Click here to close now.

Welcome!

Cloud Expo Authors: Carmen Gonzalez, Elizabeth White, Lori MacVittie, Mike Kavis, Plutora Blog

Related Topics: Cloud Expo, Wireless, SOA & WOA, Virtualization, Web 2.0

Cloud Expo: Article

VDI and Cloud Infrastructure – Together at Last

Users still have concerns about the security of their information

This year, virtual desktop and cloud storage initiatives are at the top of many IT organization's wish lists. But what is not obvious is how tightly intertwined these two initiatives have become as users embrace the Bring Your Own Device (BYOD) movement. This new BYOD model forces IT groups to provide both secure user applications (VDI) and secure user data (cloud storage).

Although cloud storage services have experienced success in the enterprise, users still have concerns about the security of their information and other problems related to control over data in the cloud. Because of this, VDI will not go away as cloud computing expands, as many have predicted, but instead be used to complement the cloud. According to experts, VDI adoption is predicted to spike - with Gartner estimating that 60 percent of enterprises will deploy some form of VDI by the end of this year.

VDI Enables the New BYOD Wave
Today's workers expect to use their own PCs, smartphones and tablets in the workplace. The reality of the situation in 2012 is that BYOD is mainstream - and IT can no longer avoid it.

According to a recent study by Avanade, approximately 60 percent of companies are adapting their IT infrastructure to accommodate employees' personal devices instead of restricting how employees can use them. Nearly 90 percent of the business leaders in the survey said that they are aware that employees are already using personal technology for work purposes, and 65 percent of C-level executives in the survey consider the growing use of employee-owned technology as a top priority in their organization.

While the arrival of these mobile devices has clearly defined the value of moving IT functions over to a cloud environment, many companies are still resistant, citing security concerns as an obstacle. As employees continue to take their work on the road, overseas or back to the comfort of their own home, it's clear that IT managers will search for ways to allow easy and secure access to the various tools and services that workers use to be productive.

This is the forcing function for VDI. Rather than evaluating VDI as a separate IT priority that requires changing user patterns, VDI now enables an unstoppable trend. VDI has quickly become the ultimate IT tool to efficiently support heterogeneous user devices and maintain application security. The justification for VDI is no longer tied to moving compute from the edge to the core; now, compute remains squarely in both camps. The justification is in security and offloading endpoint ownership, and possibly maintenance, to users.

With VDI, the desktop is moved to a central, ubiquitously accessible location and users are given remote access to corporate resources on both managed and unmanaged devices - without it ever leaving the safe borders of the data center. Additionally, IT administrators are not only able to harbor cloud applications, but they can also stream other traditional applications to thin clients running their VDI tools. With these capabilities, IT is presented with simplified management and is also better able to meet the needs of a workforce that is now constantly on the go with fast, flexible and reliable solutions.

BYOD Similarly Drives Cloud Storage
According to a recent KPMG International global survey on cloud computing, a vast majority of organizations have already moved at least some of their business activities to the cloud and it's expected that in 2012 investment in cloud computing will skyrocket. In fact, according to another survey conducted by AMI research, SMB cloud spending alone will reach $100B by 2014. These forecasts come as no surprise, as workers rely heavily on many different cloud services to house their users' data and information.

VDI is an important component of BYOD since it protects corporate applications. However, there is no corresponding protection for user data. The success of Dropbox showed the appetite for cloud storage and quickly led to investments in ShareFile by Citrix and in Octopus by VMware. Untethered, unsecured endpoint devices are the latest motivation for centralized storage; but with two new technical requirements and one exciting new marketing attribute.

The technical attributes are, first, a need for IT-controlled security and, second, a need for single sign-on password control to simplify user access and make sure central storage is actually used. The exciting marketing attribute is that these two requirements finally make central secured storage more valuable and profitable for the right user base.

When you think about the cloud holistically it's equally important to think about the ease at which users can enter the cloud for services and not just what cloud services can be shipped out to users. Users want access to all of their information in the cloud as fast and efficiently as possible. When coupled with cloud computing, VDI has the capability to onboard more and more enterprises to the cloud with fewer barriers and obstacles. With this in mind, it's clear that VDI has the potential to integrate two infrastructures - using single, secure sign-on to bridge the gap between user access from any device through VDI and data in the cloud.

How Can SMB Customers Adapt?
BYOD is not just an enterprise phenomenon. It ripples through all user types and may actually be deployed first in the cost-sensitive and management-strapped SMB segment. But SMB organizations are unlikely to adopt the expensive infrastructure that characterized the first wave of VDI deployments. Custom storage, expensive blade servers and proprietary networks are unlikely to meet the budget requirements of the SMB market.

A new appliance model changes the game by introducing server economics, Ethernet-based systems that are manageable by desktop admins and a simple scaling model that simplifies configuration and management of what turns out to be a fairly gnarly storage problem. It's just this type of innovation that is required to make VDI cost-effective for the customer segment that needs it most.

More Stories By Lee Caswell

Lee Caswell is the co-founder and chief marketing officer of Pivot3. He is an experienced technology executive with more than 20 years of marketing and management experience in the storage, networking, and digital video markets. Prior to Pivot3, Caswell held positions as EVP Marketing and Business Development at VMware and was a corporate officer at Adaptec, where he was VP and General Manager of Adaptec's $350M Storage Solutions Group. He spent the first five years of his career in management programs at GE. Caswell has a BA from Carleton College where he was a Wingspread Fellow and an MBA from the Tuck School at Dartmouth College where he was a Tuck Scholar.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
VictorOps is making on-call suck less with the only collaborative alert management platform on the market. With easy on-call scheduling management, a real-time incident timeline that gives you contextual relevance around your alerts and powerful reporting features that make post-mortems more effective, VictorOps helps your IT/DevOps team solve problems faster.
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices ra...
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been ...
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focu...
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes ...
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, it is now feasible to create a rich desktop and tuned mobile experience with a single codebase, without compromising performance or usability.
SYS-CON Events announced today Arista Networks will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Arista Networks was founded to deliver software-driven cloud networking solutions for large data center and computing environments. Arista’s award-winning 10/40/100GbE switches redefine scalability, robustness, and price-performance, with over 3,000 customers and more than three million cloud networking ports depl...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, will explain the best practices of continuous testing at high scale, which is r...
SYS-CON Events announced today that Open Data Centers (ODC), a carrier-neutral colocation provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Open Data Centers is a carrier-neutral data center operator in New Jersey and New York City offering alternative connectivity options for carriers, service providers and enterprise customers.
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add sc...
Data-intensive companies that strive to gain insights from data using Big Data analytics tools can gain tremendous competitive advantage by deploying data-centric storage. Organizations generate large volumes of data, the vast majority of which is unstructured. As the volume and velocity of this unstructured data increases, the costs, risks and usability challenges associated with managing the unstructured data (regardless of file type, size or device) increases simultaneously, including end-to-...
The excitement around the possibilities enabled by Big Data is being tempered by the daunting task of feeding the analytics engines with high quality data on a continuous basis. As the once distinct fields of data integration and data management increasingly converge, cloud-based data solutions providers have emerged that can buffer your organization from the complexities of this continuous data cleansing and management so that you’re free to focus on the end goal: actionable insight.
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics arc...
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mo...