Hi [[ session.user.profile.firstName ]]

Networking Essentials for VDI: Steps to Accelerating Your Desktop Virtualization

According to ABI Research, the worldwide market for hosted virtual desktops is forecast to grow from about $500 million in 2009 to a cumulative total of nearly $5 billion in 2016. While desktop virtualization is on the rise, few businesses have implemented broad scale adoption. Despite the robust so
According to ABI Research, the worldwide market for hosted virtual desktops is forecast to grow from about $500 million in 2009 to a cumulative total of nearly $5 billion in 2016. While desktop virtualization is on the rise, few businesses have implemented broad scale adoption. Despite the robust solutions provided by virtual desktop software vendors like Citrix and VMware, the network remains the critical path for delivering an excellent and secure virtual desktop experience.

If you are rethinking your network strategy to support virtual desktops, you won’t want to miss this session. Our networking experts will share a framework for preparing your network to support virtual desktops at scale with a high quality user experience, including:
- Handling of rich media and display protocols
- Strategies for prioritizing virtual desktop traffic
- Scaling the WAN to support more sessions within the same pipe
- Securing access from any device, anywhere
- Simplifying management
Recorded Jul 11 2012 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Lippis, Founder and CEO at Lippis Enterprises, Shannon McFarland, Principal Engineer, Cisco
Presentation preview: Networking Essentials for VDI: Steps to Accelerating Your Desktop Virtualization
Recommended for you:
  • Date
  • Rating
  • Views
  • A major company has been hacked, suffering a data breach. How do companies the size of Sony handle such situations? Various departments, including legal, tech and PR come together to meet with the management and workout a plan on how to handle the crisis. This presentation will focus on both -- companies with a data breach response plan and those without one. We'll shed some light on what the first 24 hours post-breach looks like for a major company.
  • Understanding the cybersecurity posture of vendors, suppliers, and third-parties is now a necessity for businesses in all industries. Yet, many businesses do not have a formalized vendor risk management program. There are multiple components needed to create a comprehensive vendor risk management program. These span governance and control, as well as security controls and technology.

    Join Jake Olcott, VP at BitSight on February 9 as he highlights best practices and industry standards for vendor risk management programs. Attendees will learn:

    - Which frameworks and methodologies can help get you started
    - Vital questions you should be asking your vendors
    - Why continuous monitoring and verifying vendor security is crucial to mitigate cyber risk
  • Do you want to learn about new disaster recovery options from Microsoft experts? Have you been putting off trying new technology due to time pressures or not knowing where to start? Do you think your disaster recovery strategy would benefit from a refresh?

    If you answered yes to any of these questions, you need to register for this webcast. You will learn:
    •How to replicate any workloads to Microsoft's global datacenters
    •How to back up data and protect workloads with nearly infinite scalability
    •How to implement a hybrid replication using both cloud and on-premises solutions
    •How to create a backup without needing to buy more tape
    •How to back up your Windows clients (including Windows 10) to remote storage

    Register now to watch live or receive notification when this program is available on-demand.
  • NRF 16 attracted over 33,000 attendees and focused on retail technology, trends, and areas of focus for the coming fiscal year. Hortonworks and Microsoft were visible booth presences, hosting large volumes of visitors. Together, the partnership is uniquely qualified to accelerate retail data collection and management.

    Join Hortonworks VP of Industry Solutions, Eric Thorsen, and Microsoft’s Retail Industry Solutions Director, Shish Shridhar, to learn how Data-Centric Retail Trends can impact your business and how Hadoop can help you gain actionable insight from your data. Understand how your peers are using data to drive new levels of customer centricity, real-time inventory predictions, and personalized marketing. Learn about how consumer goods companies are using Hadoop to gain insight from demand signals and analyze data flow.
  • See how you can get ahead of the new wave of mobile access and security challenges with the newly released Secure Mobile Access 11.3 firmware in this webcast.

    You’ll learn about some of the new features:

    •Dell EMM/DMM integration: SSO with Dell Mobile Workspace container (supports IOS and Android)
    •New Console Management System (CMS)
    •Kerberos Constrained Delegation
    •Clientless access to SharePoint
    •Chrome OS support
    •More HTML 5 clients supported
    •Better control over SSL protocols and Ciphers
  • In this webinar we will explain how DevOps, powered by Chef automation, makes it possible to deliver infrastructure and new features at velocity within the highly regulated world of the UK Government sector.

    Using Chef in conjunction with a platform such as Skyscape Cloud Services, which provides assured cloud services, enables the government sector to deliver software at speed without fear of compromising Official and Official Sensitive data. With a correctly provisioned and tested infrastructure, plus rules that automate rigorous security testing and policy assurance, you can reduce risk, provide a faster route to delivery and help enable DevOps within your organisation.

    Hear from Seth Thomas, DevOps Evangelist at Chef Software and Peter Rossi, Head of Automation at Skyscape Cloud Services on how to automate your infrastructure in a secure cloud environment.

    In addition, Viewdeck Consulting and Synyega will discuss their successes within this market sector, and offer tips on how you too can adopt DevOps practices.
  • The Identity Management market continues to be heavily influenced by several important trends – cloud, mobile, the rise of the user, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. How will these trends continue to impact the identity landscape, and what should organizations do to prepare for it? Join CA Technologies and (ISC)2 on February 4, 2016 at 1:00PM Eastern as we look at the next phase of identity management, and how these and other emerging trends will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Networking Essentials for VDI: Steps to Accelerating Your Desktop Virtualization
  • Live at: Jul 11 2012 3:00 pm
  • Presented by: Nick Lippis, Founder and CEO at Lippis Enterprises, Shannon McFarland, Principal Engineer, Cisco
  • From:
Your email has been sent.
or close
You must be logged in to email this