Data Security & Business Continuity

Slides:



Advertisements
Similar presentations
Speaker Name, Title Windows 8 Pro: For Small Business.
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Which server is right for you? Get in Contact with us
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Introduction to DISKLESS PC How to beat the high cost of computing.
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer.
Omni Introduction Page All About Omni and our Products.
The future of Desktops Transform Your Desktop with Virtualization.
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Thin Client vs. Desktop Advantages and Disadvantages of Operating System Environments.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Operating System.
Windows ® Powered NAS. Agenda Windows Powered NAS Windows Powered NAS Key Technologies in Windows Powered NAS Key Technologies in Windows Powered NAS.
CredoGov VDI Introduction James Gunn
Web Based Applications
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Open Web App. Purpose To explain Open Web Apps To explain Open Web Apps To demonstrate some opportunities for a small business with this technology To.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Name Company A Day in the Life… A Demonstration of Application Delivery.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Desktop Virtualization Joshua Bradfield Dan Bacus Data Center Solutions Manager Sr. Engineer.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Introduction TO Network Administration
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Module 9: Preparing to Administer a Server
Cloud Computing L.NORAH ALSUFYAN =).
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Customer Guide to Limited-Time Offer
Chapter One: Mastering the Basics of Security
Customized Solutions to your needs
Virtual Network Computing
Webparts360: A Low-Code App Development Tool That Enables Non-Programmers to Build Business Solutions for Microsoft Office 365 Quickly, Easily OFFICE 365.
Outline What does the OS protect? Authentication for operating systems
FactoryTalk® ViewPoint With FactoryTalk® View SE
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Chapter 5 Electronic Commerce | Security
Chapter 1 Introduction to computers
Building the Business Case for Cloud Services
How to prepare for the End of License of Windows Server 2012/R2
Outline What does the OS protect? Authentication for operating systems
IBM Start Now Host Integration Solutions
Learn how Sage CRM partner add-ons can help you target new customers
ETS Inside Product Launch
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Resco Mobile CRM Enables Sales Reps and Field Technicians to Access CRM Data Effortlessly While On the Go Across All Types of Mobile Devices WINDOWS APP.
Chapter 5 Electronic Commerce | Security
Data Security for Microsoft Azure
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
MICROSOFT AZURE ISV PROFILE: ONEBE
ONLINE SECURE DATA SERVICE
Module 9: Preparing to Administer a Server
O.S. Security.
Agenda The current Windows XP and Windows XP Desktop situation
Salesforce.com Salesforce.com is the world leader in on-demand customer relationship management (CRM) services Manages sales, marketing, customer service,
DSS Architecture MBA 572 Craig K. Tyran Fall 2002.
Ones Technology Products & Solutions
Presentation transcript:

Data Security & Business Continuity Ted Miller, Regional Sales Manager Mark Allen, Systems Engineer Thin Clients Why They Are Better Than PCs Business Continuity Data Security Rapport Management Software SEC-2572

Introduction to Thin Clients Simple Powerful Flexible Centralized application access Centralized application access + local browser Centralized application access + local browser + local applications Enhanced Windows-Based Terminal Custom Application Terminal Appliance

Thin Clients Have Compelling Advantages Reliability No moving parts, viruses, crashes, 9.5 times more reliable vs. PC. Security Protect critical data. Ensure business continuity. Easier Management Complete remote administration, no user tweaking. Accelerated Deployment HW is three times faster to deploy, simply plug into network. Acquisition Cost Robust appliances available for as low as $359 Lower TCO 20-57% less in total ownership cost vs. PCs They pay for themselves in 2 months. Every 2 months. For the life of the client

Gartner Decision Makers What is On Their Minds Reliability No moving parts, viruses, crashes, 9.5 times more reliable vs. PC. Disaster Recovery & Business Continuity Security Protect critical data. Ensure business continuity. Security and Privacy Issues Easier Management Complete remote administration, no user tweaking. Mobile and Wireless Technology Accelerated Deployment HW is three times faster to deploy, simply plug into network. Web Services Acquisition Cost Robust appliances available for as low as $359 CRM Lower TCO 20-57% less in total ownership cost vs. PCs They pay for themselves in 2 moths. Every 2 months. For the life of the client

Business Continuity PCs TCs CIOs should consider desktops which do not put data at risk of destruction by fire, flood, etc. Local hard disk data makes this difficult Key: avoid having any data in this vulnerable state Thin-client computing offers an ideal solution Destroy 1 or 1,000 thin-clients – what is lost? Protect and co-locate servers to safeguard data and keep you online TCs

What’s Important Has Changed What Our Customers Are Telling Us Now Security Management Total Cost of Ownership Before Total Cost of Ownership Management Security

Information Security: Authorization Integrity Non-Repudiation Authentication Confidentiality Local security model prevents unauthorized users from accessing server resources. Hardened by Silicon Valley Java Junkies Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”

Information Security: Integrity Authorization Integrity Non-Repudiation Authentication Confidentiality Viruses and hackers cannot harm thin-client firmware, or corrupt security model. No local data can be lost if thin-client is stolen or destroyed. Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”

Information Security: Non-Repudiation Authorization Integrity Non-Repudiation Authentication Confidentiality “I didn’t get your important e-mail, my PC was acting up.” No local storage means no local data loss risk. Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”

Information Security: Confidentiality Authorization Integrity Non-Repudiation Authentication Confidentiality Built-in encryption technologies like Secure ICA ensure eyes only security of the most sensitive data throughout the connection Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”

Information Security: Authentication Authorization Integrity Non-Repudiation Authentication Confidentiality Winterm supports one-, two- and three-factor authentication with login name, password, and now smart card and biometric technologies… Servers Clients Interpret and display presentation protocol data streams only Send keyboard and mouse movements back to the server ICA Appliances focus on best price/performance ICA PURPOSE OF SLIDE: SPEAKER NOTES: (This is a two-click build slide.) “On a PC, all of your applications are stored and executed on your local machine. On a thin client, you still see the same friendly Windows GUI interface on your screen….” (CLICK) “But the applications are stored and executed on a server.” “The underlying technology that makes this all work is a protocol that sends display data from the server to the terminal and sends keyboard and mouse movements back to the server.” SEGUE: “There are some incredible business advantages to doing it this way instead of through conventional PCs…”

Multi-Factor Authorization What I Know (e.g.- a password) What I Am (e.g.- fingerprint) What I Have (e.g.- a smart card)

Smart Card Solution More Secure 2 Factor Authentication Identification + Pin / Password Authentication Convenient Identification + Auto-Authentication Full “hot-desk” support Automatic Launch of ICA, RDP or Browser Simple Flexible Implementation Centrally managed Revenue Numbers for the 3000 series (not including Compaq): CE software - 147 units shipped of the sellable Add-on, $3880 in Revenue CE Hardware - $21 Million in Revenue; 74% of company’s revenue - Margin: $6.4 Million! Average of 31% Margin More on improvement of processes later in slide show THANK YOU THANK YOU THANK YOU!!! Great job selling!

Most Secure 3 Factor Authentication Biometrics Solution Most Secure 3 Factor Authentication Available for 3000, 8000 and 9000 series WBTs. Convenient Just touch reader with finger for authentication “Un-spoofable” Combinations supported Simple Flexible Implementation Centrally managed Revenue Numbers for the 3000 series (not including Compaq): CE software - 147 units shipped of the sellable Add-on, $3880 in Revenue CE Hardware - $21 Million in Revenue; 74% of company’s revenue - Margin: $6.4 Million! Average of 31% Margin More on improvement of processes later in slide show THANK YOU THANK YOU THANK YOU!!! Great job selling!

Why Management Software is Key Frequent SW Updates Are a Fact of Life Quickly and Easily Implement New Citrix and Microsoft Protocol Enhancements Comprehensive Management Tools Protect Your Investment Ensure Lowest TCO Stop Physical Desktop Visits Maximize Functionality Adopt New or Advanced Peripherals With Ease Deliver Longest Productive Life Automate Client OS Upgrades; Avoid Obsolescence

Summary If security & business continuity are a concern, thin clients can help. Thin Client Evolution New uses New benefits Business Priority Evolution Sensitive & valuable data Unauthorized access

Data Security & Business Continuity Thin Clients Why They Are Better Than PCs Business Continuity Data Security Rapport Management Software