Intelligent Enterprise

Categories: Cases

Intelligent Enterprise

Smart Enterprise Solutions Overview

Informatization has become a major trend of development in today's world, and the use of information technology to improve the competitiveness of intelligent enterprises has become an inevitable development trend. However, how to implement informatization with limited funds? How to choose advanced technology and equipment? Does a smart enterprise need a cloud? How to maximize the value of technology to achieve enterprise transformation and upgrading ...... and many other issues are questions in front of the intelligent enterprise owners.

Xinhua San Intelligent Enterprise Solution considers interconnection and management comprehensively from practical applications,suretyThe four key elements of the "Harmony" concept, scalability, and cost-effective foundation for the enterprise.reticulationIn the case of maintaining the quality of information technology, the cost is reduced by 70%, and information technology is no longer a heavy burden on the enterprise.

. Construction Requirements

With virtual desktops as the delivery form, based onserver (computer)virtualizationConstructing the basic support environment for the IaaS platform.cloud computingTechnology at the security level needs to solve the problems faced by the traditional IT infrastructure, to achieve unified management, system stability and other needs, to give full play to the advantages brought by the virtual desktop in the post-PC era.

Inefficient management operations and maintenance

In the face of widely distributed PC hardware, users increasingly require access to their desktop environments from anywhere, making centralized PC management extremely difficult to achieve. In addition, it is well known that PC desktop standardization is also a difficult problem due to the wide variety of PC hardware, especially when purchased in batches, which makes it difficult to maintain and manage a wide variety of terminals in asset management, and users have different needs for modifying their desktop environments.

Difficulty in securing data

In the PC office environment, the terminal due to the lack of necessary security measures, there is a greater loss, leakage of confidentiality risks, the user can download confidential information to the local hard disk, and then through illegal copying or burning and other ways, the confidential information leaked out. In order to ensure data security, IT operation and maintenance personnel can only run all kinds of security protection software on desktop PCs, but if desktop PCs use CD-ROMs, USB and other devices to boot, or hook up the hard disk to another computer as a slave disk to start, it can easily bypass the protection system located on the PC hard disk, at which time illegal personnel can obtain confidential information and implant viruses and Trojans without leaving any traces, which will affect the safe operation of all desktops on the LAN. In this case, the illegal person can obtain confidential information and implant virus and Trojan horse without leaving traces, thus affecting the safe operation of all desktops on LAN.

Insufficient scalability and flexibility

Existing PC equipment in the expansion of the first and the lack of flexibility, especially for temporary and short-term expansion needs, such as: new employees on board, the need to apply for and deploy new PC, the traditional model requires a lot of investment in the deployment of work, the lack of good scalability and timeliness.

  1. Xinhua San Enterprise Cloud Desktop Solution Design

H3C Cloud Desktop Studio

The management platform component of the cloud desktop, deployed in theserver (computer)On the platform, administrators can manage virtualization platforms, desktop images, desktop pools, and users related to cloud desktop business.

H3C Workspace App

groutVDIThe client program for the cloud desktop, deployed in theOn a PC or thin terminalThe client allows users to efficiently transfer desktop images and map local devices on PCs or thin terminals to VDI cloud desktops.

H3C IDV Client

The H3C IDV client runs on the IDV terminal, and users can use the IDV desktop through the H3C IDV client.

H3C Workspace SpaceAgent

The agent program used by the H3C Workspace Studio management platform to manage terminals is deployed on terminals to provide the management platform with multiple terminal management capabilities.

  1. Program Advantages

great experience

H3C Workspace cloud desktop products are optimized for different application scenarios and performance optimization to best match users' individual needs.

PC-like user experience

Does not change the user's login, boot-up and shutdown habits. Desktop connection protocol VDP is deeply optimized for desktop image transmission, which significantly improves the desktop access experience and enables desktop login in seconds.

Perfect software compatibility

Provide software compatibility list, compatible with mainstream applications and antivirus software. Industry-specific software (e.g. C/S and B/S applications) compatibility is complete. ByGPUsStraight-through/hardware virtualization technology to meet the performance needs of industrial mapping and other professional-grade applications, support for common mainstream mapping software, such as: 3DMaxs, AutoCAD, ProE and so on. For extremely special industry applications, customized adaptations can be made.

Smooth video experience

Video redirection technology dramatically improves the user's video experience and effectively reduces the resource overhead of video decoding on the server. Support high-density video concurrency scenarios.

Extensive support for all types of peripherals

The self-developed peripheral redirection core technology maintains the same bus channel as the PC, and employees can use peripherals such as printers, scanners, Ukey, etc. as in the PC.

enhanced security

H3C Workspace cloud desktop through the "cloud - management - end" systematic security and reliability design, from the terminal security, network security, cloud platform security to management security, multi-level security design, prevention as the main, monitoring and auditing as a supplement, all-round protection of office desk surfaceinformation security. It also provides reliability assurance from the endpoint to the platform.

 Terminal security: terminal feature code authentication, fingerprint, USB key multi-factor authentication, port, peripheral centralized black and white list control, etc.

 Network security: virtual desktop pool isolation; secure encrypted transmission of desktop connections, etc.

 Data Security: Set up peripheral usage policies for your desktop and use Application Control to control the use of offending software. Desktop watermarking,stockpileSecurity features such as read-only devices ensure that data is not lost.

 Cloud platform security: support for distributed storage, support for virtual machine image hierarchical storage, data disk through the software encryption, data without trace processing. The security of the underlying virtualization platform is guaranteed by the virtualization anti-virus old, etc.

 Management security: administrator decentralization and sub-domain management, desktop user behavior log auditing, etc.

 All-round reliability guarantee: network status detection, client self-service backup and recovery, automatic reconnection of network flash disconnection, HA resource reservation for key components, batch backup of virtual machines, etc.

In addition, H3C Workspace cloud desktop products support integration with third-party antivirus or security software, such as ASEC Security, to provide a complete security protection solution in virtualized environments, and protect virtual machines without the need to install an agent within the virtual desktop, so as to achieve security in virtualized environments.

concise management

Cloud Desktop Studio, the H3C Workspace management platform, enables unified management of physical and virtual resources and virtual desktop lifecycle, unified alarm and fault management, and improves IT operation and maintenance management efficiency.

 Unified virtual desktop life cycle management, unified alarm and fault management. The fastest 1 hour to complete the deployment of the basic desktop environment, desktop rapid on-line and expansion, flexible scheduling of resources to quickly respond to business scaling, to improve IT's business support capabilities and response time

 Allocate different desktop resource pools for different scenarios, support static desktop pools, dynamic desktop pools and manual desktop pools

 Supports batch upgrade of operating system and application software, and does not affect the user's self-installed software and personalized data when performing batch upgrade of software.

 Centralized network policy management that specifies detailed security access rules for virtual desktop traffic (Layer 2, Layer 3, Layer 4 control, bi-directional control, time period based control). When virtual desktops are migrated between server hosts, the corresponding network policy configuration (ACL, QoS, VLAN, port binding, etc.) files are also migrated synchronously to ensure that the access control policy remains unchanged while the service is not interrupted.

intelligent operation and maintenance (O&M)

H3C Workspace centralizes the management of resources, simplifies the operation and maintenance with high efficiency, brings the balance of cost and efficiency to enterprise IT operation and maintenance, and enhances the value of IT operation and maintenance.

 Rich automated operation and maintenance management tools: one-click automatic collection and analysis of enterprise office environment information (CPU, memory, disk, etc.), user experience optimization tools, one-click log collection tools, etc., to reduce the difficulty of maintenance and improve the efficiency of operation and maintenance.

 Automated expansion, hardware power-up auto-discovery, flexible and fast expansion; linked cloned desktops to enhance user experience and improve management efficiency

The core components have independent intellectual property rights, open standardized interfaces, flexible adaptation to docking industry applications, and can quickly build solutions to match the needs of industry characteristics.

WeiboWeChatFacebookCopy link