U8 Remote Access Solution

Source: Internet
Author: User

A company is a famous manufacturer in China and has branches or offices in more than 10 cities in China. In recent years, the company has continuously improved its informatization level and implemented the U8 ERP system.

Application Requirements

Uyou U8 is one of the best enterprise-level application software suites in China. It is a typical large-scale distributed application system and belongs to the "fat" client. It has high requirements on network transmission bandwidth. During remote access and use, you can only create a distributed server solution locally. You need to upload data back to the headquarters on a regular basis to achieve real-time centralized management. The U8 Web application system has high bandwidth requirements. When a large number of concurrent users exist, the system performance is significantly reduced.
Due to the limitations of ERP software in remote use, the company had to follow the traditional local business data collection, processing and report generation mode, the lack of information exchange between corporate headquarters and subsidiaries leads to a serious phenomenon of independent governance. The management and decision-making layer of an enterprise cannot summarize the information of each branch in a timely manner, and cannot grasp the changes of itself and the market in a timely manner. Therefore, it is passive in the market.

Traditional solutions have obvious defects

When looking for a remote access solution, the company's CIO first considered using the ddnleased line, but after demonstration, it found that this technology has a series of shortcomings. The first phase of leased line cost investment and daily cost are high, especially for nationwide network deployment. In addition, leased lines have poor mobility and cannot be upgraded, and management costs are high. This double pressure leads to a high "total cost of ownership TCO )".

Another traditional solution is VPN. VPN uses the public network as a cheap bridge, eliminating the communication cost of using the leased line network. Using a virtual "channel" on the Internet, remote users can be securely connected to internal network resources and provide security and related features that were previously only available on the leased line network. However, traditional VPN is far from an ideal remote access policy, especially when you access application resources in a centralized manner.

First, the client must be configured for the Traditional VPN and various applications must be installed on the client. During enterprise applications, the client and data center must transmit various application data over the network, greatly increasing the network load. These data packets make the network egress of the data center crowded and occupy a large amount of bandwidth, and may even affect the normal use of enterprise internal applications, such as the OA system.

Second, Traditional VPN is not good at deploying shared application services or centralized databases to provide immediate and efficient access. Instead, each customer application must be purchased and installed on each remote machine. In addition, synchronous data update is usually uploaded from each remote site to the central site through insecure operations, which not only reduces the information reliability, but also wastes valuable bandwidth resources. The Traditional VPN needs to be configured for each client, greatly increasing the maintenance workload of the enterprise IT department.

Once again, although the Traditional VPN can meet the security problem of data transmission over the Internet, the data itself is distributed on laptops and other remote devices, it is difficult to achieve centralized management and at the same time, it is easy to lose and stolen. According to statistics, more than 1 million of laptops are lost or stolen every year, if a bank keeps its key business data and key applications on each PC, the bank will have to bear the resulting risks.

Fourth, the client uses a Traditional VPN to connect to the data center for remote office. If there is a dial-up Internet or the client does not have a fixed IP address, the VPN will assign a new IP address to overwrite the original IP address on the client machine, this client PC is part of the idc lan. In this way, all network resources of the client pc in the Internet are unavailable, such as network printers.

Fifth, compatibility issues. Traditional VPN software can only target VPN hardware of the same manufacturer and cannot be compatible with VPN products of other manufacturers. Enterprise Use and existing investment cannot be guaranteed. For example, when two companies or branches merge, if VPN products of different vendors are used, the VPN cannot run normally, and some VPN devices need to be purchased again.

In addition, VPN still has some problems, such as unexpected interruptions, failure to connect to the port, and failure to connect to the port in some places.

The disadvantages of traditional solutions have made the company's CIOs hard to choose from. He urgently needs a solution that can be centrally managed to save the trouble of maintaining the client, and the price is within the acceptable range. After learning about it, he found a new solution based on the server computing model-communication technology CTBS remote access platform. Through further authentication, he was pleasantly surprised to find that this is the fundamental solution he was struggling to find.
Solution Overview

As a professional provider of integrated access solutions, communication technology www.kouton.com has become one of the most advanced remote access solutions in the world. Its powerful Application Deployment function allows you to easily and quickly release applications, from office OA systems to financial software, CRM and ERP systems. CTBS can greatly shorten the entire application deployment process.
Remote Office connection ensures that branches, factory workshops, remote warehouses, and partners can quickly and securely access key applications and information resources of the headquarters in real time, it is also very easy to add and expand new remote access. CTBS solves network congestion, latency, and security risks once.
In terms of mobile office applications, mobile staff can securely access the office at any location through any network connection. Whether they are on a business trip or on vacation outside the country, professional access allows them to get what they want just like their colleagues working at the headquarters.
Features

As the first remote access platform suite in China, CTBS has many features and advantages that are not available in other access methods:
Quick deployment
No need to change the existing network structure, fast configuration, and quick implementation
Bandwidth reduction
Only screen information is transmitted. bandwidth usage is less than 28.8 K/S. Any network connection mode is supported.
High Security
CTBS itself provides encrypted transmission, and integrates VPN functions to provide higher-level security protection.
Stable connection
The CTBS connection is very stable. Even if the connection is closed, the information of the disconnection point is set to be retained. After the next connection is successful, the data operation will not be affected.
High reliability
In high-end multi-concurrent user applications, multiple CTBS servers can be used to achieve high performance and high reliability through network load balancing.
Centralized Management
The client no longer needs to install the U8 client. Client upgrades, patching, and other maintenance tasks are all completed on the CTBS server, greatly reducing the workload and maintenance workload, this improves the support response speed and reduces on-site service.

Solution Value

Fast deployment and implementation
The installation, configuration, and debugging work is simplified. You can quickly deploy U8 on the central CTBS server without installing it on each computer. The implementation cycle is greatly shortened.
Access anytime, anywhere
Remote and travel staff can use any device, operating system, or connection method to access U8.
Efficient use of network bandwidth
In normal CTBS applications, each user occupies only about 20 kbps of bandwidth on average. Therefore, many users use the dialing or ADSL access method to implement remote applications, satisfactory speed and performance are achieved, saving a lot of leased line costs.
Reduce TCO total cost of ownership)
IT can effectively manage and support the U8 system on the server side, saving the time and energy of IT staff and saving the cost of on-site support. After verification, the CTBS solution system can save about 30% ~ 50%. Over time, this proportion will be higher.
Protect original investment
Make full use of existing devices and connection methods to provide high-performance U8 system access, and prolong the lifecycle of network and computer hardware.
Centralized system deployment and management
The system administrator can control the process, resources, and status of the entire system at a single point, and deploy the system using effective control tools.
And supervise the normal work of all links.

Summary
Using the CTBS solution to deploy and manage U8 systems, you can maximize the value of the application system. A large number of successful cases show that this is one of the most effective remote access solutions in the world. It not only achieves fast implementation and fast application, but also enables management, maintenance, technical support, broadband consumption, additional security solutions, and reduces investment and expenditure on new devices.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.