Smart Enterprise Solutions Overview
Informatization has become a major trend of development in today's world, and the use of information technology to improve the competitiveness of intelligent enterprises has become an inevitable development trend. However, how to implement informatization with limited funds? How to choose advanced technology and equipment? Does a smart enterprise need a cloud? How to maximize the value of technology to achieve enterprise transformation and upgrading ...... and many other issues are questions in front of the intelligent enterprise owners.
Starting from practical application, Xinhua San intelligent enterprise solution comprehensively considers the four major elements of interconnection, management, security and scalability, and builds a cost-effective basic network for enterprises with the concept of "cooperation", which reduces the cost by 70% while maintaining the quality of informationization, and no longer lets the informationization become a heavy burden for the enterprises.
. Construction Requirements
With virtual desktops as the delivery form, based onserver (computer)Virtualization to build the IaaS platform basic support environment, cloud computing technology at the security level need to solve the problems faced by the traditional IT infrastructure, to achieve unified management, system stability and other needs, to give full play to the advantages brought about by the virtual desktop in the post-PC era.
Inefficient management operations and maintenance
In the face of widely distributed PC hardware, users increasingly require access to their desktop environments from anywhere, making centralized PC management extremely difficult to achieve. In addition, it is well known that PC desktop standardization is also a difficult problem due to the wide variety of PC hardware, especially when purchased in batches, which makes it difficult to maintain and manage a wide variety of terminals in asset management, and users have different needs for modifying their desktop environments.
Difficulty in securing data
In the PC office environment, the terminal due to the lack of necessary security measures, there is a greater loss, leakage of confidentiality risks, the user can download confidential information to the local hard disk, and then through illegal copying or burning and other ways, the confidential information leaked out. In order to ensure data security, IT operation and maintenance personnel can only run all kinds of security protection software on desktop PCs, but if desktop PCs use CD-ROMs, USB devices such as boot, or hard disk hooked up to another computer as a slave disk startup, you can easily bypass the protection system located on the hard disk of the PC, at this time, illegal people can leave no traces of access to classified information and implantation of Trojan horses, and then affect the safe operation of all desktops on the LAN. In this case, the illegal person can obtain confidential information and implant viruses and Trojans without leaving any trace, thus affecting the safe operation of all desktops on LAN.
Insufficient scalability and flexibility
Existing PC equipment in the expansion of the first and the lack of flexibility, especially for temporary and short-term expansion needs, such as: new employees on board, the need to apply for and deploy new PC, the traditional model requires a lot of investment in the deployment of work, the lack of good scalability and timeliness.
- Xinhua News Corporation (PRC state-run enterprise)Cloud Desktop Solutionsdevise
H3C Cloud Desktop Studio
A management platform component for cloud desktops, deployed on a server, through which administrators can manage virtualization platforms, desktop images, desktop pools, and users related to cloud desktop business.
H3C Workspace App
The client program that connects to the VDI cloud desktop, deployed on a PC or thin terminal, allows users to efficiently transfer desktop images as well as map local devices on the PC or thin terminal to the VDI cloud desktop.
H3C IDV Client
The H3C IDV client runs on the IDV terminal, and users can use the IDV desktop through the H3C IDV client.
H3C Workspace SpaceAgent
The agent program used by the H3C Workspace Studio management platform to manage terminals is deployed on terminals to provide the management platform with multiple terminal management capabilities.
- Program Advantages
great experience
H3C Workspace cloud desktop products are optimized for different application scenarios and performance optimization to best match users' individual needs.
PC-like user experience
Does not change the user's login, boot-up and shutdown habits. Desktop connection protocol VDP is deeply optimized for desktop image transmission, which significantly improves the desktop access experience and enables desktop login in seconds.
Perfect software compatibility
Provide software compatibility list, compatible with mainstream applications and antivirus software. Compatibility with industry software (e.g. C/S and B/S applications) is complete. Through GPU pass-through/hardware virtualization technology to meet the performance needs of industrial mapping and other professional-grade applications, support for common mainstream mapping software, such as: 3DMaxs, AutoCAD, ProE and so on. For extremely special industry applications, customized adaptations can be made.
Smooth video experience
Video redirection technology dramatically improves the user's video experience and effectively reduces the resource overhead of video decoding on the server. Support high-density video concurrency scenarios.
Extensive support for all types of peripherals
The self-developed peripheral redirection core technology maintains the same bus channel as the PC, and employees can use peripherals such as printers, scanners, Ukey, etc. as in the PC.
enhanced security
H3C Workspace cloud desktop through the "cloud - management - end" systematic security and reliability design, from the terminal security,network securityThe design of multi-layered security, from cloud platform security to management security, is based on prevention, supplemented by monitoring and auditing, and provides all-round protection for the desktop.information security. It also provides reliability assurance from the endpoint to the platform.
Terminal security: terminal feature code authentication, fingerprint, USB key multi-factor authentication, port, peripheral centralized black and white list control, etc.
Network security: virtual desktop pool isolation; secure encrypted transmission of desktop connections, etc.
Data security: Set up peripheral usage policy for desktop and use application control to control the use of offending software. Security features such as desktop watermarks and read-only storage devices ensure that data is not lost.
Cloud platform security: support for distributed storage, support for virtual machine image hierarchical storage, data disk through the software encryption, data without trace processing. The security of the underlying virtualization platform is guaranteed through virtualization anti-virus old, etc.
Management security: administrator decentralization and sub-domain management, desktop user behavior log auditing, etc.
All-round reliability guarantee: network status detection, client self-service backup and recovery, automatic reconnection of network flash disconnection, HA resource reservation for key components, batch backup of virtual machines, etc.
In addition, H3C Workspace cloud desktop products support integration with third-party antivirus or security software, such as ASEC Security, to provide a complete security protection solution in virtualized environments, and protect virtual machines without the need to install an agent within the virtual desktop, so as to achieve security in virtualized environments.
concise management
Cloud Desktop Studio, the H3C Workspace management platform, enables unified management of physical and virtual resources and virtual desktop lifecycle, unified alarm and fault management, and improves IT operation and maintenance management efficiency.
Unified virtual desktop life cycle management, unified alarm and fault management. The fastest 1 hour to complete the deployment of the basic desktop environment, desktop rapid on-line and expansion, flexible scheduling of resources to quickly respond to the business of the expansion and contraction, to enhance the IT business support capacity and response speed
Allocate different desktop resource pools for different scenarios, support static desktop pools, dynamic desktop pools and manual desktop pools
Supports batch upgrade of operating system and application software, and does not affect the user's self-installed software and personalized data when performing batch upgrade of software.
Centralized network policy management that specifies detailed security access rules for virtual desktop traffic (Layer 2, Layer 3, Layer 4 control, bi-directional control, time period based control). When virtual desktops are migrated between server hosts, the corresponding network policy configuration (ACL, QoS, VLAN, port binding, etc.) files are also migrated synchronously to ensure that the access control policy remains unchanged while the service is not interrupted.
intelligent operation and maintenance (ODM)
H3C Workspace centralizes the management of resources, simplifies the operation and maintenance with high efficiency, brings the balance of cost and efficiency to enterprise IT operation and maintenance, and enhances the value of IT operation and maintenance.
Rich automated operation and maintenance management tools: one-click automatic collection and analysis of enterprise office environment information (CPU, memory, disk, etc.), user experience optimization tools, one-click log collection tools, etc., to reduce the difficulty of maintenance and improve the efficiency of operation and maintenance.
Automated expansion, hardware power-up auto-discovery, flexible and fast expansion; linked cloned desktops to enhance user experience and improve management efficiency
The core components have independent intellectual property rights, open standardized interfaces, flexible adaptation to docking industry applications, and can quickly build solutions to match the needs of industry characteristics.