Unmount the security burden and create a secure desktop virtual platform

Source: Internet
Author: User

ItHigh costs, easy response to virtual desktops

The rapid development of IT technology requires the support of new technologies for the growth and rise of enterprises. According to a study, 70% of the company's annual IT investment is used to ensure the normal operation of existing IT equipment, with less than 30% of the cost for new technology investment. The existing IT investment architecture of enterprises urgently needs to be changed.

From the perspective of business value, desktop O & M (repair of various damages, system patches, upgrades, software updates, etc. caused by incorrect use of PCs) does not create direct value for the Organization's business development. In traditional PC mode, the more you invest in desktop O & M, the more you waste.

The emergence of desktop virtualization technology effectively solves the above cost problems. By virtualizing servers on servers in the data center, a large number of independent desktop operating systems (virtual machines or virtual desktops) are generated, so that one machine can be used by multiple users, this effectively reduces the maintenance workload of the desktop and application systems in the daily work of the IT department.

Security threats to virtual desktops

While improving office efficiency, desktop virtualization technology cannot ignore internal security threats such as data leakage and user access control.

Client-ID authentication security threats: with desktop virtualization technology, users can access their desktops anytime, anywhere through user name and password authentication to carry out their work. But in practice, what if the user did not pass the verification? Does desktop virtualization mean that everyone can access your desktop anytime, anywhere? Does the user identity authentication vulnerability cause data leakage?

Transport-cloud storage security threats: with the implementation of cloud computing, cloud storage services in China are becoming increasingly popular. Based on virtual desktops deployed on the cloud, enterprise applications, data, and computing are all on the cloud. To ensure secure access to cloud data and be compatible with various access devices and operating systems used for remote access, you need to deploy corresponding security solutions for cloud access points.

Server-DDoS security threats: to improve the reliability and efficiency of the virtual desktop system, enterprises often adopt multi-physical servers for virtualization deployment. In this deployment mode, the server is vulnerable to distributed denial of service (DDoS) attacks ). Therefore, when building a virtual platform, enterprises must deploy high-performance security control components on the server's Front-End Server Load balancer, alternatively, you can build a security gateway that can perform valid identity authentication and authorization at the backend of the firewall.

F5 + Vmware: Creating an efficient and secure Virtual Office Platform

F5 has been committed to providing services to help users deploy applications securely and reliably in all IT environments. VMware is an important strategic partner for F5 to achieve this goal.



The combination of F5's Smart Application Service Technology and VMWare's leading end user computing (EUC) solution provides a comprehensive, powerful, and secure solution, meet the customer's requirements for providing office mobility and ensuring current and future control and security, and the joint implementation is cost-effective and easy to deploy.

In this federated solution, F5's new BIG-IP Access Policy Manager (APM) solution aims to provide secure access and performance optimized for VMware horizon view. These new products provide a variety of throughput and concurrent user selection, cost-effective support for users of all sizes, and flexible scalability to add industry-leading security access technology to VMware horizon view. In addition, F5 will launch a dedicated iapp and reference architecture to significantly speed up deployment and provide normative guidance to help users learn how to use these new solutions in VMware technology.

VMware will provide API access and Remote Access Protocol extensions to support F5 to expand its current solution and add richer access control for the VMware horizon view environment. With this enhanced integration, customers can perform more refined Control Based on devices, locations, and other access variables, and guide users to use other applications or clouds deployed globally.

Main benefits

Economic and flexible-New Products jointly launched by F5 and VMWare can help enterprises build their virtual desktop environments more economically. With the help of F5BIG-IPAPM, users can deploy a variety of price joint solutions, so that industry-leading technology to benefit a wider range of customers, from a small organization that has just deployed virtual desktops to a large enterprise that has expanded to thousands of desktops.

Technical leadership-by launching products that combine the technical advantages of both companies, F5 and VMWare help customers more easily combine leading application service features with Vmware horizon view. Through the efforts of both parties to deploy virtual desktops for common customers, F5 and VMWare jointly launched products that are easier to manage and deploy to achieve the best results.

Combined partner strengths-F5 and VMWare can also provide channel partners with other opportunities to help build end-to-end solutions verified by solution providers by combining their respective technical products.

Time to market

The new BIG-IPAPM solution mentioned in this release will be available in the second half of 2014. The specific reference architecture and iapp supporting optimized deployment are now available. For details, please call: 400-991-8366, or write an email to [email protected].

 


Unmount the security burden and create a secure desktop virtual platform

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.