Title: Levels of Security
1Levels of Security
- Citrix iForum
- Wyse Technology Inc.
2(No Transcript)
3Todays World Business Exposed to Growing IT
Risks
Business Risk
- Market risk
- Credit risk
- Interest rate risk
- Currency risk
Other Risks
Operational Risks
- Business process
- People and talent
- Environment
- Physical infrastructure
Non IT Risks
IT Risks
Compliance Risk
Recoverability Risk
Scalability Risk
Performance Risk
Availability Risk
Security Risk
- Computer crimes
- Internal breaches
- Cyber terrorism
- Distributed architectures
- Peak Demand
- Heterogeneity in the IT landscape
- Government regulations
- Corporate governance guidelines
- Internal policy
- Configuration changes
- Lack of redundancy in architectures
- Human errors
- Hardware and/or software failures
- External threats such as security
- Natural disasters
- Business growth
- Provisioning bottlenecks
- Silo-ed architectures
4Security Challenge in Thick Devices
- Great efforts can go to avoiding the problems
- Governments beginning to legislate this
Theft Data can be lost, exposed, or misused
OS / Browser vulnerabilities
Malware, Adware, Spyware, Viruses Scanners reduce
perceived performance
Liability Sarbanes-Oxley, HIPAA
5Can any Architecture Deliver Balance?
- It must
- Move architectural complexity from edge to
center, where it can be controlled for costs and
security - Enable applications to reside and execute where
they can deliver best value to business and
worker model - Harness idle computing power in innovative ways
to reduce need for additional / continual capital
investment
6- Thin Devices
- Low Cost
- Low Power use
- More Reliable
- Flat Addressable Memory
- Mobile / Off-line Workers
- Controlled Cache
- OS / Apps
- Use anywhere
- Central Management
- Of Devices
- Of Applications
- Intelligent Executionand Storage
- Centralized
- Static or DynamicDistribution
- Remote Office
- Low Bandwidth
- No IT Staff
- Remote Repository
- Connected Mobile
- Managed
- Protected
7When Should You Go Thin at the Edge?
- Consider a thin-client architecture when you
- Demand high security
- Require easy, centralized and remote management
- Have little or no client administration staff or
tools - Must reduce costs and desktop obsolescence
- Have energy reduction needs
- Need reliable user access in harsh environments
- Are challenged by limited floor or cubicle space
- Target structured-task workers (e.g. call
centers) - Plan to re-purpose PCs for new functionality
- Are interested in providing applications as a
service
8Solution Framework and Vision
Wyse Thin ComputingProduct Strategy
On-Demand via Thin Computing
- Security and Compliance
- Manageability with Increased Utilization
- Availability and Reliability
- Reduced TCO and Scalability
- IT aligned with the business
Thin computing means getting IT right
9Thick and Thin Clients
- Comparison of Security and Administration Metrics
10One-, Two-, and Three-Factor Authorization
- One Factor
- What I Know
- (eg- a password)
- Three Factor
- What I Am
- (eg- fingerprint)
- Two Factor
- What I Have
- (eg- a smartcard)
11Smart Card Solution
- More Secure 2 Factor authentication
- Identification Pin / Password Authentication
- Convenient
- Identification Auto-Authentication
- Full hot-desk support
- Automatic Launch of ICA, RDP or Browser
- Simple
- Flexible Implementation
- Centrally managed
12Biometrics Solution
- Most Secure 3 Factor Authentication
- Convenient
- Just touch reader with finger for authentication
- Un-spoofable
- Combinations supported
- Panic support
- Simple
- Flexible Implementation
- Centrally managed
13Growing the Market 9 of Enterprise Desks by
2008
14Wyse 1 in Thin Computing
- 1 Thin Computing vendor in the world.
- 32nd consecutive FQ with 1 position
- 38.2 of global Thin Client market
- 24 years of experience
- Inventors of the modern thin client
- 1 in Thin Computing Management Software
- Over 40 of the Fortune 100 use Wyse
- Global Sales, RD and Operations
- 250M run rate, cash flow positive business
15Market Share Analysis
Wyse, 38
Wyse, 38.15
Market share growth from 35 in Q3FY05 to 38
in Q1FY06
Source IDC, 2005, Worldwide Enterprise Thin
Client Shipments by Vendor, H1 2005
16Customer and Partner Ecosystem
Key Partners Include
Key Customers Include
Software/ Hardware Partners
Service/ Distribution Partners
Supply Chain Partners
- Construction Top 3 global
- Caterpillar Inc.
- BHP Billiton
- ALCOA
- Banking 2 of top global
- Citibank
- Deutsche Bank
- Business Services 3 of top 10 global
- Adecco SA
- Aramark Corp.
- ADP
- Government Services top 3
- Boeing
- Lockheed-Martin
- Northrup Grumman
- Healthcare (non-facility) 3 of top 10 global
- Pfizer
- Bayer AG
- Medtronic
- Energy 2 of top 5 global
- ExxonMobil
- ConocoPhillips
- Manufacturing 4 of top 20 global
- McKesson Corp.
- Electrolux AB
- Xerox Corp.
- Retail (grocery/drug store) 4 of top 10 global
- Tesco
- Kroger
- Albertsons
- Retail (other) 7 of top 15 global
- Wal-Mart
- Home Depot
- Sears
- Shipping top 3 global
- FedEx
- UPS
- DHL
17Levels of Security