloud foundry and deploy with openstack
彭—Elastic architecture in cloud foundry and deploy with openstackOpenCity Community
 
Performance Management In The New Frontier Of Rich Internet Applications
Performance Management In The New Frontier Of Rich Internet ApplicationsPerformance Management In The New Frontier Of Rich Internet Applications
Performance Management In The New Frontier Of Rich Internet ApplicationsBen Rushlo
 
System Center
System CenterSystem Center
System CenterBlauge
 
Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009Francis D'Silva
 
AbiCloud Webinar 1.0
AbiCloud Webinar 1.0AbiCloud Webinar 1.0
AbiCloud Webinar 1.0Abiquo, Inc.
 
UC4 - One Automation
UC4 - One AutomationUC4 - One Automation
UC4 - One Automationk1k2sdad
 
Connected Office 3.0
Connected Office 3.0Connected Office 3.0
Connected Office 3.0ddcatfan1
 

Semelhante a Hisham Dalle - Zero client computing - taking the desktop into the cloud (20)

Embrace private cloud with confidence
Embrace private cloud with confidenceEmbrace private cloud with confidence
Embrace private cloud with confidence
 
Service Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustextService Manager Cloud Seminar introcustext
Service Manager Cloud Seminar introcustext
 
Cloud Computing and VCE
Cloud Computing and VCECloud Computing and VCE
Cloud Computing and VCE
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
 
EMC Cloud Management
EMC Cloud ManagementEMC Cloud Management
EMC Cloud Management
 
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
Evento Xenesys - Virtualizzare gli applicativi core e proteggere i dati azien...
 
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloudPre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
Pre-TechEd EMEA 2012 - SCOM 2012 Down in the cloud
 
Unified FlexPod Management and Automation
Unified FlexPod Management and AutomationUnified FlexPod Management and Automation
Unified FlexPod Management and Automation
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Center
 
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
 
DESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONSDESKTOP VIRTUALIZZATIONS
DESKTOP VIRTUALIZZATIONS
 
彭—Elastic architecture in cloud foundry and deploy with openstack
彭—Elastic architecture in cloud foundry and deploy with openstack彭—Elastic architecture in cloud foundry and deploy with openstack
彭—Elastic architecture in cloud foundry and deploy with openstack
 
Performance Management In The New Frontier Of Rich Internet Applications
Performance Management In The New Frontier Of Rich Internet ApplicationsPerformance Management In The New Frontier Of Rich Internet Applications
Performance Management In The New Frontier Of Rich Internet Applications
 
System Center
System CenterSystem Center
System Center
 
101 cd 1315-1345
101 cd 1315-1345101 cd 1315-1345
101 cd 1315-1345
 
101 cd 1315-1345
101 cd 1315-1345101 cd 1315-1345
101 cd 1315-1345
 
Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009Cloud Computing, Business Models, Geilo April 2009
Cloud Computing, Business Models, Geilo April 2009
 
AbiCloud Webinar 1.0
AbiCloud Webinar 1.0AbiCloud Webinar 1.0
AbiCloud Webinar 1.0
 
UC4 - One Automation
UC4 - One AutomationUC4 - One Automation
UC4 - One Automation
 
Connected Office 3.0
Connected Office 3.0Connected Office 3.0
Connected Office 3.0
 

Mais de nooralmousa

Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testingnooralmousa
 
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovationsnooralmousa
 
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub  - A case study of django web applications that are secur...Mr. Mohammed Aldoub  - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...nooralmousa
 
Mr. Khalid Shaikh - emerging trends in managing it security
Mr. Khalid Shaikh  - emerging trends in managing it securityMr. Khalid Shaikh  - emerging trends in managing it security
Mr. Khalid Shaikh - emerging trends in managing it securitynooralmousa
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...nooralmousa
 
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.nooralmousa
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsnooralmousa
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsnooralmousa
 
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for cisonooralmousa
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metricsnooralmousa
 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keysnooralmousa
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudnooralmousa
 

Mais de nooralmousa (17)

Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration TestingMr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
 
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
 
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
Mr. Mohammed Aldoub  - A case study of django web applications that are secur...Mr. Mohammed Aldoub  - A case study of django web applications that are secur...
Mr. Mohammed Aldoub - A case study of django web applications that are secur...
 
Mr. Khalid Shaikh - emerging trends in managing it security
Mr. Khalid Shaikh  - emerging trends in managing it securityMr. Khalid Shaikh  - emerging trends in managing it security
Mr. Khalid Shaikh - emerging trends in managing it security
 
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...Mr. Andrey Belenko - secure password managers and military-grade encryption o...
Mr. Andrey Belenko - secure password managers and military-grade encryption o...
 
Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.Mr. Burhan Khalid - secure dev.
Mr. Burhan Khalid - secure dev.
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Mohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environmentsMohammed Al Mulla - Best practices to secure working environments
Mohammed Al Mulla - Best practices to secure working environments
 
Pradeep menon how to influence people and win top management buy0in for ciso
Pradeep menon   how to influence people and win top management buy0in for cisoPradeep menon   how to influence people and win top management buy0in for ciso
Pradeep menon how to influence people and win top management buy0in for ciso
 
Nabil Malik - Security performance metrics
Nabil Malik - Security performance metricsNabil Malik - Security performance metrics
Nabil Malik - Security performance metrics
 
Khaled al amri using fingerprints as private and public keys
Khaled al amri   using fingerprints as private and public keysKhaled al amri   using fingerprints as private and public keys
Khaled al amri using fingerprints as private and public keys
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
Taiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloudTaiye Lambo - Auditing the cloud
Taiye Lambo - Auditing the cloud
 

Hisham Dalle - Zero client computing - taking the desktop into the cloud

  • 1. Zero Client Computing Taking the Desktop into the Cloud Zero Client Computing Radical Centralization. Simple. Complete. Here for Name Click Click Here for Title Click Here for Date
  • 2. What is Client Computing? Excessive Costs Overburdened Security and Capex & Opex Management Compliance Risk • 3-5 Year Refresh Cycles • Multiple Vendors • Endpoint Breaches • Hidden Costs from Gap • Multiple Products • Regulatory Compliance Filling Technologies HIPAA, SEC, Grahm Leach- • User Customizations with Bliley • High Operating Expenses Different Systems, Users, Images, Applications • Intellectual Assets at Risk • Exorbitant Energy Costs • Distributed PC Architecture • Unpredictable user activity Copyright © 2010 Pano Logic, Inc.
  • 3. What is Zero Client Computing? • Eliminate the desktop PC. • Move 100% of client software into the cloud. • Leverage the power of cloud computing. • No Management at the Desk. Copyright © 2010 Pano Logic, Inc.
  • 4. Why Move Desktop to the Cloud? Centralized Management Management Automation & Orchestration No Break-fix Cycle No Data Leaves the Cloud Security Centralized Security & Policy No Viruses Access from Anywhere Flexibility Policy-Based Provisioning Business Agility Copyright © 2010 Pano Logic, Inc.
  • 5. Desktop Management in the Cloud Brokering Monitoring Provisioning Reporting Orchestration Security Entitlement Policy Copyright © 2010 Pano Logic, Inc.
  • 6. What’s at the desk? • Ideally, nothing. • Need some sort of I/O Concentrator. + • Definitely, no compute capability. Copyright © 2010 Pano Logic, Inc.
  • 7. Zero Client No Processor (CPU) No System Memory (RAM) No Persistent Memory (e.g. Disk or SSD) No Software No Firmware No Drivers Copyright © 2010 Pano Logic, Inc.
  • 8. Why Not a Thin Client? Thin Clients Require Management. Thin Clients are for Terminal Services. Thin Clients are Expensive. Thin Clients are Complex. Zero Clients are the Future. Simple. Secure. Affordable. Copyright © 2010 Pano Logic, Inc.
  • 9. Cloud Ready Desktop Computing Cloud Endpoint Data Applications PC Management Complexity Management Complexity Management Drivers Centralization Operating System Data Services Terminal Applications Applications Management Management Drivers Operating System Operating System Virtualization Data (PC/TC) Applications Management VM Management VM Drivers Operating System VM Operating System Data Pano Zero Applications Eliminates Client VM 100% Management Endpoint VM Drivers Centralized Management VM Operating System 9 Copyright © 2010 Pano Logic, Inc.
  • 10. What is a PC? O/S, Software, Drivers, Compute Input/Output Copyright © 2010 Pano Logic, Inc.
  • 11. What is a Thin Client? Two PC’s to do what my one PC used to do??? PC in the Cloud PC # 2 Cloud Thin Client Copyright © 2010 Pano Logic, Inc.
  • 12. What is a Zero Client? No CPU 100% of Software No Software in the Cloud No Management Cloud Zero Client Input/Output At the Desk O/S, Software, Drivers, Compute Copyright © 2010 Pano Logic, Inc. In the Cloud
  • 13. Summary Compute = Management Compute in the Cloud 100% I/O at the Desk Brokering. Provisioning. Automation. Save Money. Save Time. Choose the Right Vendor. Copyright © 2010 Pano Logic, Inc.
  • 14. Simple. Secure. Complete. Click Here for Name Info Security Exhibition - for Title Click Here Kuwait Click Here for 20-21 Stand # Date