Title: Citrix Virtualization
1Citrix Virtualization
2Citrix Systems
The
Company
- NASDAQ 100 and SP 500 company
- 909 million in 2005 revenue
- 25 YoY growth
- 50 revenue fromoutside No. America
- 3,000 employees in 35 countries
- 6,200 partners in over 100 countries
- 180,000 customers
- 94 customer loyalty
- 75 of all Internet users
- Microsoft Global ISV of the Year 2003 and 2005
3Applications AccumulateThey Dont Go Away
- Myth All applications will be web-based
- Myth We have well-managed desktops using ESD
4Virtualization Overcomes Devices, Applications
Locations
Any Device
Corporate user
Branch user
Broad ApplicationCompatibility
Outsourced user
Any Network
Home user
5Understanding Citrix Virtualization
- Consolidating IT resources for best security,
cost and performance
6Virtualization
Separates physical from logical
7Application Virtualization
Separates where applications are used from where
they run
Applications
Devices
8Desktop Virtualization Is Similar
Separates where the desktop is used from where it
runs
Desktops
Devices
9Virtualization ArchitectureApplications, data,
servers storage
External Users (Customers, Partners, Suppliers)
Mobile Users
Home Users
Branch Office
Virtual Machines Consolidate servers
Distributed Apps Data
10Citrix Desktop Application Stack
Physical Client Device
Any Network Connection
DesktopVirtualization Service
11Comprehensive Solution
- Virtualization at multiple layers of
applications, multiple types of desktop access
12Comprehensive App Virtualization Leverages
Multiple Technologies
- Applications have many layers
- User interface
- Graphics display
- File system and Registry components
- System resource utilization (CPU, memory)
- Network address
- Printer drivers
- Abstracting multiple layers provides best
performance, security, compatibility and TCO
13Citrix Presentation Server 4A Comprehensive App
Virtualization Solution
User Interface
CPU, Registry, DLLs
- Virtual Interface
- Screen changes sent to desktop
- Only keyboard, mouse, audio I/O and
peripheralI/O travels network
- File Registry Abstraction
- Isolate applications, prevent changes to registry
- Increase no. of apps that can be virtualized
- Eliminate app conflicts on shared server
- CPU virtual memory resource abstraction
- Ensures fair-share use of processing resources
across users - Abstracts and consolidates DLLs to improve memory
use
- Printing and peripherals
- Virtual channels enable virtual apps to work
withlocal devices - Abstracts printer driver from client PC and
consolidates with universal print driver
- Network Address Abstraction
- Create Virtual IP address for each user
session - Expands range of apps that can be virtualized
14Citrix Desktop Virtualization
DesktopLogic
DesktopLogic
Interface
- Desktop Virtualization
- Entire user environment resides on server
- Only keyboard, mouse, audio I/O and peripheral
I/O travels network - Shared OS or dedicated desktop image
15Business Drivers
- Application virtualization propelled by global
economic trends
16Business Continuity
- The Telework Coalition
- the best strategyis to decentralize the work
force to limit disruptions brought on by nature
and humankind. - have between 25 percent and 30 percent of their
employees working offsite to have a true
continuity of operations plan
17Laptop Thefts
18Concerns About Outsourcing
19Branch Office Expansion and Connectivity
- Challenges
- Security at branch offices
- Lack of IT expertise at branches
- Limited network infrastructure and bandwidth
- Inefficient resource capacity utilization
- Difficulty managing across geographic separation
20IT Benefits
- Operational and economic efficiencies
21App Virtualization IT Benefits
ImprovedSecurity
- Centralize data
- Monitor and control access
- Protect data from theft, destruction, attack
22App Virtualization IT Benefits
ImprovedSecurity
Consolidation Standardization
- Reduce physical deployment to users devices
- Centralize management maintenance
- Minimize impact of device network variables
- Manage access from unmanaged devices
- Up to 48 lower TCO (Gartner)
23App Virtualization IT Benefits
ImprovedSecurity
Consolidation Standardization
- Manage performance for best user experience
- Deliver to any device over any connection
- Add new users, divisions, offices rapidly
- Scale both up and out
24Greater Consolidation with x64
25App Virtualization Strategic Business Drivers
- Compliance
- Business Continuity
- Outsourcing
- Expansion in Emerging Economies
- Workforce Mobility
- Consolidated apps and data simpler to control
- Centralized IT provides more effective security
- User activity and app usage easier to track
Confidential information is distributed
throughout the enterprise information residing
on PCs, laptops, portable devices is exposed to
much higher risks. - Enterprise Strategy
Group, March 2006
26Beverly EnterprisesHealthcare Provider
- Centralized control and accountability of data
for regulatory compliance HIPAA, SOX - Virtualized entire desktop and applications
- Encrypted screen updates keystrokes over LAN,
WAN or Internet
27App Virtualization Strategic Business Drivers
- Compliance
- Business Continuity
- Outsourcing
- Expansion in Emerging Economies
- Workforce Mobility
- Centralized apps and data are easier to protect
and transport - Working from home is integral to business
continuity plans - Lengthy workforce displacement a reality
(pandemic preparation)
In the event of a pandemic, remote working will
allow segregation of the workforce. -
CSOonline.com, April 2006
28Mutual Services Corp.Hurricane Preparedness
- Moved operations from FL to GA in 3 days
- Provided uninterrupted, secure Web access
- Trading applications
- Financial data
- Thousands of broker/dealers
- Comply with several regulations with help of
Citrix solutions
29App Virtualization Strategic Business Drivers
- Compliance
- Business Continuity
- Outsourcing
- Expansion in Emerging Economies
- Workforce Mobility
- Send out the work, not the data
- Control and monitor access and usage
- Support centrally
- Quickly deploy apps
- Easily switch outsourcers as needed
Companies are more concerned about theft or
misuse of outsourced data than they are about the
threat of terrorism. - Booz Allen Hamilton,
March 2006
30CompuCreditReducing Risks of Outsourcing
- Retained control of applications and data
- Ensured customer financial and personal data is
secure - Regulatory compliance
- Rolled out call center operations quickly
- Never ceded control in exchange for convenience
31App Virtualization Strategic Business Drivers
- Compliance
- Business Continuity
- Outsourcing
- Expansion in Emerging Economies
- Workforce Mobility
- Lower infrastructure requirements at sites
- Support and upgrades maintained centrally
- Standardized use of critical business apps
Today, Asia accounts for 13 of world gross
domestic product, while Western Europe accounts
for more than 30. Within the next 20 years, the
two will nearly converge. - McKinsey Co., 2006
32Eicher GroupAuto Manufacturing Across India
- Centralized information for 7 plants across
India - Reduced communication costs by 40, improved
network performance by 25 - Provided real-time access to applications to
support partnerships with vendors suppliers - Reduced time to deploy applications and upgrades
from a week to two hours
33App Virtualization Strategic Business Drivers
- Compliance
- Business Continuity
- Outsourcing
- Expansion in Emerging Economies
- Workforce Mobility
- Support many devices and form factors
- Secure data centrally
- Consolidate data for backups
- Update software easily
- Support from one location
Control of confidential data decreases as a
function ofits location. - Enterprise
Strategy Group, March 2006
34AccordRemote Working, Central Administration
- Support 16 business units across UK
- Centralization eliminated need for data to reside
in local offices and endpoint devices - Standardized applications and email for greater
collaboration - Introduced home-based and mobile remote working
using PCs, laptops and PDAs
35Best Access Experience. Anytime. Anywhere.