Levels of Security - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Levels of Security

Description:

wyse.com. Security Challenge in Thick Devices. Great efforts can go to avoiding the problems ... wyse.com. Solution Framework and Vision. Security and Compliance ... – PowerPoint PPT presentation

Number of Views:25
Avg rating:3.0/5.0
Slides: 18
Provided by: jeffmc6
Category:
Tags: levels | security | wyse

less

Transcript and Presenter's Notes

Title: Levels of Security


1
Levels of Security
  • Citrix iForum
  • Wyse Technology Inc.

2
(No Transcript)
3
Todays World Business Exposed to Growing IT
Risks
Business Risk
  • Market risk
  • Credit risk
  • Interest rate risk
  • Currency risk

Other Risks
Operational Risks
  • Business process
  • People and talent
  • Environment
  • Physical infrastructure

Non IT Risks
IT Risks
Compliance Risk
Recoverability Risk
Scalability Risk
Performance Risk
Availability Risk
Security Risk
  • Computer crimes
  • Internal breaches
  • Cyber terrorism
  • Distributed architectures
  • Peak Demand
  • Heterogeneity in the IT landscape
  • Government regulations
  • Corporate governance guidelines
  • Internal policy
  • Configuration changes
  • Lack of redundancy in architectures
  • Human errors
  • Hardware and/or software failures
  • External threats such as security
  • Natural disasters
  • Business growth
  • Provisioning bottlenecks
  • Silo-ed architectures

4
Security Challenge in Thick Devices
  • Great efforts can go to avoiding the problems
  • Governments beginning to legislate this

Theft Data can be lost, exposed, or misused
OS / Browser vulnerabilities
Malware, Adware, Spyware, Viruses Scanners reduce
perceived performance
Liability Sarbanes-Oxley, HIPAA
5
Can any Architecture Deliver Balance?
  • It must
  • Move architectural complexity from edge to
    center, where it can be controlled for costs and
    security
  • Enable applications to reside and execute where
    they can deliver best value to business and
    worker model
  • Harness idle computing power in innovative ways
    to reduce need for additional / continual capital
    investment

6
  • Thin Devices
  • Low Cost
  • Low Power use
  • More Reliable
  • Flat Addressable Memory
  • Thick Devices
  • Stateless
  • Mobile / Off-line Workers
  • Controlled Cache
  • OS / Apps
  • Use anywhere
  • Central Management
  • Of Devices
  • Of Applications
  • Intelligent Executionand Storage
  • Centralized
  • Static or DynamicDistribution
  • Remote Office
  • Low Bandwidth
  • No IT Staff
  • Remote Repository
  • Connected Mobile
  • Managed
  • Protected

7
When Should You Go Thin at the Edge?
  • Consider a thin-client architecture when you
  • Demand high security
  • Require easy, centralized and remote management
  • Have little or no client administration staff or
    tools
  • Must reduce costs and desktop obsolescence
  • Have energy reduction needs
  • Need reliable user access in harsh environments
  • Are challenged by limited floor or cubicle space
  • Target structured-task workers (e.g. call
    centers)
  • Plan to re-purpose PCs for new functionality
  • Are interested in providing applications as a
    service

8
Solution Framework and Vision
Wyse Thin ComputingProduct Strategy
On-Demand via Thin Computing
  • Security and Compliance
  • Manageability with Increased Utilization
  • Availability and Reliability
  • Reduced TCO and Scalability
  • IT aligned with the business

Thin computing means getting IT right
9
Thick and Thin Clients
  • Comparison of Security and Administration Metrics

10
One-, Two-, and Three-Factor Authorization
  • One Factor
  • What I Know
  • (eg- a password)
  • Three Factor
  • What I Am
  • (eg- fingerprint)
  • Two Factor
  • What I Have
  • (eg- a smartcard)

11
Smart Card Solution
  • More Secure 2 Factor authentication
  • Identification Pin / Password Authentication
  • Convenient
  • Identification Auto-Authentication
  • Full hot-desk support
  • Automatic Launch of ICA, RDP or Browser
  • Simple
  • Flexible Implementation
  • Centrally managed

12
Biometrics Solution
  • Most Secure 3 Factor Authentication
  • Convenient
  • Just touch reader with finger for authentication
  • Un-spoofable
  • Combinations supported
  • Panic support
  • Simple
  • Flexible Implementation
  • Centrally managed

13
Growing the Market 9 of Enterprise Desks by
2008
14
Wyse 1 in Thin Computing
  • 1 Thin Computing vendor in the world.
  • 32nd consecutive FQ with 1 position
  • 38.2 of global Thin Client market
  • 24 years of experience
  • Inventors of the modern thin client
  • 1 in Thin Computing Management Software
  • Over 40 of the Fortune 100 use Wyse
  • Global Sales, RD and Operations
  • 250M run rate, cash flow positive business

15
Market Share Analysis
Wyse, 38
Wyse, 38.15
Market share growth from 35 in Q3FY05 to 38
in Q1FY06
Source IDC, 2005, Worldwide Enterprise Thin
Client Shipments by Vendor, H1 2005
16
Customer and Partner Ecosystem
Key Partners Include
Key Customers Include
Software/ Hardware Partners
Service/ Distribution Partners
Supply Chain Partners
  • Construction Top 3 global
  • Caterpillar Inc.
  • BHP Billiton
  • ALCOA
  • Banking 2 of top global
  • Citibank
  • Deutsche Bank
  • Business Services 3 of top 10 global
  • Adecco SA
  • Aramark Corp.
  • ADP
  • Government Services top 3
  • Boeing
  • Lockheed-Martin
  • Northrup Grumman
  • Healthcare (non-facility) 3 of top 10 global
  • Pfizer
  • Bayer AG
  • Medtronic
  • Energy 2 of top 5 global
  • ExxonMobil
  • ConocoPhillips
  • Manufacturing 4 of top 20 global
  • McKesson Corp.
  • Electrolux AB
  • Xerox Corp.
  • Retail (grocery/drug store) 4 of top 10 global
  • Tesco
  • Kroger
  • Albertsons
  • Retail (other) 7 of top 15 global
  • Wal-Mart
  • Home Depot
  • Sears
  • Shipping top 3 global
  • FedEx
  • UPS
  • DHL

17
Levels of Security
  • Wyse Technology Inc.
Write a Comment
User Comments (0)
About PowerShow.com