Welcome!

Related Topics: Containers Expo Blog, Microservices Expo, Open Source Cloud, @CloudExpo, Cloud Security, SDN Journal

Containers Expo Blog: Article

Embracing the New Enterprise IT: Virtual Desktop Infrastructure (VDI)

Businesses turn to virtual desktop infrastructure for effective BYOD policies

During the recent bout of intense winter weather throughout the Midwest, many folks were able to receive the news on office closings by receiving work email messages through their personal laptops and smartphones. Access available anywhere is becoming a given for many people who can receive updates on their personal devices no matter where they are. For the typical enterprise IT department, the bring-your-own-device (BYOD) policy has become a standard, and it’s not uncommon to see different brands and models of laptops throughout the office.

This is all the latest evidence of the new consumerization of IT in which people’s laptops, tablets and smartphones are part of their work-day tech arsenal. Although this may save a company some money in hardware expenses and allow greater flexibility for employees, it brings with it a host of concerns, with security at the top of the list. Additionally, as companies produce an ever-increasing amount of data that’s pushing network and bandwidth capacity to its extremes, virtual desktop infrastructure (VDI) is becoming a popular solution to these concerns and as an effective platform for a BYOD policy.

VDI’s background and advantages
For any enterprise, IT concerns are a challenge. Robust storage space, strong security, quick access and a reliable network are what employees expect and need to do their jobs. When a business grows, IT responsibilities grow as well, and scaling up means increasing pressure on what may be an already stressed system.

Desktop virtualization has emerged as a way of solving these concerns in a dependable and flexible way. Its structure allows users to log into a centralized database that provides a virtual desktop to employees where data is accessed and stored. VDI also allows a greater potential for collaboration and productivity among employees since everyone has access to the same data and can keep it up to date continually. This is particularly effective for large-scale operations such as hospitals or universities where many people may be accessing the same data to review or edit.

Also, in this kind of system, if a laptop or device is lost or stolen, security won’t be compromised since no data is stored on the device itself. As long as an organization is large enough to gain a benefit from VDI, and has the budget to support hiring a dependable VDI vendor, such an implementation can provide a significant boost to overall IT network performance.

BYOD accelerating VDI adoption
With BYOD becoming so widespread, enterprise companies have had to look at the negatives as well as the positives. This means that in addition to seeing what it could do to improve its efficiency, companies have to face the security weaknesses that BYOD presents. Hundreds of employees with various unprotected devices all accessing sensitive information is a full-blown IT nightmare.

As mentioned above, VDI combats this problem by preventing any data from being saved to an actual device, and allowing the device itself to serve as a gateway to the data, not a storage spot. VDI adoption is also gradually being implemented as more success stories of real-world use come about in health care, education and urban planning.

Innovation through virtualization
When a company hires a new employee, it may be hiring that person’s technology as well. This may lead to saving costs and increasing productivity, since the employee will be using a device and operating system she’s already well acquainted with. Any security concerns can be alleviated with a VDI implementation, which can also provide a variety of other advantages as well. The IT field is undergoing constant evolution as new strategies are devised, and VDI is just one of these innovations, so taking an assessment of your company’s network is the first step in understanding how VDI could improve data access, storage and security throughout your organization.

More Stories By Amy Bishop

Amy Bishop works in marketing and digital strategy for a technology startup. Her previous experience has included five years in enterprise and agency environments. She specializes in helping businesses learn about ways rapidly changing enterprise solutions, business strategies and technologies can refine organizational communication, improve customer experience and maximize co-created value with converged marketing strategies.

Connect with Amy on Twitter, LinkedIn, Google+ or Pinterest.

Latest Stories
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
"We have several customers now running private clouds. They're not as large as they should be but it's getting there. The adoption challenge has been pretty simple. Look at the world today of virtualization vs cloud," stated Nara Rajagopalan, CEO of Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of (at least) three separate application components: the software embedded in the device, the back-end service, and the mobile application for the end user’s controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target –...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...