O documento discute a tendência da consumerização no ambiente corporativo e como as empresas podem adotá-la de forma segura através da virtualização e gerenciamento simplificado de dados e dispositivos. Ele apresenta pesquisas mostrando o aumento do uso de dispositivos móveis no trabalho e a necessidade de as empresas oferecerem acesso seguro a aplicações e dados de qualquer lugar.
A Chave para uma estratégia bem-sucedida de consumerização no BrasilCisco do Brasil
Uma nova geração de indivíduos que cresceram imersos com a tecnologia está tomando conta dos ambientes de negócio. Eles querem trazer seus dispositivos tecnológicos, comum em suas vidas, ao seu ambiente de trabalho. Eles são os filhos da classe média brasileira, acostumados a olhar a tecnologia em ação em todos os aspectos de suas vidas. Esta geração está fazendo com que executivos de IT tenham que se adaptar e procurar novos modelos, integrando cada vez mais outras áreas da organização.
Esta tendência não impacta apenas os dispositivos que são utilizados, como notebooks, mais leves e mais rápidos, tablets, ou smartphones, mas também as aplicações adotadas como colaboração, redes sociais e media sharing.
Em 2011, a consumerização era um fenômeno da elite. Apesar de um grande número de empresas permitir que a consumerização ganhasse forma no uso de TI (de acordo com um estudo conduzido pela IDC no Brasil, em meados de 2011, 42% das empresas acima de 250 empregados permitiam aos seus funcionários trazer seus smartphones e com eles acessar os dados corporativos), apenas uma pequena parcela dos funcionários dentro dessas empresas estava se beneficiando das ferramentas "trazidas de casa", incorporando-as na dinâmica de trabalho.
A Chave para uma estratégia bem-sucedida de consumerização no BrasilCisco do Brasil
Uma nova geração de indivíduos que cresceram imersos com a tecnologia está tomando conta dos ambientes de negócio. Eles querem trazer seus dispositivos tecnológicos, comum em suas vidas, ao seu ambiente de trabalho. Eles são os filhos da classe média brasileira, acostumados a olhar a tecnologia em ação em todos os aspectos de suas vidas. Esta geração está fazendo com que executivos de IT tenham que se adaptar e procurar novos modelos, integrando cada vez mais outras áreas da organização.
Esta tendência não impacta apenas os dispositivos que são utilizados, como notebooks, mais leves e mais rápidos, tablets, ou smartphones, mas também as aplicações adotadas como colaboração, redes sociais e media sharing.
Em 2011, a consumerização era um fenômeno da elite. Apesar de um grande número de empresas permitir que a consumerização ganhasse forma no uso de TI (de acordo com um estudo conduzido pela IDC no Brasil, em meados de 2011, 42% das empresas acima de 250 empregados permitiam aos seus funcionários trazer seus smartphones e com eles acessar os dados corporativos), apenas uma pequena parcela dos funcionários dentro dessas empresas estava se beneficiando das ferramentas "trazidas de casa", incorporando-as na dinâmica de trabalho.
INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEMSymantec Brasil
Be Aware Webinar - INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEM
1 CASOS REAIS E ESTATÍSTICAS
2 A CULTURA DA NUVEM E SEUS RISCOS
3 COMO O SYMANTEC DLP PODE AJUDAR
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...Symantec Brasil
INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEM
1 CASOS REAIS E ESTATÍSTICAS
2 A CULTURA DA NUVEM E SEUS RISCOS
3 COMO O SYMANTEC DLP PODE AJUDAR
Be Aware Webinar acontece todas as quartas às 10h30. Curta nossa página no Facebook e acompanhe a programação.
09.12.2015
Mobilidade e Segurança - O Desafio de Lidar com dispositivos móveis pessoais ...armsthon
A necessidade: uso de dispositivos de funcionários no ambiente de trabalho.
Cenário atual e tendências de mercado para mobilidade
Os desafios: Desafio da mobilidade x segurança & gerenciamento
A solução: Soluções da ISH Tecnologia e parceiros que permitem mobilidade com segurança e controle
O Mapa do caminho: Qual o plano de ação pra adotar mobilidade com segurança e controle?
Gestão de Segurança de Dispositivos Móveis Corporativos e BYODVirtù Tecnológica
Com serviço baseado em nuvem, permite proteger e gerenciar centralmente smartphones e tablets utilizando a infraestrutura existente do Active Directory. Centrify for Mobile utiliza ferramentas familiares do AD em conjunto com o serviço de nuvem Centrify para aplicar configurações de segurança confiáveis, conexão over-the-air e acesso seguro a serviços de rede corporativa. Oferece ainda a única solução do mercado que protege e gerencia não só os populares dispositivos móveis, mas também Mac OS, Unix e Linux.
Como as recentes tecnologias de Cloud Computing e Virtualização podem ajudar as corporações a melhor gerenciar sua área de TI, o impacto nos custos e a questão da TI Verde.
10 tendências estratégicas para o mercado de tecnologia em 2015SpinEngenharia
A Spin Engenharia está de olho nas tendências do mercado de tecnologia para 2015. Esse documento é um resumo que construímos com base em uma publicação do site IT Business Edge para os funcionários da empresa, mas está acessível para quem desejar se informar.
Good news from the Worldwide Consulting Desktop & Apps (DnA) team! We’ve just finished updating theVirtual Desktop Handbook for XenDesktop 7, StoreFront 2.0 and XenServer 6.2.
The Virtual Desktop Handbook is an architect’s guide to desktop virtualization. It provides you with the methodology, experience and best practices you need to successfully design your own desktop virtualization solution.
Updates in this release include:
Resource requirements for Windows 8 and Server 2012
XD controller sizing
XenDesktop 7 policy guidelines
Database sizing for XenDesktop 7
SQL 2012 chapter
StoreFront 2.0 chapter
32-bit or 64-bit desktop OS guidance
Desktop group & StoreFront integration
In addition, we’ve also included a Citrix policy quick reference spreadsheet so that you can quickly identify default, baseline and template settings from XenDesktop 5 / XenApp 6 all the way up to XenDesktop 7. Thanks go out to Michael Havens, Maria Chang and Uzair Ali for creating this great reference spreadsheet.
I hope you find this handbook useful during your next desktop virtualization project.
And we’re not done yet, future updates will include:
Bandwidth
Hyper-V 2012
PVS 7
User data
And more …
The Virtual Desktop Handbook is not the only resource to guide you through your desktop virtualization journey. Citrix also provides Project Accelerator; an interactive online tool creating customized sizing and design recommendations based on the methodology, best practices and expert advice identified within this handbook.
You can still reach the XenDesktop 5 handbook using the old URL – CTX136546
Andy Baker – Architect
Worldwide Consulting
Desktop & Apps Team
http://blogs.citrix.com/2013/10/10/new-xendesktop-7-handbook-published/
INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEMSymantec Brasil
Be Aware Webinar - INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEM
1 CASOS REAIS E ESTATÍSTICAS
2 A CULTURA DA NUVEM E SEUS RISCOS
3 COMO O SYMANTEC DLP PODE AJUDAR
Be Aware Webinar – INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES ...Symantec Brasil
INTEGRANDO O SYMANTEC DATA LOSS PREVENTION COM APLICAÇÕES NA NUVEM
1 CASOS REAIS E ESTATÍSTICAS
2 A CULTURA DA NUVEM E SEUS RISCOS
3 COMO O SYMANTEC DLP PODE AJUDAR
Be Aware Webinar acontece todas as quartas às 10h30. Curta nossa página no Facebook e acompanhe a programação.
09.12.2015
Mobilidade e Segurança - O Desafio de Lidar com dispositivos móveis pessoais ...armsthon
A necessidade: uso de dispositivos de funcionários no ambiente de trabalho.
Cenário atual e tendências de mercado para mobilidade
Os desafios: Desafio da mobilidade x segurança & gerenciamento
A solução: Soluções da ISH Tecnologia e parceiros que permitem mobilidade com segurança e controle
O Mapa do caminho: Qual o plano de ação pra adotar mobilidade com segurança e controle?
Gestão de Segurança de Dispositivos Móveis Corporativos e BYODVirtù Tecnológica
Com serviço baseado em nuvem, permite proteger e gerenciar centralmente smartphones e tablets utilizando a infraestrutura existente do Active Directory. Centrify for Mobile utiliza ferramentas familiares do AD em conjunto com o serviço de nuvem Centrify para aplicar configurações de segurança confiáveis, conexão over-the-air e acesso seguro a serviços de rede corporativa. Oferece ainda a única solução do mercado que protege e gerencia não só os populares dispositivos móveis, mas também Mac OS, Unix e Linux.
Como as recentes tecnologias de Cloud Computing e Virtualização podem ajudar as corporações a melhor gerenciar sua área de TI, o impacto nos custos e a questão da TI Verde.
10 tendências estratégicas para o mercado de tecnologia em 2015SpinEngenharia
A Spin Engenharia está de olho nas tendências do mercado de tecnologia para 2015. Esse documento é um resumo que construímos com base em uma publicação do site IT Business Edge para os funcionários da empresa, mas está acessível para quem desejar se informar.
Good news from the Worldwide Consulting Desktop & Apps (DnA) team! We’ve just finished updating theVirtual Desktop Handbook for XenDesktop 7, StoreFront 2.0 and XenServer 6.2.
The Virtual Desktop Handbook is an architect’s guide to desktop virtualization. It provides you with the methodology, experience and best practices you need to successfully design your own desktop virtualization solution.
Updates in this release include:
Resource requirements for Windows 8 and Server 2012
XD controller sizing
XenDesktop 7 policy guidelines
Database sizing for XenDesktop 7
SQL 2012 chapter
StoreFront 2.0 chapter
32-bit or 64-bit desktop OS guidance
Desktop group & StoreFront integration
In addition, we’ve also included a Citrix policy quick reference spreadsheet so that you can quickly identify default, baseline and template settings from XenDesktop 5 / XenApp 6 all the way up to XenDesktop 7. Thanks go out to Michael Havens, Maria Chang and Uzair Ali for creating this great reference spreadsheet.
I hope you find this handbook useful during your next desktop virtualization project.
And we’re not done yet, future updates will include:
Bandwidth
Hyper-V 2012
PVS 7
User data
And more …
The Virtual Desktop Handbook is not the only resource to guide you through your desktop virtualization journey. Citrix also provides Project Accelerator; an interactive online tool creating customized sizing and design recommendations based on the methodology, best practices and expert advice identified within this handbook.
You can still reach the XenDesktop 5 handbook using the old URL – CTX136546
Andy Baker – Architect
Worldwide Consulting
Desktop & Apps Team
http://blogs.citrix.com/2013/10/10/new-xendesktop-7-handbook-published/
Reference architecture dir and es - finalNuno Alves
Citrix Director with EdgeSight provides a complete troubleshooting window to quickly resolve issues around desktops or applications. Previous versions of XenApp leveraged EdgeSight, while XenDesktop deployments looked to Director for assistance. Starting in XenDesktop 7, these two great technologies have been merged into one central point for troubleshooting.
The purpose of this document will be to provide you an overviewof all the necessary parts required to give your company a holistic view. With this being a new product with new features, this document will provide administrators the tools to feel comfortable moving forward with monitoring of a XenDesktop 7 deployment.
This document will cover the configuration of the Director server, as well as how to interface with the Insight Center provided from our NetScaler product line. For more of an overview of the EdgeSight product, please reference the whitepapersfound at www.citrix.com/xendesktop.
http://support.citrix.com/article/CTX139051
Provisioning server high_availability_considerations2Nuno Alves
The purpose of this document is to give the target audience an overview about the critical components of a Citrix
Provisioning Server infrastructure with regards to a high availability implementation. These considerations focus on the
following areas:
• Virtual Disk (vDisk) Storage
• Write Cache Placement
• SQL Database
• TFTP Service
• DHCP Service
Xd planning guide - storage best practicesNuno Alves
The Citrix Storage planning guide provides a list of best practices, recommendations and
performance related tips that cover the most critical areas of storage integration with Citrix
XenDesktop. It is not intended as a comprehensive guide for planning and configuring storage
infrastructures, nor as a storage training handbook.
Due to scope, this guide provides some device-specific information. For additional device- specific
configuration, Citrix suggests reviewing the storage vendor’s documentation, the storage vendor’s
hardware compatibility list, and contacting the vendor’s technical support if necessary
This document is an introduction to Disk Storage technologies and its terminology. Within this
document basic disk and storage architectures as well as storage protocols and common fault
tolerance technologies will be discussed. It is not intended as a comprehensive guide for planning
and configuring storage infrastructures, nor as a storage training handbook.
Due to scope, this guide provides some device-specific information. For additional device- specific
configuration, Citrix suggests reviewing the storage vendor‘s documentation, the storage vendor‘s
hardware compatibility list, and contacting the vendor‘s technical support if necessary.
For design best practices and planning guidance, Citrix recommends reviewing the Storage Best
Practices and Planning Guide (http://support.citrix.com/article/CTX130632)
This document describes how XenServer provides and keeps track of the storage supplied to its guests. The first section
is a reminder of how Linux looks at storage and the second section builds on that to explain XenServer storage. Basic
knowledge of Linux is required, as some standard tools are used.
XenDesktop relies on the hypervisor for many core functions, including VM creation, power operations, performance and redundancy. Therefore, it is important that you take the time to design an appropriate hypervisor infrastructure (XenServer, Hyper-V or vSphere). Otherwise, you may experience performance, functionality or even reliability issues.
Most information required to design a XenDesktop deployment on your chosen hypervisor platform is available publicly, but it can be hard to find since it’s spread across a multitude of knowledge base articles or white papers. In order to simplify and speed-up the design process, we’re in the process of consolidating the information that you need into a single document and augmenting it with recommendations and best practices. We’ve just finished incorporating the Hyper-V 2008 R2 and SCVMM 2012 planning section into the latest release of the Citrix Virtual Desktop Handbook, which includes important design decisions relating to this hypervisor, for example:
Selecting and sizing the right physical hardware for virtual machines
Knowing what storage options available for Hyper-V 2008 R2
What type of networks to build on the Hyper-V host
How to size the SCVMM servers
Designing a highly available SCVMM solution
Planning an effective failover cluster
The products covered in this current release of the handbook include XenDesktop 5.6, XenApp 6.5, Provisioning Services 6.x and XenClient Enterprise 4.5. A version of the Virtual Desktop Handbook covering XenDesktop 7.x, Provisioning Services 7, Hyper V 2012 R2 and SCVMM 2012 R2 is in the works with an initial release scheduled later in Q4. As always your feedback is welcomed.
http://blogs.citrix.com/2013/09/05/citrix-virtual-desktop-handbook-hyper-v-update/
CTX138217 - IntelliCache Reduction in IOPS: XenDesktop 5.6 FP1 on XenServer 6.1 - Citrix Knowledge Center http://ow.ly/o3Ma4
The purpose of this document is to provide testing results based on MCS-delivered streamed virtual desktops leveraging IntelliCache
NetScaler Deployment Guide for XenDesktop7Nuno Alves
This guide demonstrates how to deploy Citrix NetScaler in conjunction with Citrix XenDesktop 7 with a focus on both simplicity in configuration and advanced features not easily delivered with other products. This guide shows how to provision the XenDesktop 7 infrastructure, the NetScaler appliance and NetScaler Insight Center services to extend Citrix virtual desktop infrastructure and services to remote users in small to medium-size enterprises.
-And since much of this data is so sensitive, it must be secure. -Given what’s going on with privacy concerns and threats, we’re seeing many applications move to all SSL-And that SSL processing is getting exponentially more processor intensive as the industry transitions from 1K certs to 2K certs-<Key takeaway> So the ability of the underlying infrastructure to handle more apps with more SSL needs is critical
Intro: Here is what we typically see in the marketplace today:Key Points:The IT function has been squarely at the center of managing structured systems, apps and data. People are the users and extensions of IT systems, and devices have been standardized to make it simpler for IT to support them. It is a complex set of responsibilities, and most businesses say their IT functions get stretched.Transition: So imagine how your organization could benefit if things were different…
Intro: Tomorrow’s IT leadership won’t be at the center of all activities to the same degree as in the past. Here’s what tomorrow’s norms must look like instead: Key Points:IT will play a critical role in governance and self-service enablement, but they will no longer be the center of the equationPeople, who all work from different locations, will be at the center of the process, selecting the devices for their needs and on their own terms.It will be organic & unstructured, driven by tasks & relationshipsData will be created, stored, shared and accessed based on tasks and relationships, not apps or devices.Apps will be on-demand, self-service, task-specific toolsThe OS that defines our view of a “desktop” today will be far less relevant and focused more narrowly on session management. Devices and locations will be determined by end users.Mobile will be a dominant use case, not an occasional one.Transition: Moving to an IT structure like this will help companies redefine the boundaries of the traditional office to their advantage.
Intro: Citrix has the proven expertise and best practices to help you work through these considerations.Key Points:And we can help you assess, design and deploy a BYOD solution that’s right for your organization, helping you think through:Assess: We’ll help you as you to do an assessment of your business priorities, your users, devices and apps, your infrastructure and what the security requirements of your workforce. With this, we can help define a technology roadmap.Design:Citrix can also help put together a well-documented design that allows you to install, configure and build a solution that leverages your organization’s infrastructure. To do this, you need to be thinking about what hardware and infrastructure is required and what can you leverage, etc, what’s the operations and support design, such as SLAs, Staff required, support agreements required, etc.. And we can design for Test & QA, making sure that Scalability,Performance,Security,Functionality,Usability and Interoperability are covered,Deploy: And lastly, we can help you build, test and rollout a solution in an effectivemanner to ensure that back-end systems and processes help you embrace workshifting. This includes User Training / Education / How To guidance, independent analysis & verification of the design implementation, a pilot, and a phased rollout. Transition: Citrix has also built the content to help you go through your workshifting journey…
Intro: In fact, a recent study shows the workshifting drivers very clearly: Key Points:Cost savings are among the main drivers for workshifting, along with greater workplace flexibility and improved support for a mobile workforce. But that’s not it. HR and real estate cost reduction, environmental sustainability and other factors are also driving organization’s just like you to go in this direction.Illustration/Anecdotes/Proof: If possible, use an example of why some of the customers competition are assessing workshifting approaches.Transition: These factors are driving customer’s to look at solutions for workshifting.
Intro: This is why many companies plan to move into this direction, and they plan to do so very soon.Key Points:A recent report found that an overwhelming majority of the organizations surveyed—93 percent—plan to provide a flexible work environment within two year.Transition:But the truth is, many organizations have already gone in this direction, and they’re moving fast….
Intro: First and foremost, the workshifting solution you choose must includedesktop virtualization so that:Key Points:IT can transform any corporate application—including Windows, web and SaaS apps—as well as complete desktops into an on-demand service available to any of your users, regardless of where they’re located or what device they’re using. The solution lets you use any combination of desktop and application delivery approaches to support every type of workshifting environment through a single point of control.Transition: But the solution also needs to have a phenomenal, high definition experience regardless of where your people are.
Intro: And Citrix is one of the few vendors that has invested in since the inception of our company in delivering a high definition experience over the LAN and WAN. We refer to that as HDX over any network:Key Points:Breakthrough WAN performance optimizations over low bandwidth or high latency networks allows for a high definition user experience and guaranteed quality of service to users anywhere.And they have all the multimedia capabilities wherever they’re located from their virtual desktops, including real time voice and videoThis means real-time network and performance optimization technologies ensure a high-definition experience regardless of location, device and network connection. Transition: For workshifting to be a success, people also need to be able to easily collaborate with a distributed internal workforce and with external parties.
Intro: This is where follow-me data becomes essential. With the Ctrix workshifting solution:Key Points:People can easily share files with anyone inside or outside their organization and sync files across all of their devices so people have the information they need no matter where they’re working. Transition: The next essential component is one of the most underestimated benefits of workshifting done right.
Intro:AndCitrix knows this. That’s why our workshifting solution is built on the principle of being secure-by-design. Here’s how we do that. Key Points:Apps and associated data remain in the datacenter, where they are accessed through granular, policy-based user authentication. Access control, auditing and reporting help IT manage compliance, information governance and data protection. If a device is lost or stolen, IT can remotely wipe any enterprise data it may have contained.We also include key security components like single sign-on, an SSL VPN and a universal client with antivirus and two-factor authentication.Transition: Unlike other vendors, all of these essential components to workshifting done right are part of the Citrix product portfolio.