Related Topics: Containers Expo Blog, Microservices Expo, Open Source Cloud, @CloudExpo, Cloud Security, SDN Journal

Containers Expo Blog: Article

Embracing the New Enterprise IT: Virtual Desktop Infrastructure (VDI)

Businesses turn to virtual desktop infrastructure for effective BYOD policies

During the recent bout of intense winter weather throughout the Midwest, many folks were able to receive the news on office closings by receiving work email messages through their personal laptops and smartphones. Access available anywhere is becoming a given for many people who can receive updates on their personal devices no matter where they are. For the typical enterprise IT department, the bring-your-own-device (BYOD) policy has become a standard, and it’s not uncommon to see different brands and models of laptops throughout the office.

This is all the latest evidence of the new consumerization of IT in which people’s laptops, tablets and smartphones are part of their work-day tech arsenal. Although this may save a company some money in hardware expenses and allow greater flexibility for employees, it brings with it a host of concerns, with security at the top of the list. Additionally, as companies produce an ever-increasing amount of data that’s pushing network and bandwidth capacity to its extremes, virtual desktop infrastructure (VDI) is becoming a popular solution to these concerns and as an effective platform for a BYOD policy.

VDI’s background and advantages
For any enterprise, IT concerns are a challenge. Robust storage space, strong security, quick access and a reliable network are what employees expect and need to do their jobs. When a business grows, IT responsibilities grow as well, and scaling up means increasing pressure on what may be an already stressed system.

Desktop virtualization has emerged as a way of solving these concerns in a dependable and flexible way. Its structure allows users to log into a centralized database that provides a virtual desktop to employees where data is accessed and stored. VDI also allows a greater potential for collaboration and productivity among employees since everyone has access to the same data and can keep it up to date continually. This is particularly effective for large-scale operations such as hospitals or universities where many people may be accessing the same data to review or edit.

Also, in this kind of system, if a laptop or device is lost or stolen, security won’t be compromised since no data is stored on the device itself. As long as an organization is large enough to gain a benefit from VDI, and has the budget to support hiring a dependable VDI vendor, such an implementation can provide a significant boost to overall IT network performance.

BYOD accelerating VDI adoption
With BYOD becoming so widespread, enterprise companies have had to look at the negatives as well as the positives. This means that in addition to seeing what it could do to improve its efficiency, companies have to face the security weaknesses that BYOD presents. Hundreds of employees with various unprotected devices all accessing sensitive information is a full-blown IT nightmare.

As mentioned above, VDI combats this problem by preventing any data from being saved to an actual device, and allowing the device itself to serve as a gateway to the data, not a storage spot. VDI adoption is also gradually being implemented as more success stories of real-world use come about in health care, education and urban planning.

Innovation through virtualization
When a company hires a new employee, it may be hiring that person’s technology as well. This may lead to saving costs and increasing productivity, since the employee will be using a device and operating system she’s already well acquainted with. Any security concerns can be alleviated with a VDI implementation, which can also provide a variety of other advantages as well. The IT field is undergoing constant evolution as new strategies are devised, and VDI is just one of these innovations, so taking an assessment of your company’s network is the first step in understanding how VDI could improve data access, storage and security throughout your organization.

More Stories By Amy Bishop

Amy Bishop works in marketing and digital strategy for a technology startup. Her previous experience has included five years in enterprise and agency environments. She specializes in helping businesses learn about ways rapidly changing enterprise solutions, business strategies and technologies can refine organizational communication, improve customer experience and maximize co-created value with converged marketing strategies.

Connect with Amy on Twitter, LinkedIn, Google+ or Pinterest.

Latest Stories
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Governments around the world are adopting Safe Harbor privacy provisions to protect customer data from leaving sovereign territories. Increasingly, global companies are required to create new instances of their server clusters in multiple countries to keep abreast of these new Safe Harbor laws. Is it worth it? In his session at 19th Cloud Expo, Adam Rogers, Managing Director of Anexia, Inc., will discuss how to keep your data legal and still stay in business.
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Successful transition from traditional IT to cloud computing requires three key ingredients: an IT architecture that allows companies to extend their internal best practices to the cloud, a cost point that allows economies of scale, and automated processes that manage risk exposure and maintain regulatory compliance with industry regulations (FFIEC, PCI-DSS, HIPAA, FISMA). The unique combination of VMware, the IBM Cloud, and Cloud Raxak, a 2016 Gartner Cool Vendor in IT Automation, provides a co...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
So you think you are a DevOps warrior, huh? Put your money (not really, it’s free) where your metrics are and prove it by taking The Ultimate DevOps Geek Quiz Challenge, sponsored by DevOps Summit. Battle through the set of tough questions created by industry thought leaders to earn your bragging rights and win some cool prizes.
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Embotics, the cloud automation company, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Embotics is the cloud automation company for IT organizations and service providers that need to improve provisioning or enable self-service capabilities. With a relentless focus on delivering a premier user experience and unmatched customer support, Embotics is the fas...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
SYS-CON Events announced today that Cemware will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Use MATLAB functions by just visiting website mathfreeon.com. MATLAB compatible, freely usable, online platform services. As of October 2016, 80,000 users from 180 countries are enjoying our platform service.
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...