22. Efficient Hardware Utilization
Remote Access
Remote Access
Use existing Old PC
Thin Client PC
Virtual PC
Virtual PC
Virtual Desktop Infrastructure
Virtual Security
23
23. Reduce the risk of data leakage
Remote Access
Remote Access
Existing Old PC
Thin Client PC
Virtual PC
Virtual PC
Virtual Desktop Infrastructure
Virtual Security
Act as a terminal.
24
24. Mobility to use VDI with higher security
Remote Access
Virtual Desktop Infrastructure
Download
High performance
Client PC
Virtual PC
Virtual Security
Linux
Client PC
Virtual PC image
Tablet/
Smart phone
Data Leakage
Prevention
25
25. Resumable Work Process
Virtual Desktop Infrastructure
Virtual PC
If clients are damaged, they can be replaced by new clients and the ongoing work
could be resumed. The work would be intact. No need to Backup.
Virtual PC image
Old Client PC
New Client PC
26
26. Centralized Management
Virtual Desktop Infrastructure
Original Virtual PC 01
Clone
CPU 2 Core, 4GB RAM, 30GB HDD
MS Office, CRM ,ERP, Email,
Firewall, Antivirus, Backup
Cloned Virtual PC
Original Virtual PC 02
Clone
CPU 1 Core, 1GB RAM, 20GB HDD
MS Office, Email,
Firewall, Antivirus
27
27. Centralized security management
Virtual Desktop InfrastructureCloned Virtual PC
Virtual Security
- Firewall
- IDS/IPS
- NAC
- Access Control
- Vulnerability Management
- Real-time Audit
Automated Security
Automated Security
Easy to manage security because virtual PCs are centralize located in datacenter.
Security Policy can be thoroughly deployed from the management center.
28