Browse communities
Browse communities
Presenting a webinar?

Networking Essentials for VDI: Steps to Accelerating Your Desktop Virtualization

Nick Lippis, Founder and CEO at Lippis Enterprises, Shannon McFarland, Principal Engineer, Cisco
According to ABI Research, the worldwide market for hosted virtual desktops is forecast to grow from about $500 million in 2009 to a cumulative total of nearly $5 billion in 2016. While desktop virtualization is on the rise, few businesses have implemented broad scale adoption. Despite the robust solutions provided by virtual desktop software vendors like Citrix and VMware, the network remains the critical path for delivering an excellent and secure virtual desktop experience.

If you are rethinking your network strategy to support virtual desktops, you won’t want to miss this session. Our networking experts will share a framework for preparing your network to support virtual desktops at scale with a high quality user experience, including:
- Handling of rich media and display protocols
- Strategies for prioritizing virtual desktop traffic
- Scaling the WAN to support more sessions within the same pipe
- Securing access from any device, anywhere
- Simplifying management
Jul 11 2012
61 mins
Networking Essentials for VDI: Steps to Accelerating Your Desktop Virtualization
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5371)
  • Upcoming (111)
  • Date
  • Rating
  • Views
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Channel
  • Channel profile
  • April 8th is Coming: Are You Still On Windows XP? Recorded: Dec 5 2013 62 mins
    Shawn Kaiser, Erwin Vollering, and Tony Paikeday
    Many IT environments are facing the challenge of moving to newer O/S releases like Windows 7, while others wrestle with the cost associated with upgrading client hardware to support that move. The Windows XP End-of-Support milestone presents a compelling opportunity to evaluate your desktop strategy, while intercepting important trends including BYOD, an increasingly mobile workforce, and escalating demands for business productivity and continuity. For many organizations, technologies like VDI and application virtualization can help ease the transition, but not without some hurdles. Attend this webinar to hear from Cisco field experts on how you can increase your chances for Windows XP Migration Success.

    Speakers:
    Panelist: Shawn Kaiser, Technical Solutions Architect
    Panelist: Erwin Vollering, Cisco Advanced Services Consultant
    Moderator: Tony Paikeday, Cisco Solutions Marketing
  • Scaling-Out XenDesktop on Cisco UCS: Best Practices for a Worry-Free Deployment Recorded: Sep 19 2013 58 mins
    Mike Brennan, Ravi Balakrishnan
    Desktop virtualization deployments can easily face an escalating CAPEX burden, driven in large part by the cost of servers, storage and networking. In this session you will hear how industry leaders Cisco, Citrix and EMC deliver a high performance, scalable infrastructure for concurrently running Citrix XenDesktop and XenApp while reducing costs with tiered storage architectures. We'll share best practices you can follow to scale seamlessly from a few seats of XenDesktop and XenApp to thousands, bootable in minutes. Come and learn how Cisco VM-FEX, Nexus 1kv, Tier-0 storage and other innovations can optimize your UCS-Citrix deployment environment.
  • Self-Service Desktop Virtualization Deployments Recorded: May 29 2013 60 mins
    Enrico Fuiano, Jan Klincewicz, Stefan Drege
    Designing and configuring production-ready Desktop Virtualization infrastructures takes planning and expertise. Frequently that expertise is engaged in the form of a professional services contract. But how do companies cope with the realities of expanding those services once the implementation team has moved to other projects?

    Cisco Advanced Services consultants will share some of the best practices and related solution offerings that have helped customers around the globe automate their virtual desktops deployments. With a repeatable service engagement framework and a field-proven set of software capabilities, Cisco will demonstrate how you can deliver scalable self-service virtual desktop offerings that include all the main elements commonly associated with Private Cloud frameworks.

    Our senior technical consultants will also illustrate how orchestrating and automating common and repetitive functions enables highly-skilled staff to focus on innovative IT projects while letting software take care of the day-to-day configuration and deployment tasks.
  • Eliminating the Guesswork with Optimized Architectures for VDI Recorded: Apr 25 2013 62 mins
    Tony Paikeday, Cisco Desktop Virtualization Solutions and Ashok Rajagopalan, Cisco Senior Product Manager
    Cisco and its ecosystem partners are attacking the pain points traditionally associated with deploying desktop virtualization: cost, complexity, and performance with scale. Four new reference architecture types for desktop virtualization combine best-of-breed technologies with the Cisco Unified Computing System to deliver prescriptive design guidance for IT environments of all sizes.
  • The Questions You Didn’t Ask About VDI Performance (But Really Should) Recorded: Mar 27 2013 63 mins
    Doron Chosnek, Shawn Kaiser, Jason Marchesano, Consulting Systems Engineers for Cisco
    Are you responsible for sizing and implementing the server platform that will host your organization’s VDI implementation? Ever wonder what effect the number of processor cores has on VDI performance vs. core speed? What about the number of vCPU? Our team of VDI-proficient Consulting Systems Engineers have some insights to share that may have you thinking differently about the impact and importance of choices you can make when designing your compute infrastructure for VDI.

    BONUS: Join us for this session packed with valuable insights, and we’ll provide you with a complimentary brief that explores the findings!
  • The Blueprint for Successful Virtual Desktop Deployments Recorded: Nov 13 2012 58 mins
    Rich Kijewski, Technical Marketing Manager and Jan Klincewicz, Solution Architect
    This webcast will review the blueprint for successful virtual desktop deployments provided in the Cisco Validated Design (CVD) for VXI. These design guides are newly available and give an assessment and the benefits from working with hundreds of customers to build out a robust virtual desktop solution that is collaborative, secure and mobile.
  • Measuring Business Value and Savings with Cisco Virtualization Experience Infras Recorded: Oct 24 2012 58 mins
    Jaibharat Valluri and Arnie Lopez, Cisco
    Companies deploying the Cisco Virtualization Experience Infrastructure (VXI) Smart Solution are seeing significant business benefits that include substantial savings in administrative and operating costs—not to mention increased productivity, effectiveness and agility. this webcast will share with attendees how to apply the right framework for your business to asses business value, give Customer examples of Business benefits and TCO from Cisco VXI, including both quantitative and qualitative benefits and Use case examples of how companies are benefiting from VXI.
  • Business Process Outsourcing: New Frontiers for Desktop Virtualization Recorded: Sep 27 2012 53 mins
    Courtney Burry, Group Product Manager, End User Computing, Vmware
    As organizations evolve, seeking to find greater competitive advantage, faster time to market, increased business process resiliency, and reduced costs, Business Process Outsourcing (BPO) is rapidly growing as a preferred means to address these fundamental challenges. This new landscape is creating an increasingly de-centralized operating model for corporations as they leverage talent pools across a global footprint, embracing a “follow the sun” approach to delivering efficient 24x7x365 services to their clientele, or tapping into distributed resources that can reduce operating costs. Attend this session to learn about real world implementations of desktop virtualization that address this increasingly important use case.
  • VDI Case Study: Cisco IT best practices for desktop virtualization deployments Recorded: Aug 22 2012 57 mins
    Richard Whitmarsh, Senior IT Manager
    Like many businesses, Cisco IT is implementing desktop virtualization to support changing work styles while lowering IT costs and reducing risks. Virtual desktops are a critical element of Cisco IT’s next generation workspace strategy is to enable employees, partners and contractors with maximum flexibility to securely access any application, on any device, at any location, anytime.

    Join us, as Richard Whitmarsh, Senior IT Manager leading the VDI program at Cisco, reveals the business drivers, use cases, challenges, results and lessons learned associated with Cisco’s initial deployment of 2000 virtual desktops. He will also discuss some of the design and architecture obstacles and how Cisco IT overcame these to achieve a secure, scalable and cost effective implementation based on the Cisco Virtualization Experience Infrastructure (VXI) Smart Solution.

    If you are looking to for best practices for scaling your desktop virtualization deployment, this is a webcast you won't want to miss.
  • Networking Essentials for VDI: Steps to Accelerating Your Desktop Virtualization Recorded: Jul 11 2012 61 mins
    Nick Lippis, Founder and CEO at Lippis Enterprises, Shannon McFarland, Principal Engineer, Cisco
    According to ABI Research, the worldwide market for hosted virtual desktops is forecast to grow from about $500 million in 2009 to a cumulative total of nearly $5 billion in 2016. While desktop virtualization is on the rise, few businesses have implemented broad scale adoption. Despite the robust solutions provided by virtual desktop software vendors like Citrix and VMware, the network remains the critical path for delivering an excellent and secure virtual desktop experience.

    If you are rethinking your network strategy to support virtual desktops, you won’t want to miss this session. Our networking experts will share a framework for preparing your network to support virtual desktops at scale with a high quality user experience, including:
    - Handling of rich media and display protocols
    - Strategies for prioritizing virtual desktop traffic
    - Scaling the WAN to support more sessions within the same pipe
    - Securing access from any device, anywhere
    - Simplifying management
  • Redefining Virtual Desktop Infrastructure with Virtual Workspace Recorded: Jun 28 2012 59 mins
    Zeus Kerravala, Principle Analyst at ZK Research
    As the enterprise workplace continues to change creating new, more efficient ways of working, the compute platforms that power worker productivity need to evolve along with worker behavior. To date, VDI has been an important technology that is used to virtualize corporate desktops, but it too must evolve to deliver not just a virtual desktop but an entire virtual workspace.

    Join Zeus Kerravala, Principal Analyst at ZK Research, as he discusses his latest whitepaper that explores the next phase of VDI that delivers the virtual workspace, including:
    - The Business Benefits of a Virtual Workspace
    - Key user profiles for the virtual workspaces
    - Recommendations to mapping to journey to a virtual workspace
  • Transforming BYOD to Work Anywhere with Desktop Virtualization Recorded: May 22 2012 60 mins
    Adam Marano, Sr Director of Solutions, Citrix; Michael Rau, VP Global Enterprise Solutions, Cisco
    Learn how desktop virtualization can meet the security, regulation and operational challenges of BYoD initiatives, while creating new business opportunities. With 90% of organizations planning or implementing BYoD strategies today, hear from our panel of Cisco and Citrix experts how desktop virtualization can help address these demands and more.
  • Optimizing Storage for Desktop Virtualization Recorded: Apr 26 2012 60 mins
    Ashok Rajagopalan, Senior Product Manager, Cisco; Chris Carter, Consulting Systems Engineer, Cisco
    Storage represents one of the most significant investments critical to scalable virtual desktop computing and performance. The newest advancements in server architecture and chip set afford organizations the opportunity to dramatically optimize storage infrastructure while improving overall performance and scalability. Our panelists discuss these newest advancements and how implementers of desktop virtualization can benefit from a more scalable, cost-effective, high-performance storage and computing infrastructure.
  • VDI with Unified Communications: What IT Architects Need to Know Recorded: Mar 22 2012 56 mins
    John Burke, Nemertes; Brian Dal Bello, Cisco
    Growing adoption of Unified Communications and Virtual Desktop Infrastructure creates the potential for conflict, as VDI solutions must support real-time voice and video applications, and voice-versa. But when done right, VDI and UC offers new opportunities resulting in simplified desktop environments that increase user adoption.

    In this session, our experts will discuss

    • The key considerations when deploying virtual desktop solutions that supports voice and video
    • Examples of how customers are mapping out the strategy
    • A checklist to guide you in the design
  • Why VDI Implementations Fail: Lessons Learned and Steps to Success Recorded: Feb 29 2012 61 mins
    Kristopher Boyd, Technical Solutions Architect, VMware; Stefan Drege, Solutions Architect, Cisco  
    It’s commonly known that many virtual desktop infrastructure (VDI) deployments fail when trying to scale beyond 300 desktops.

    In this session, experts from Cisco and VMware will review the pitfalls they have seen in deployments, and outline recommended steps IT professionals can take to build a rapidly scalable, high-performing virtual workspace.
  • Workspace Virtualization: Think beyond the desktop to unleash productivity Recorded: Jan 26 2012 60 mins
    Simon Bramfitt, Principal Analyst, Entelechy; Jim French, Distinguished SE, Cisco , Jeff Platon, Dir. Engineering, Cisco
    Get your desktop virtualization initiative on the right track by looking beyond the desktop to the workspace and unleash the full potential of your organization.

    In this session industry and Cisco experts will provide insights on the strategies IT professional should be considering to achieve and exceptional user experience. This discussion will review the business benefits of combining virtual desktops, voice and video, and how your organization can begin this journey to workspace transformation.
Journey to the Virtual Workspace
Learn directly from industry experts on how to successfully navigate your organization to desktop virtualization. Think beyond the desktop, and begin looking at how your organization can unify virtual desktops with communications and rich media to deliver the ultimate user experience.

In this series, experts will discuss strategies for planning your desktop transformation, critical considerations across your IT organization, and tips for greater implementation success.

Topics are suited for IT managers for desktop services, data centers, security, unified communications, networking, and applications.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Networking Essentials for VDI: Steps to Accelerating Your Desktop Virtualization
  • Live at: Jul 11 2012 3:00 pm
  • Presented by: Nick Lippis, Founder and CEO at Lippis Enterprises, Shannon McFarland, Principal Engineer, Cisco
  • From:
Your email has been sent.
or close
You must be logged in to email this