Welcome!

Containers Expo Blog Authors: Liz McMillan, Pat Romanski, Yeshim Deniz, Elizabeth White, Zakia Bouachraoui

Related Topics: Containers Expo Blog, Microservices Expo, Open Source Cloud, @CloudExpo, Cloud Security, SDN Journal

Containers Expo Blog: Article

Embracing the New Enterprise IT: Virtual Desktop Infrastructure (VDI)

Businesses turn to virtual desktop infrastructure for effective BYOD policies

During the recent bout of intense winter weather throughout the Midwest, many folks were able to receive the news on office closings by receiving work email messages through their personal laptops and smartphones. Access available anywhere is becoming a given for many people who can receive updates on their personal devices no matter where they are. For the typical enterprise IT department, the bring-your-own-device (BYOD) policy has become a standard, and it’s not uncommon to see different brands and models of laptops throughout the office.

This is all the latest evidence of the new consumerization of IT in which people’s laptops, tablets and smartphones are part of their work-day tech arsenal. Although this may save a company some money in hardware expenses and allow greater flexibility for employees, it brings with it a host of concerns, with security at the top of the list. Additionally, as companies produce an ever-increasing amount of data that’s pushing network and bandwidth capacity to its extremes, virtual desktop infrastructure (VDI) is becoming a popular solution to these concerns and as an effective platform for a BYOD policy.

VDI’s background and advantages
For any enterprise, IT concerns are a challenge. Robust storage space, strong security, quick access and a reliable network are what employees expect and need to do their jobs. When a business grows, IT responsibilities grow as well, and scaling up means increasing pressure on what may be an already stressed system.

Desktop virtualization has emerged as a way of solving these concerns in a dependable and flexible way. Its structure allows users to log into a centralized database that provides a virtual desktop to employees where data is accessed and stored. VDI also allows a greater potential for collaboration and productivity among employees since everyone has access to the same data and can keep it up to date continually. This is particularly effective for large-scale operations such as hospitals or universities where many people may be accessing the same data to review or edit.

Also, in this kind of system, if a laptop or device is lost or stolen, security won’t be compromised since no data is stored on the device itself. As long as an organization is large enough to gain a benefit from VDI, and has the budget to support hiring a dependable VDI vendor, such an implementation can provide a significant boost to overall IT network performance.

BYOD accelerating VDI adoption
With BYOD becoming so widespread, enterprise companies have had to look at the negatives as well as the positives. This means that in addition to seeing what it could do to improve its efficiency, companies have to face the security weaknesses that BYOD presents. Hundreds of employees with various unprotected devices all accessing sensitive information is a full-blown IT nightmare.

As mentioned above, VDI combats this problem by preventing any data from being saved to an actual device, and allowing the device itself to serve as a gateway to the data, not a storage spot. VDI adoption is also gradually being implemented as more success stories of real-world use come about in health care, education and urban planning.

Innovation through virtualization
When a company hires a new employee, it may be hiring that person’s technology as well. This may lead to saving costs and increasing productivity, since the employee will be using a device and operating system she’s already well acquainted with. Any security concerns can be alleviated with a VDI implementation, which can also provide a variety of other advantages as well. The IT field is undergoing constant evolution as new strategies are devised, and VDI is just one of these innovations, so taking an assessment of your company’s network is the first step in understanding how VDI could improve data access, storage and security throughout your organization.

More Stories By Amy Bishop

Amy Bishop works in marketing and digital strategy for a technology startup. Her previous experience has included five years in enterprise and agency environments. She specializes in helping businesses learn about ways rapidly changing enterprise solutions, business strategies and technologies can refine organizational communication, improve customer experience and maximize co-created value with converged marketing strategies.

Connect with Amy on Twitter, LinkedIn, Google+ or Pinterest.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...