Friday, 2 November 2012

Microsoft Private Cloud 2.0 – BYOD Virtual Infrastructure

Microsoft Private Cloud 2.0 – BYOD Virtual Infrastructure

 

BYOD Private Cloud

Microsoft provides reference documents for describing their Private Cloud Fast-track best practices, which explains in detail how their core suite of Windows Server, Hyper-V and Systems Management Centre can be used to build internal ‘IaaS’ – Infrastructure as a Service.

They position this as an enabler of PaaS and SaaS, the higher layer application capabilities that this platform can better enable. In this paper Flexible Work styles they start to look at the solution areas these types of platforms can be targeted. Microsoft headline this around the transformational effect upon IT of trends like ‘BYOD’ – Bring Your Own Device, and how in enterprise IT design terms this is forcing an evolution from device-centric to user-centric architecture, and with this in mind describe the major options for mobile-enabling applications:

Device-optimized applications – For example Microsoft Office Mobile has been developed to provide Windows Phone users a tailored version of Word, Outlook, Lync etc. on their device. Web applications - Any device that can access the web can therefore access any web-based SaaS resource. This is more ubiquitous in an off-the-shelf manner but the device experience is not as good.

Virtual Desktops and Applications - The ideal compromise of the two is ‘VDI’ – Virtual Desktop Infrastructure, achieved through the Microsoft Desktop Virtualization portfolio and Microsoft Application Virtualization (App-V).

Microsoft propose this latter option is the ideal one for enterprise users because it provides an architecture and set of utilities for enhancing and managing the important aspects of this scenario, such as:

User State Virtualization - Users shifting about between different devices and networks need their personal data to travel with them, not be locked to one specific device. USV is one mechanism to support this.

Unified Management - Tools like Configuration Manager uses variables such as user identity, application dependencies and network and device characteristics to dynamically determine the appropriate deployment type for a specific device.

Unified Asset Inventory and Device Management - This also encompasses Asset and also Device Management enabling IT staff to better track and control all IT resources and where needed remotely manage them, such as performing device data wipes.

End-to-end Security - To ensure compliant protection of devices there are a variety of security features, such as drive encryption, anti-malware, tie in with IPSec for VPN security and AD-based Rights Management, offering end-to-end protection from device right through network.

For further information visit: http://cloudcomputing.sys-con.com/node/2372354

No comments:

Post a Comment