Upload
novell
View
3.655
Download
2
Embed Size (px)
DESCRIPTION
As companies look to further leverage the benefits of virtualization, they are now looking at virtualization for the desktop. However, the adoption of virtual desktop infrastructure (VDI) presents a unique set of challenges that need to be overcome in order to make VDI adoption a success.The Novell VDI solution offers a unique approach to virtualizing the desktop, as well as the management of that environment. Come and learn about this solution with its unique focus on identity, security and management for both the user and the infrastructure.
Citation preview
Novell Virtual Desktop Infrastructure
© Novell, Inc. All rights reserved.2
Jerry CombsPrincipal Architect, Novell®, Inc. [email protected]
Valentin MihaiProduct Manager, Novell, [email protected]
Bob ReynoldsTechnical Lead, Novell, [email protected]
© Novell, Inc. All rights reserved.3
Novell® R.E.D.I.(Role Enabled Desktop Infrastructure)
• Virtual desktop infrastructure
– Peak of inflated expectations
– Trough of disillusionment
• Novell and R.E.D.I.
– VDI climbs the slope of enlightenment
– Next stop- plateau of productivity
Figure 1.1 - The Gartner Hype Cycle
© Novell, Inc. All rights reserved.4
VDIPeak of Inflated Expectations
Machines, applications and users
Desk-side visitsPatches and updates
Data backupHardware failure
Enforce policiesCompliance and audit
Rising energy costs
Management “Silos”Provisioning
Support
DataRecovery
Security
Power
Total cost of maintaining and managing a PC environment is $3,000 to $5,000 + per device*
Gartner 2007
Complexity increases with multiple sites, geographies, languages and time zones
© Novell, Inc. All rights reserved.5
VDITrough of Disillusionment
End-user environment moves into the data center
End-user experience sub-optimal
End users not aligned with business requirement
Storage requirements explode
Complex multiple vendor solutions involved for VDI
© Novell, Inc. All rights reserved.6
Now have two environments to manage with two different tools
Immature technologies
Costs are out of control
Manual processes requirement\Lack of integration
Lack of configuration management, security and Identity integration
VDITrough of Disillusionment (continued)
© Novell, Inc. All rights reserved.7
VDI Is Much More than Virtualization
Role Engineering
Identity Management
Access/Session Management
Endpoint Security
Patch Management (desktops/hosts)
Forensics (snapshotting)
Access Certification/Compliance
Anti-virus
Asset Discovery
Application Usage
Software Compliance
Ongoing Capacity Planning
Application Packaging (virtualization)
Application Deployment
Storage Management
CMDB integration and Management
Hypervisor Platform
Dynamic Build / Recycle Process
Pool Monitoring and Management
Load Balancing
Security / Compliance Systems Management Virtualization
© Novell, Inc. All rights reserved.8
Novell® Abilities
Desktop Data Center
Service Level Management
Application Management
Security Management
Infrastructure Management
Compliance Management
Identity Management
Capacity Management
Performance Management
PatchManagement
Availability Management
Service Continuity
Management
Service Desk
ProblemManagement
Asset Management
Incident Management
Project Management
Release Management
Change Management
Configuration Management
Business Process
Management
© Novell, Inc. All rights reserved.9
Novell® Framework Advantages
1. Identity-based Delivery and Management
– Tier-1 identity management vendor> 100s of millions of identities
– Long-history and core competencies in identity-based desktop management and application delivery
> 44 million desktops managed
– Identity-based storage management
2. One Set of Tools for Physical or Virtual Application Delivery
3. Open to Hypervisor and Desktop Operating Systems
– Robust open source technologies including Xen, KVM, etc.
– Also a leader in Linux and Microsoft alternatives
4. Flexible Patch Management
© Novell, Inc. All rights reserved.10
Novell® Framework Advantages
5. High Level of Granular Control and Automation
– Tier-1 security and compliance partner with integrated endpoint security suite
– Tighter software licensing compliance by true usage
– Depth of management of the infrastructure including within the virtual machines and storage systems to minimize efficiencies
– Global policy and work-flow for high-level automation and grid-based management
– Dashboard to distinguish infrastructure and application issues
6. One Vendor Approach for Lower Risk, Less Integration, and No Finger-pointing
© Novell, Inc. All rights reserved.11
Novell® and VDILife-cycle Overview
Manager hires and registers new developer/user
Identity VaultNovell Identity Manager
Provisions access and associates roles
Authenticates user and authorizes access based on role
Business Service Management
Single pane Helpdesk view to manage environment
Dynamically assembles and starts client virtual machine based on role and policy
PlateSpin® Workload Management
Xen/ESXHosts the user virtual desktop
Novell ZENworks®
Dynamically manages user environment and application
Terminates user session
PlateSpin Workload Management
Developer/User logs into secure URL
Novell Access ManagerTM
Novell Access Manager
© Novell, Inc. All rights reserved.12
Novell® REDI Integrated Architecture
Storage InfrastructureShared
ApplicationDrive
Running VMs
Master VMImages
User Data Drives
Plat
eSpi
n ® O
rche
stra
te
Xen\KVM\ESX Server Farm
ManagedVirtual
DesktopsNovell
ZENworks®
NovellIdentity
Manager
Novell Access Manager™
ThinClient
Re-purposed SLED Client Mac Client
Home Office
Novell ZAV
Novell File Management Suite
Existing Desktop Infrastructure Existing IdentitySystem
User Data Storage InfrastructureMapped Drives
FileServers
User ProfileServers
Users
© Novell, Inc. All rights reserved.13
Novell® and VDIThe User Environment
Personalized VM
C:/D:/E:/
Image Templates PlateSpin®
Orchestrate
Novell ZENworks®
Configuration Manager
OS Image
User Personal Image
Role Application Image
Controls the configuration and state of the VM
Injects dynamic portion of user profile and delivers user specific applications
Allocation from a dynamically maintained pool
Contains user owned data and static portion of profile
Read-only image shared by all role members
<2GB
This method results in storage savings comparable to linked clones without the drawbacks of linked clones (patching all at once, no unique GUID, no granularity within a template)
Demo
© Novell, Inc. All rights reserved.15
Novell R.E.D.I.
A service delivered as part of Novell® Intelligent Workload Management that enables an enterprise to manage and optimize End User computing resources in a policy driven, secure, and compliant manner across physical, virtual, or cloud environments
+ Build
+ Secure
+ Manage
+ Measure
© Novell, Inc. All rights reserved.16
Question and Answers
Unpublished Work of Novell, Inc. All Rights Reserved.This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.