Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 3 of 3 white papers, page 1 of 1.
UNC Health Care Leverages IGEL in Virtual Desktop Infrastructure Deployment
UNC Health Care selected IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security. This document outlines key findings on how IGEL helps organizations manage entire fleets of thin clients from a single console. In addition, you will see how IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, wi

UNC Health Care selects IGEL Universal Desktop Converter (UDC) and IGEL Universal Management Suite (UMS) for simplicity, cost-savings and security.

“The need to provide users with access to their desktops from any device anywhere, anytime is driving a growing number of IT organizations to migrate toward VDI environments,” said Simon Clephan, Vice President of Business Development and Strategic Alliances, IGEL. “One of the key advantages that IGEL brings to the table is the simplicity that comes from being able to manage an entire fleet of thin clients from a single console. Additionally, the IGEL Universal Desktop Converter provides IT organizations with the flexibility they need to convert any compatible thin client, desktop or laptop computer into an IGEL thin client solution, without having to make an upfront investment in new hardware to support their virtualized infrastructures.” 

UNC Health Care selected the IGEL UDC and UMS software for its Citrix VDI deployment following a “bake-off” between thin client solutions. “IGEL won hands down due the simplicity and superiority of its management capabilities,” said James Cole, Technical Architect, UNC Health Care. “And, because the IGEL UDC software is designed to quickly and efficiently convert existing endpoint hardware into IGEL Linux OS-powered thin clients, we knew that by selecting the IGEL solution we would also realize a significant reduction in our capital expenditures.”

Since initiating the deployment of the IGEL UDC and UMS software, UNC Health Care has also experienced significant time savings. “Prior to deploying the IGEL UDC and UMS software, it took our team 25-30 minutes to create a virtual image on each system, not counting the personalization of the system for each use case, now that process takes less than 10 minutes, and even less time when converting the system to VDI roaming,” added Cole.

Additionally, the ease of integration between the IGEL UDC and IGEL UMS with Citrix XenDesktop and other solutions offered by Citrix Ecosystem partners, including Imprivata, has enabled secure access to the health care network’s Epic Systems’ Electronic Medical Records (EMR) system.

Lift and Shift Backup and Disaster Recovery Scenario for Google Cloud: Step by Step Guide
There are many new challenges, and reasons, to migrate workloads to the cloud. Especially for public cloud, like Google Cloud Platform. Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

There are many new challenges, and reasons, to migrate workloads to the cloud.

For example, here are four of the most popular:

  • Analytics and Machine learning (ML) are everywhere. Once you have your data in a cloud platform like Google Cloud Platform, you can leverage their APIs to run analytics and ML on everything.
  • Kubernetes is powerful and scalable, but transitioning legacy apps to Kubernetes can be daunting.
  • SAP HANA is a secret weapon. With high mem instances in the double digit TeraBytes migrating SAP to a cloud platform is easier than ever.
  • Serverless is the future for application development. With CloudSQL, Big Query, and all the other serverless solutions, cloud platforms like GCP are well positioned to be the easiest platform for app development.

Whether it is for backup, disaster recovery, or production in the cloud, you should be able to leverage the cloud platform to solve your technology challenges. In this step-by-step guide, we outline how GCP is positioned to be one of the easiest cloud platforms for app development. And, the critical role data protection as-as-service (DPaaS) can play.

Keeper Security Insight Report: Privileged Access Mgmt Survey User Insights on Cost & Complexity
Privileged access management solutions are primarily designed to protect IT staff, executive leadership, and research and development staff, however, the accelerated digital transformation and ceaseless barrage of cyberthreats is making it increasingly important to protect all end-users within an organization.

Research finds PAM solutions are too complex with 68% of organizations paying for “wasted features” that are rarely used. A global survey of 400 IT and security executives conducted in January 2023, by Keeper Security in partnership with TrendCandy Research, reveals an overwhelming industry desire for Privileged Access Management (PAM) solutions that are easy to deploy and maintain.

The findings show that traditional PAM solutions are falling far short, largely because they are too complex to implement and use. An overwhelming 84% of IT leaders said they want to simplify their PAM solution in 2023. In the current high-risk security climate, it is imperative that all organizations secure their privileged credentials, privileged accounts, and privileged sessions to protect their crown jewels. However, many traditional PAM solutions are failing to provide their intended value outside of these core use cases, because deployment is either too complex, too cost-prohibitive, or both. In the era of remote work, organizations need agile identity security solutions that can protect against cybersecurity threat vectors by monitoring, detecting, and preventing unauthorized privileged access to critical resources.

Keeper Security, a leading innovator in privileged access management, wanted to better understand how IT leaders are thinking about PAM, deploying their PAM solutions, and streamlining their PAM implementations. Keeper commissioned an independent research firm to survey 400 IT and data security leaders in North America and Europe about their strategies and plans for PAM in 2023.