SlideShare a Scribd company logo
1 of 10
Download to read offline
W hi te Pa pe r
W hi te Pa pe r




                  DesktopDirect
                  Tablet Access to Business Applications

                  The consumerization of IT is under way. Workers want tablet
                  access to business applications, often from personal devices.
                  Learn why VPNs are not ideal for mobile connectivity and why
                  remote desktop is a more secure, less expensive approach to
                  tablet access that is easier to deploy, manage and use.
DesktopDirect	


                            Table of Con t e n ts



   Introduction                                             3

   Tablet Deployment Challenges                             3
   Security                                                 3
   Application Availability                                 3
   Device Management                                        4
   Cost                                                     4
   Time                                                     4

   Approaches to Tablet Access                              5
   VPN  Native Apps                                        5
   Server-Based Computing                                   5
   Managed Services                                         6

   DesktopDirect - A New Approach to Tablets for Business   6
   Data Leakage Prevention                                  7
   Full Application Availability                            7
   Time  Expense                                           7
   Usability                                                7

   Summary                                                  8

   About Array Networks                                     9
Tablet Access to Business Applications


    Introduction
     Tablet adoption is on the rise. Over 35 million iPads are expected to sell in 2011, with sales of over 55 million
     projected for 2012. Android-based tablets, which are expected to sell 20 million units in 2011, will grow even
     faster with sales of over 45 million units in 2012. A proven winner in the consumer market, tablets are now
     making significant inroads in the enterprise due to their portability and their potential to provide instant access to
     applications and information in a broad range of business situations.



         For instance, it is not practical for a doctor on the move between exam rooms, rounds and clinics to
         carry a heavy laptop that is constantly starting up, connecting, sleeping or shutting down. In contrast,
         a tablet is highly portable and provides an always-on experience with information and applications
         immediately available at the doctor’s finger tips. This ability to enhance worker productivity and
         improve quality of work gives tablets the potential for tremendous growth in the enterprise.



    Tablet Deployment Challenges
     Initially designed as consumer devices, tablets face significant challenges to becoming full-fledged solutions
     for business productivity. Chief among them are security, application availability, device management, cost and
     time.

     Security
     First and foremost is security. Consider the lengths and costs necessary to ensure the security of VPN access:
     laptops, client software, anti-virus, anti-spyware, hard-disk encryption, two-factor authentication and the list goes
     on. The thought of a similar scenario driven by the influx of tablets in the workplace is daunting. What’s more,
     tablet access is complicated by Bring Your Own Device (BYOD), the desire of many workers to use their personal
     device. Personal devices and content can create a lot of problems; for example, running standard VPN clients on
     tablets can change device behavior – a scenario that employees will not accept and which will create additional
     burden for IT. Further, personal devices are more likely to be lost or stolen, and create a situation where music,
     pictures and personal content reside on the same device as confidential enterprise data. As IT attempts to protect
     corporate data without disturbing personal data, significant risk can result if security is traded to achieve a more
     user-friendly experience. Unfortunately, the organizations that stand to gain the most from the benefits of tablet
     access, such as financial services and healthcare, are the same organizations that stand to lose the most in the
     event of data leakage.

     Application Availability
     Tablets access the Internet, run consumer apps and without too much trouble can be configured to provide
     access to corporate email systems. Out of the box, this is about the extent of a tablet’s capabilities for conducting
     business. Tablets don’t run Windows, or any of the business applications developed for Windows. This is to say,
     there is a large gap between what employees are accustomed to using and what is available on tablets. There are
     certain native apps that can be purchased, but since tablets are often private devices, it doesn’t make sense to
     re-purchase apps that are already available on employee desktops. Additionally, because tablets are consumer
     devices, employees will commonly switch from one platform to another, increasing the number of application
     environments that must be purchased, deployed and managed.




	                                                                                                                        3
DesktopDirect	




                               Cost                                                     Time

                                                                                                       App
   Security                                                                                          Support




   Device Management
   In the case of organizations deploying a form of managed tablets, IT is looking at different solutions for Mobile Device
   Management (MDM) to deal with the issue of security and lost tablets. While remote wipe and reset capabilities
   are available, personal data on devices is a problem as it causes the enterprise to take responsibility for backup and
   restore of personal data. As with security, without any real alternatives, IT is forced to spend a considerable amount
   of time and money locking down and managing this new class of device. For those organizations opting to support
   a BYOD strategy, unmanaged devices cannot go completely unmanaged; organizations must still determine an
   approach to providing limits on personal tablets, without impacting their usability as a consumer device.

   Cost
   As with any business or IT investment, benefits and gains must outweigh costs. While executives and employees
   may be clamoring to use the latest and greatest technology, or the benefits of tablet access may be clear, in the
   end, costs must be factored in and the solution must make business sense. Considering the challenges posed by
   security, application access and device management, the cost consideration is not trivial and can include duplicate
   application environments, duplicate security environments, development of native applications and investments
   in server-based computing, not to mention the costs of tablets themselves, should an organization decide to
   deploy managed devices.

   Time
   Last is the challenge of time. Security, application availability and device management challenges not only impact
   cost, they also introduce significant barriers to deploying tablet access in a timely manner. Developing native apps
   and installing new application infrastructure can take months, as can bringing together all the pieces necessary
   for successfully delivering enterprise applications to tablet devices. Organizations are well advised to allocate
   sufficient time for implementing a tablet strategy and to seek out more efficient alternative approaches to mobile
   application delivery.




Copyright © 2011, Array Networks, Inc.
Tablet Access to Business Applications


    Approaches to Tablet Access
     To determine the best approach or mix of approaches for any organization, it is necessary to evaluate the pros and
     cons of all solutions and compare them against the needs of the particular business. Three common approaches
     for providing tablet access to corporate resources and applications are the use of VPN and native applications,
     server-based computing and managed services.

     VPN  Native Apps
     A common approach to tablet access is to leverage existing VPN infrastructure and provide the workforce with
     instructions for installing the VPN client on their mobile device. The benefit here is that it is a fast, down and dirty
     way to enable tablets in the enterprise, at the extra cost of new licenses and additional appliances. However, these
     VPN clients are intrusive apps, and installing them on private devices can cause potential instabilities and support
     problems that are not acceptable.

     Security is another drawback of this approach. In its most basic implementation, the only thing that is secured is
     the connection between the tablet and the corporate network. Like a laptop, a tablet is able to download, store,
     copy, paste and send all the data it wants; unlike a laptop, it is not managed and is far more likely to get lost or
     stolen. This opens the door to other challenges such as the cost and complexity of purchasing corporate owned
     and managed tablets, or investing heavily in mobile device management software, or both.

     The other challenge of simple VPN access is application availability. Tablets do not run Windows, and tablets do not
     support most enterprise applications. This creates a significant gap between the use of tablets as consumer devices
     and the use of tablets for business. To close this gap, organizations are turning to developing or purchasing native
     applications, in essence creating a duplicate application environment specifically for tablet access for a select
     number of core applications.

     A benefit of native apps is that they can be developed from the ground up for usability on a tablet platform. This
     is an important consideration, as applications will differ as to how well they behave in the tablet environment.
     There are, however, downsides and limitations to developing native apps. For one, it is time consuming and
     expensive to develop and support multiple application environments. Considering the number of applications
     in use in the typical enterprise, developing or purchasing native apps may not make sense beyond a core set of
     business-critical applications. Secondly, developing or purchasing native apps locks enterprises into specific tablet
     platforms, eliminating the ability to support a flexible BYOD strategy.

     In the end, an approach based on VPNs and native apps can deliver a highly-productive user experience for select
     applications, but at significant expense due to security, mobile device management and the need to develop,
     purchase and support secondary application environments. Because data is allowed to reside on the tablets, data
     leakage can never be fully prevented; moreover, native apps are not aligned with a flexible BYOD strategy as they
     require organizations to develop to specific platforms.

     Server-Based Computing
     Server-based computing runs applications and desktops in the data center and delivers them to client devices on
     demand. Just as these virtual applications and virtual desktops can be delivered to PCs either locally or remotely,
     today, providers of server-based computing offer client applications that make it possible to deliver applications
     to tablets and smart phones.




	                                                                                                                          5
DesktopDirect	


   Advantages of the server-based computing approach are multi-fold. First, any application that is running in the
   server-based computing environment can be made available to tablet devices, eliminating the need to develop
   native apps and support multiple application environments.

   Second, because end-users are simply manipulating files, applications and desktops that reside in the corporate
   data center, the server-based computing client app can be configured such that data never leaves the corporate
   network. With the ability to prohibit copy and paste, local printing and screen capture, and without the possibility
   of corporate data residing on tablets, the possibility for data leakage can essentially be reduced to zero.

   On the other hand, while many enterprises have deployed server-based computing for key applications for key user
   groups, very few have deployed server-based computing as the primary environment for users and applications
   across the organization. The cost of servers, software, licenses and deployment is simply too steep, with most
   enterprises deploying server-based computing for no more than a small percentage of their overall workforce.

   In short, while this approach can be highly-secure and highly-flexible for users and applications already supported
   by server-based computing, the time and expense required to extend the solution enterprise-wide makes it highly
   impractical.

   Managed Services
   Many providers of managed services for remote desktop access now tout the ability to access desktops and
   applications using tablet devices. In theory, providing tablet access to office desktops using remote desktop
   technology makes a lot of sense. If the service provider provides controls for managing end-points and disabling
   copy, paste, print and screen capture, and the user is simply operating his or her primary work environment using
   a remote device, data will not be able to leave the corporate network.

   What’s more, because users are accessing their primary work environment, they have access to the full range of
   applications they require to be productive. Because the solution leverages existing infrastructure, and because
   service providers offer support for a wide range of devices, the managed services approach is relatively cost-
   effective and at the same time can support a BYOD strategy.


   In reality, enterprises are not comfortable exposing sensitive data and the enterprise network to a
   third party. For these managed services to function, thousands of permanent connections must be
   established from the corporate network to a broker on a third party network – a network that supports
   many other business as well as individual consumers. Enterprises have been unwilling to use these
   services to provide remote access to office PCs from traditional devices such as home desktops and
   laptops, and in all likelihood will have the same apprehensions about using managed services to
   provide tablet access to corporate applications.



   Comparing the three approaches, no single solution provides a perfect combination of data leakage prevention,
   application availability, affordability and usability. Enterprises will either have to select a solution that is the best fit
   for their particular environment, or look beyond these three solutions to find a new approach that eliminates the
   tradeoffs between security, application availability, cost and usability.




Copyright © 2011, Array Networks, Inc.
Tablet Access to Business Applications


    DesktopDirect – A New Approach to Tablets for Business
     DesktopDirect is an innovative, secure remote access solution. Unlike VPNs, DesktopDirect enables employees to
     get to their office computers from any remote location — whether they be at their home office, at a customer or
     partner site, at a public Internet kiosk, or even from their iPhones and iPads. DesktopDirect uniquely leverages
     proven and scalable technologies to deliver the industry’s most secure enterprise-class solution for remote
     desktop access and control.

     In a tablet access environment, the DesktopDirect appliance is installed in the corporate network and integrates
     with Active Directory or similar to establish user credentials for secure access. Either physical or virtual desktops
     may be registered for users, a process that can be accomplished by the administrator manually or via a database,
     or by end-users using Array Registration Technology (ART). For tablet access, users download a free application
     from an App Store, App Marketplace or similar to their corporate or personal tablet. From there, users launch the
     DesktopDirect application, log in using their single sign-on credentials, and make a selection from their list of
     registered desktops.




                                                    Physic
                                                    Desktoal
                                                           ps

                                                                       SP X                               Virtual
                                       Tablets                                                           Desktop
                                                                                                                  s
                                                                                  Array Ne
                                                                                  Desktoptworks
                                                                                           Direct
                                                            SSL

                                                                Firewall
               Tablets


                              Internet                                 n Full application availability
                                                                       n Eliminates data leakage
       Smart                                                           n Secured connection
      Phones                                                           n IT control
                                                                       n Easy to deploy and manage
                  Laptops                                              n Scalable
                               PCs                                     n Affordable




     n Data Leakage Prevention DesktopDirect is an appliance-based solution that is enterprise owned and operated.
     Unlike managed services, DesktopDirect is under full enterprise control and does not open the corporate network
     to third party networks. DesktopDirect also ensures that mobile devices never become a part of the corporate
     network; because end-users merely use their mobile device to control their office desktop, data never leaves the
     corporate network and cannot be left behind on tablets. Connectivity from the DesktopDirect appliance to end-
     user devices is encrypted using SSL and controls for copy, paste, print and screen capture eliminate any remaining
     chance of data leakage.




	                                                                                                                       7
DesktopDirect	


   n Full Application Availability DesktopDirect leverages existing desktop, application and security infrastructure.
   Unlike server-based computing, a traditional PC work environment is provided to nearly all employees. Without
   any need for new hardware or software, licenses or application environments, employees enterprise-wide can be
   provided with full application availability.

   n Time  Expense As compared to the time and expense of developing native applications or deploying server-
   based computing, DesktopDirect is highly cost-effective. Unlike managed services that charge indefinitely, right-
   sized DesktopDirect hardware and software license packs are an affordable one-time purchase. DesktopDirect can
   be set up in as little a few hours and is capable of achieving ROI in the time it takes to set up alternate solutions.

   n Usability While DesktopDirect cannot provide the user experience of a dedicated native application, it goes a
   long way towards creating a PC experience for tablets that retains the usability of office applications. Wake-on-LAN
   (WoL) capability allows laptops and desktops to be powered down at night, over the weekend or anytime they are
   not needed and powered up remotely by users. In addition, a comprehensive suite of touch screen gestures and
   controls are built into the DesktopDirect mobile app in order to provide intuitive control over mouse, keyboard
   and other PC-specific functions.




                               Tablets
                                                                                             Physical
                                                                                             Desktops
                                                      Securely
                    Smart                              connect
                   Phones
                                                       to office
                  Laptops                             desktops
                                                                                            Virtual Desktops 
                                                      from any                                        Terminal
                                    PCs                 device,                                       Services
                                                     anywhere.



                       Remote                                                          Office


   Deploying DesktopDirect to enable tablet access for employees, enterprises get a cost-effective solution that is
   fully secure and fully under IT control and at the same time provides full application availability, supports a BYOD
   strategy and is simple to deploy, manage and use. What’s more DesktopDirect simultaneously creates a remote
   access solution for productivity and business continuity, allowing users to log into their office desktops from any
   remote device, anywhere.




Copyright © 2011, Array Networks, Inc.
Tablet Access to Business Applications


    Summary
     Selecting the right approach to providing tablet access may not be an either or proposition, but might, in fact,
     include a mix of the approaches outlined in this document. For instance, a particular application may not translate
     well from a PC environment to a tablet environment, and the decision is made that a native application must be
     developed. Or an application is so essential to the core business that getting the best possible user experience
     is worth the expense of developing a native app. Likewise, organizations with a large investment in server-based
     computing will still want to make these resources available to tablet users.


                                          VPN  Native        Server-Based        Managed           DesktopDirect
                                             Apps              Computing          Services
            Data Leakage Prevention           Fair              Excellent            Fair              Excellent
              Application Availability        Fair              Excellent          Excellent           Excellent
                     Time  Expense           Poor                Poor               Fair              Excellent
                           Useability       Excellent              Fair              Fair                Good


     DesktopDirect is equally at home providing a full tablet access solution or working in conjunction with alternate
     approaches to tablet access. If an enterprise has hundreds of applications, native apps may be developed for five
     to ten of them, with DesktopDirect providing a catch all to provide secure tablet access to the remainder of the
     organization’s applications. Or the rapid nature of deploying DesktopDirect can be leveraged to provide tablet
     access to critical applications while a native app is under development. Because DesktopDirect supports access to
     both physical and virtual desktops, organizations can quickly and cost-effectively deploy a tablet access solution
     that incorporates their investment in server-based computing.

     Ultimately, each organization has to bear in mind their requirements for data leakage prevention, application
     availability, time and expense and usability and select the approach or combination of approaches that meet their
     business needs and provide the strongest ROI for their environment.




	                                                                                                                     9
DesktopDirect	


   About Array Networks
     Array Networks is a global leader in application, desktop and cloud service delivery with over 5000 worldwide
     customer deployments. Powered by award-winning SpeedCore™ software, Array solutions are recognized by
     leading enterprise, service provider and public sector organizations for unmatched performance and total value of
     ownership. Array is headquartered in Silicon Valley, is backed by over 300 employees worldwide and is a profitable
     company with strong investors, management and revenue growth. Poised to capitalize on explosive growth in
     the areas of mobile and cloud computing, analysts and thought leaders including Deloitte, Red Herring and
     Frost  Sullivan have recognized Array Networks for its technical innovation, operational excellence and market
     opportunity.




       Corporate                          France                            Korea
       Headquarters                       infosfrance@arraynetworks.        array-sales@arraynetwork.
       info@arraynetworks.com             com                               co.kr
       408-240-8700                       +33 (0) 180 886 086               +82(2)3461-8124
       1 866 MY-ARRAY                                                                                               To purchase
       www.arraynetworks.com              India                             Taiwan                                  Array Networks Solutions,
                                          isales@arraynetworks.com          support.taiwan@arraynet-                please contact your
       Belgium                            +91-080-41329296                  works.com                               Array Networks
       +32 2 6336382                                                        886-2-7718-2750                         representative at
                                          Japan                                                                     1-866 MY-ARRAY
       China                              sales-japan@arraynetworks.        UK                                      (692-7729) or
       support@arraynetworks.             com                               infoseurope@arraynetworks.              authorized reseller.
       com.cn                             +81-45-664-6116                   com
       +010-84446688                                                        +44 (0) 7717 153 159
                                                                                                                                       Nov-2011 rev. b




© 2011 Array Networks, Inc. All rights reserved. Array Networks, the Array Networks logo, AppVelocity, NetVelocity, DesktopDirect
and SpeedCore are all trademarks of Array Networks, Inc. in the United States and other countries. All other trademarks, service
marks, registered marks, or registered service marks are the property of their respective owners. Array Networks assumes no
responsibility for any inaccuracies in this document. Array Networks reserves the right to change, modify, transfer, or otherwise
revise this publication without notice.

Apple and iPads are registered trademarks of Apple, Inc.
Copyright © 2011, Array Networks, Inc.		
Google and Android are registered trademarks of Google, Inc.

More Related Content

What's hot

Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISECisco Canada
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...Jürgen Ambrosi
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudRightScale
 
Open day competenze digitali boverino v-mware intro
Open day competenze digitali   boverino v-mware introOpen day competenze digitali   boverino v-mware intro
Open day competenze digitali boverino v-mware introRedazione InnovaPuglia
 
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...Jürgen Ambrosi
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and UpdateCisco Canada
 
From Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the UnexpectedFrom Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the UnexpectedDataCore Software
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A ServiceMichael Davis
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Canada
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloudAzure Group
 
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...emagia
 
Security concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingSecurity concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingClinton DSouza
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
Intel SaaS Security Playbook
Intel SaaS Security PlaybookIntel SaaS Security Playbook
Intel SaaS Security PlaybookIntel IT Center
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways Array Networks
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 

What's hot (20)

Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
3° Sessione - VMware Airwatch, la gestione della mobilità nelle organizzazion...
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
VMware Workspace One
VMware Workspace OneVMware Workspace One
VMware Workspace One
 
Open day competenze digitali boverino v-mware intro
Open day competenze digitali   boverino v-mware introOpen day competenze digitali   boverino v-mware intro
Open day competenze digitali boverino v-mware intro
 
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...
 
Identity Services Engine Overview and Update
Identity Services Engine Overview and UpdateIdentity Services Engine Overview and Update
Identity Services Engine Overview and Update
 
From Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the UnexpectedFrom Disaster to Recovery: Preparing Your IT for the Unexpected
From Disaster to Recovery: Preparing Your IT for the Unexpected
 
IT Security As A Service
IT Security As A ServiceIT Security As A Service
IT Security As A Service
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
 
Security concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computingSecurity concerns with SaaS layer of cloud computing
Security concerns with SaaS layer of cloud computing
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
Intel SaaS Security Playbook
Intel SaaS Security PlaybookIntel SaaS Security Playbook
Intel SaaS Security Playbook
 
Array Networks - Secure Access Gateways
Array Networks - Secure Access GatewaysArray Networks - Secure Access Gateways
Array Networks - Secure Access Gateways
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 

Similar to Tablet Access to Business Applications

Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftUni Systems S.M.S.A.
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What? Array Networks
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperShetal Patel
 
Time for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureTime for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureITOutcomes
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceVMware
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsVMware
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudEmbotics Corp.
 
Designing and Developing Custom Mobile Applications
Designing and Developing Custom Mobile ApplicationsDesigning and Developing Custom Mobile Applications
Designing and Developing Custom Mobile ApplicationsDunn Solutions Group
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxsreevidyaopenteq
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper Assem mousa
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationKirk Donnan
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessisitnewsafrica
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 

Similar to Tablet Access to Business Applications (20)

Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
End-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shiftEnd-user computing is not a trend, it's a transformational shift
End-user computing is not a trend, it's a transformational shift
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 
IBM Mobile devices Whitepaper
IBM Mobile devices WhitepaperIBM Mobile devices Whitepaper
IBM Mobile devices Whitepaper
 
Time for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop ArchitectureTime for a New Mobile-Cloud Desktop Architecture
Time for a New Mobile-Cloud Desktop Architecture
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government EnvironmentsThree Keys to Building a Secure Mobile Infrastructure in Government Environments
Three Keys to Building a Secure Mobile Infrastructure in Government Environments
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the Cloud
 
Designing and Developing Custom Mobile Applications
Designing and Developing Custom Mobile ApplicationsDesigning and Developing Custom Mobile Applications
Designing and Developing Custom Mobile Applications
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
 
Good Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content CollaborationGood Technology Whitepaper: Mobile Content Collaboration
Good Technology Whitepaper: Mobile Content Collaboration
 
Enterprise mobility philip_duplessis
Enterprise mobility philip_duplessisEnterprise mobility philip_duplessis
Enterprise mobility philip_duplessis
 
Security that works
Security that worksSecurity that works
Security that works
 

More from Array Networks

Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl... Array Networks
 
WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE Array Networks
 
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ... Array Networks
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance Array Networks
 
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array NetworksVirtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array Networks Array Networks
 
Web Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array NetworksWeb Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array Networks Array Networks
 
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array NetworksVirtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks Array Networks
 
Array Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayerArray Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayer Array Networks
 
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution BriefDELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief Array Networks
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief Array Networks
 
Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010 Array Networks
 
eCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution BriefeCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution Brief Array Networks
 
Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava... Array Networks
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS Array Networks
 
WAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERSWAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERS Array Networks
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY Array Networks
 
VIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERSVIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERS Array Networks
 
AVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCESAVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCES Array Networks
 
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal... Array Networks
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper Array Networks
 

More from Array Networks (20)

Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
Redefining ADCs for Software-as-a-Service Application Delivery that’s Scalabl...
 
WAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCEWAF FOR PCI-DSS COMPLIANCE
WAF FOR PCI-DSS COMPLIANCE
 
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...Array Networks’ Application Delivery Solutions Now Available Through Promark ...
Array Networks’ Application Delivery Solutions Now Available Through Promark ...
 
Array Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & PerformanceArray Networks - Application Availability, Security & Performance
Array Networks - Application Availability, Security & Performance
 
Virtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array NetworksVirtual WAN Optimization Controllers Data Sheet - Array Networks
Virtual WAN Optimization Controllers Data Sheet - Array Networks
 
Web Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array NetworksWeb Application Firewall (WAF) Data Sheet - Array Networks
Web Application Firewall (WAF) Data Sheet - Array Networks
 
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array NetworksVirtual Web Application Firewall (vAWF) Data Sheet - Array Networks
Virtual Web Application Firewall (vAWF) Data Sheet - Array Networks
 
Array Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayerArray Networks Case Study - SoftLayer
Array Networks Case Study - SoftLayer
 
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution BriefDELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
DELL STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution BriefDATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
DATA STORAGE REPLICATION aCelera and WAN Series Solution Brief
 
Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010Array Networks & Microsoft Exchange Server 2010
Array Networks & Microsoft Exchange Server 2010
 
eCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution BriefeCLINICALWORKS APV Series Solution Brief
eCLINICALWORKS APV Series Solution Brief
 
Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...Array APV Series application delivery controllers help scale performance, ava...
Array APV Series application delivery controllers help scale performance, ava...
 
APPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERSAPPLICATION DELIVERY CONTROLLERS
APPLICATION DELIVERY CONTROLLERS
 
WAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERSWAN OPTIMIZATION CONTROLLERS
WAN OPTIMIZATION CONTROLLERS
 
VIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAYVIRTUAL SECURE ACCESS GATEWAY
VIRTUAL SECURE ACCESS GATEWAY
 
VIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERSVIRTUAL APPLICATION DELIVERY CONTROLLERS
VIRTUAL APPLICATION DELIVERY CONTROLLERS
 
AVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCESAVX SERIES VIRTUALIZED APPLIANCES
AVX SERIES VIRTUALIZED APPLIANCES
 
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
Array Networks to Deliver First Highly-Resilient “Open Sandwich” Layer-3 Scal...
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
 

Recently uploaded

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Tablet Access to Business Applications

  • 1. W hi te Pa pe r W hi te Pa pe r DesktopDirect Tablet Access to Business Applications The consumerization of IT is under way. Workers want tablet access to business applications, often from personal devices. Learn why VPNs are not ideal for mobile connectivity and why remote desktop is a more secure, less expensive approach to tablet access that is easier to deploy, manage and use.
  • 2. DesktopDirect Table of Con t e n ts Introduction 3 Tablet Deployment Challenges 3 Security 3 Application Availability 3 Device Management 4 Cost 4 Time 4 Approaches to Tablet Access 5 VPN Native Apps 5 Server-Based Computing 5 Managed Services 6 DesktopDirect - A New Approach to Tablets for Business 6 Data Leakage Prevention 7 Full Application Availability 7 Time Expense 7 Usability 7 Summary 8 About Array Networks 9
  • 3. Tablet Access to Business Applications Introduction Tablet adoption is on the rise. Over 35 million iPads are expected to sell in 2011, with sales of over 55 million projected for 2012. Android-based tablets, which are expected to sell 20 million units in 2011, will grow even faster with sales of over 45 million units in 2012. A proven winner in the consumer market, tablets are now making significant inroads in the enterprise due to their portability and their potential to provide instant access to applications and information in a broad range of business situations. For instance, it is not practical for a doctor on the move between exam rooms, rounds and clinics to carry a heavy laptop that is constantly starting up, connecting, sleeping or shutting down. In contrast, a tablet is highly portable and provides an always-on experience with information and applications immediately available at the doctor’s finger tips. This ability to enhance worker productivity and improve quality of work gives tablets the potential for tremendous growth in the enterprise. Tablet Deployment Challenges Initially designed as consumer devices, tablets face significant challenges to becoming full-fledged solutions for business productivity. Chief among them are security, application availability, device management, cost and time. Security First and foremost is security. Consider the lengths and costs necessary to ensure the security of VPN access: laptops, client software, anti-virus, anti-spyware, hard-disk encryption, two-factor authentication and the list goes on. The thought of a similar scenario driven by the influx of tablets in the workplace is daunting. What’s more, tablet access is complicated by Bring Your Own Device (BYOD), the desire of many workers to use their personal device. Personal devices and content can create a lot of problems; for example, running standard VPN clients on tablets can change device behavior – a scenario that employees will not accept and which will create additional burden for IT. Further, personal devices are more likely to be lost or stolen, and create a situation where music, pictures and personal content reside on the same device as confidential enterprise data. As IT attempts to protect corporate data without disturbing personal data, significant risk can result if security is traded to achieve a more user-friendly experience. Unfortunately, the organizations that stand to gain the most from the benefits of tablet access, such as financial services and healthcare, are the same organizations that stand to lose the most in the event of data leakage. Application Availability Tablets access the Internet, run consumer apps and without too much trouble can be configured to provide access to corporate email systems. Out of the box, this is about the extent of a tablet’s capabilities for conducting business. Tablets don’t run Windows, or any of the business applications developed for Windows. This is to say, there is a large gap between what employees are accustomed to using and what is available on tablets. There are certain native apps that can be purchased, but since tablets are often private devices, it doesn’t make sense to re-purchase apps that are already available on employee desktops. Additionally, because tablets are consumer devices, employees will commonly switch from one platform to another, increasing the number of application environments that must be purchased, deployed and managed. 3
  • 4. DesktopDirect Cost Time App Security Support Device Management In the case of organizations deploying a form of managed tablets, IT is looking at different solutions for Mobile Device Management (MDM) to deal with the issue of security and lost tablets. While remote wipe and reset capabilities are available, personal data on devices is a problem as it causes the enterprise to take responsibility for backup and restore of personal data. As with security, without any real alternatives, IT is forced to spend a considerable amount of time and money locking down and managing this new class of device. For those organizations opting to support a BYOD strategy, unmanaged devices cannot go completely unmanaged; organizations must still determine an approach to providing limits on personal tablets, without impacting their usability as a consumer device. Cost As with any business or IT investment, benefits and gains must outweigh costs. While executives and employees may be clamoring to use the latest and greatest technology, or the benefits of tablet access may be clear, in the end, costs must be factored in and the solution must make business sense. Considering the challenges posed by security, application access and device management, the cost consideration is not trivial and can include duplicate application environments, duplicate security environments, development of native applications and investments in server-based computing, not to mention the costs of tablets themselves, should an organization decide to deploy managed devices. Time Last is the challenge of time. Security, application availability and device management challenges not only impact cost, they also introduce significant barriers to deploying tablet access in a timely manner. Developing native apps and installing new application infrastructure can take months, as can bringing together all the pieces necessary for successfully delivering enterprise applications to tablet devices. Organizations are well advised to allocate sufficient time for implementing a tablet strategy and to seek out more efficient alternative approaches to mobile application delivery. Copyright © 2011, Array Networks, Inc.
  • 5. Tablet Access to Business Applications Approaches to Tablet Access To determine the best approach or mix of approaches for any organization, it is necessary to evaluate the pros and cons of all solutions and compare them against the needs of the particular business. Three common approaches for providing tablet access to corporate resources and applications are the use of VPN and native applications, server-based computing and managed services. VPN Native Apps A common approach to tablet access is to leverage existing VPN infrastructure and provide the workforce with instructions for installing the VPN client on their mobile device. The benefit here is that it is a fast, down and dirty way to enable tablets in the enterprise, at the extra cost of new licenses and additional appliances. However, these VPN clients are intrusive apps, and installing them on private devices can cause potential instabilities and support problems that are not acceptable. Security is another drawback of this approach. In its most basic implementation, the only thing that is secured is the connection between the tablet and the corporate network. Like a laptop, a tablet is able to download, store, copy, paste and send all the data it wants; unlike a laptop, it is not managed and is far more likely to get lost or stolen. This opens the door to other challenges such as the cost and complexity of purchasing corporate owned and managed tablets, or investing heavily in mobile device management software, or both. The other challenge of simple VPN access is application availability. Tablets do not run Windows, and tablets do not support most enterprise applications. This creates a significant gap between the use of tablets as consumer devices and the use of tablets for business. To close this gap, organizations are turning to developing or purchasing native applications, in essence creating a duplicate application environment specifically for tablet access for a select number of core applications. A benefit of native apps is that they can be developed from the ground up for usability on a tablet platform. This is an important consideration, as applications will differ as to how well they behave in the tablet environment. There are, however, downsides and limitations to developing native apps. For one, it is time consuming and expensive to develop and support multiple application environments. Considering the number of applications in use in the typical enterprise, developing or purchasing native apps may not make sense beyond a core set of business-critical applications. Secondly, developing or purchasing native apps locks enterprises into specific tablet platforms, eliminating the ability to support a flexible BYOD strategy. In the end, an approach based on VPNs and native apps can deliver a highly-productive user experience for select applications, but at significant expense due to security, mobile device management and the need to develop, purchase and support secondary application environments. Because data is allowed to reside on the tablets, data leakage can never be fully prevented; moreover, native apps are not aligned with a flexible BYOD strategy as they require organizations to develop to specific platforms. Server-Based Computing Server-based computing runs applications and desktops in the data center and delivers them to client devices on demand. Just as these virtual applications and virtual desktops can be delivered to PCs either locally or remotely, today, providers of server-based computing offer client applications that make it possible to deliver applications to tablets and smart phones. 5
  • 6. DesktopDirect Advantages of the server-based computing approach are multi-fold. First, any application that is running in the server-based computing environment can be made available to tablet devices, eliminating the need to develop native apps and support multiple application environments. Second, because end-users are simply manipulating files, applications and desktops that reside in the corporate data center, the server-based computing client app can be configured such that data never leaves the corporate network. With the ability to prohibit copy and paste, local printing and screen capture, and without the possibility of corporate data residing on tablets, the possibility for data leakage can essentially be reduced to zero. On the other hand, while many enterprises have deployed server-based computing for key applications for key user groups, very few have deployed server-based computing as the primary environment for users and applications across the organization. The cost of servers, software, licenses and deployment is simply too steep, with most enterprises deploying server-based computing for no more than a small percentage of their overall workforce. In short, while this approach can be highly-secure and highly-flexible for users and applications already supported by server-based computing, the time and expense required to extend the solution enterprise-wide makes it highly impractical. Managed Services Many providers of managed services for remote desktop access now tout the ability to access desktops and applications using tablet devices. In theory, providing tablet access to office desktops using remote desktop technology makes a lot of sense. If the service provider provides controls for managing end-points and disabling copy, paste, print and screen capture, and the user is simply operating his or her primary work environment using a remote device, data will not be able to leave the corporate network. What’s more, because users are accessing their primary work environment, they have access to the full range of applications they require to be productive. Because the solution leverages existing infrastructure, and because service providers offer support for a wide range of devices, the managed services approach is relatively cost- effective and at the same time can support a BYOD strategy. In reality, enterprises are not comfortable exposing sensitive data and the enterprise network to a third party. For these managed services to function, thousands of permanent connections must be established from the corporate network to a broker on a third party network – a network that supports many other business as well as individual consumers. Enterprises have been unwilling to use these services to provide remote access to office PCs from traditional devices such as home desktops and laptops, and in all likelihood will have the same apprehensions about using managed services to provide tablet access to corporate applications. Comparing the three approaches, no single solution provides a perfect combination of data leakage prevention, application availability, affordability and usability. Enterprises will either have to select a solution that is the best fit for their particular environment, or look beyond these three solutions to find a new approach that eliminates the tradeoffs between security, application availability, cost and usability. Copyright © 2011, Array Networks, Inc.
  • 7. Tablet Access to Business Applications DesktopDirect – A New Approach to Tablets for Business DesktopDirect is an innovative, secure remote access solution. Unlike VPNs, DesktopDirect enables employees to get to their office computers from any remote location — whether they be at their home office, at a customer or partner site, at a public Internet kiosk, or even from their iPhones and iPads. DesktopDirect uniquely leverages proven and scalable technologies to deliver the industry’s most secure enterprise-class solution for remote desktop access and control. In a tablet access environment, the DesktopDirect appliance is installed in the corporate network and integrates with Active Directory or similar to establish user credentials for secure access. Either physical or virtual desktops may be registered for users, a process that can be accomplished by the administrator manually or via a database, or by end-users using Array Registration Technology (ART). For tablet access, users download a free application from an App Store, App Marketplace or similar to their corporate or personal tablet. From there, users launch the DesktopDirect application, log in using their single sign-on credentials, and make a selection from their list of registered desktops. Physic Desktoal ps SP X Virtual Tablets Desktop s Array Ne Desktoptworks Direct SSL Firewall Tablets Internet n Full application availability n Eliminates data leakage Smart n Secured connection Phones n IT control n Easy to deploy and manage Laptops n Scalable PCs n Affordable n Data Leakage Prevention DesktopDirect is an appliance-based solution that is enterprise owned and operated. Unlike managed services, DesktopDirect is under full enterprise control and does not open the corporate network to third party networks. DesktopDirect also ensures that mobile devices never become a part of the corporate network; because end-users merely use their mobile device to control their office desktop, data never leaves the corporate network and cannot be left behind on tablets. Connectivity from the DesktopDirect appliance to end- user devices is encrypted using SSL and controls for copy, paste, print and screen capture eliminate any remaining chance of data leakage. 7
  • 8. DesktopDirect n Full Application Availability DesktopDirect leverages existing desktop, application and security infrastructure. Unlike server-based computing, a traditional PC work environment is provided to nearly all employees. Without any need for new hardware or software, licenses or application environments, employees enterprise-wide can be provided with full application availability. n Time Expense As compared to the time and expense of developing native applications or deploying server- based computing, DesktopDirect is highly cost-effective. Unlike managed services that charge indefinitely, right- sized DesktopDirect hardware and software license packs are an affordable one-time purchase. DesktopDirect can be set up in as little a few hours and is capable of achieving ROI in the time it takes to set up alternate solutions. n Usability While DesktopDirect cannot provide the user experience of a dedicated native application, it goes a long way towards creating a PC experience for tablets that retains the usability of office applications. Wake-on-LAN (WoL) capability allows laptops and desktops to be powered down at night, over the weekend or anytime they are not needed and powered up remotely by users. In addition, a comprehensive suite of touch screen gestures and controls are built into the DesktopDirect mobile app in order to provide intuitive control over mouse, keyboard and other PC-specific functions. Tablets Physical Desktops Securely Smart connect Phones to office Laptops desktops Virtual Desktops from any Terminal PCs device, Services anywhere. Remote Office Deploying DesktopDirect to enable tablet access for employees, enterprises get a cost-effective solution that is fully secure and fully under IT control and at the same time provides full application availability, supports a BYOD strategy and is simple to deploy, manage and use. What’s more DesktopDirect simultaneously creates a remote access solution for productivity and business continuity, allowing users to log into their office desktops from any remote device, anywhere. Copyright © 2011, Array Networks, Inc.
  • 9. Tablet Access to Business Applications Summary Selecting the right approach to providing tablet access may not be an either or proposition, but might, in fact, include a mix of the approaches outlined in this document. For instance, a particular application may not translate well from a PC environment to a tablet environment, and the decision is made that a native application must be developed. Or an application is so essential to the core business that getting the best possible user experience is worth the expense of developing a native app. Likewise, organizations with a large investment in server-based computing will still want to make these resources available to tablet users. VPN Native Server-Based Managed DesktopDirect Apps Computing Services Data Leakage Prevention Fair Excellent Fair Excellent Application Availability Fair Excellent Excellent Excellent Time Expense Poor Poor Fair Excellent Useability Excellent Fair Fair Good DesktopDirect is equally at home providing a full tablet access solution or working in conjunction with alternate approaches to tablet access. If an enterprise has hundreds of applications, native apps may be developed for five to ten of them, with DesktopDirect providing a catch all to provide secure tablet access to the remainder of the organization’s applications. Or the rapid nature of deploying DesktopDirect can be leveraged to provide tablet access to critical applications while a native app is under development. Because DesktopDirect supports access to both physical and virtual desktops, organizations can quickly and cost-effectively deploy a tablet access solution that incorporates their investment in server-based computing. Ultimately, each organization has to bear in mind their requirements for data leakage prevention, application availability, time and expense and usability and select the approach or combination of approaches that meet their business needs and provide the strongest ROI for their environment. 9
  • 10. DesktopDirect About Array Networks Array Networks is a global leader in application, desktop and cloud service delivery with over 5000 worldwide customer deployments. Powered by award-winning SpeedCore™ software, Array solutions are recognized by leading enterprise, service provider and public sector organizations for unmatched performance and total value of ownership. Array is headquartered in Silicon Valley, is backed by over 300 employees worldwide and is a profitable company with strong investors, management and revenue growth. Poised to capitalize on explosive growth in the areas of mobile and cloud computing, analysts and thought leaders including Deloitte, Red Herring and Frost Sullivan have recognized Array Networks for its technical innovation, operational excellence and market opportunity. Corporate France Korea Headquarters infosfrance@arraynetworks. array-sales@arraynetwork. info@arraynetworks.com com co.kr 408-240-8700 +33 (0) 180 886 086 +82(2)3461-8124 1 866 MY-ARRAY To purchase www.arraynetworks.com India Taiwan Array Networks Solutions, isales@arraynetworks.com support.taiwan@arraynet- please contact your Belgium +91-080-41329296 works.com Array Networks +32 2 6336382 886-2-7718-2750 representative at Japan 1-866 MY-ARRAY China sales-japan@arraynetworks. UK (692-7729) or support@arraynetworks. com infoseurope@arraynetworks. authorized reseller. com.cn +81-45-664-6116 com +010-84446688 +44 (0) 7717 153 159 Nov-2011 rev. b © 2011 Array Networks, Inc. All rights reserved. Array Networks, the Array Networks logo, AppVelocity, NetVelocity, DesktopDirect and SpeedCore are all trademarks of Array Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Array Networks assumes no responsibility for any inaccuracies in this document. Array Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Apple and iPads are registered trademarks of Apple, Inc. Copyright © 2011, Array Networks, Inc. Google and Android are registered trademarks of Google, Inc.