Title: So how do you access that application again
1So how do you access that application again?
- Cross-Platform Application Access in the
Enterprise by Dustin Puryear
2(No Transcript)
3Enterprises are having to support more access
methods, not less
4IT managers must be able to support these methods
seamlessly
You must be able to manage existing and new
technologies easily.
5More tools continue to be developed to access
"other"-platform applications
6Use these tools to create a more cohesive
application access strategy
7Follow this guide to implement your access
strategy
8(No Transcript)
9Understand the core principles to allow you to
better define your strategy
10(No Transcript)
11Compare simplicity against flexibility
12(No Transcript)
13Simpler systems can be easier to manage
14Flexible systems give you power, but at what cost?
15(No Transcript)
16Evaluate your security requirements
17(No Transcript)
18Don't undercut your security with bad access
methods
19User accounts become a multiplying nightmare
20(No Transcript)
21Save time and money by pushing uniformity
22(No Transcript)
23Enterprises often run redundant apps, increasing
confusion and cost
24Can you run the same application on more than one
platform?
25(No Transcript)
26Know the basic application access methods to best
define your toolset
27(No Transcript)
28Support console applications
29(No Transcript)
30Use telnet only when there is no other choice,
and even not then
31Don't forget about your mainframes
32You can access Windows console applications
remotely
DOS via Windows TS can be a bad idea!
33(No Transcript)
34Graphical applications can be accessed via a few
common techniques
35(No Transcript)
36VNC is good for cross-platform access
Not so good for multi-user Windows access!
37X Windows System is still around and kicking
38Windows TS and Citrix are accessible to UNIX users
39(No Transcript)
40Homogenize your application access using a
"wrapper"
41(No Transcript)
42Support older terminal applications using a new
web-interface
43Provide a single point of entry to all of your
UNIX applications
44(No Transcript)
45Implement a deployment strategy to make things
manageable
46(No Transcript)
47(No Transcript)
48Manage all of your passwords centrally
49SSO can be used to reduce user headache and
increase overall security
50(No Transcript)
51Deploy access tools to your users automatically
and consistently
52(No Transcript)
53For Windows users, use AD policies or logon
scripts
54UNIX users should have a standard set of tools
and menus on all systems
55(No Transcript)
56Perform regular scanning and reporting for new
apps needing support
57(No Transcript)
58Applications will continue to pop up that you
must support
59Create an enterprise-wide discussion about net
"application integration"
60Focus on how applications affect your security
Where are password stored?
Is this a web-application?
How is data transmitted over the wire?
61So how do you access that application again?
62(No Transcript)
63Supporting more application access methods is
creating havoc for IT
Big expenses for debugging issues!
Lack of security!
What application is next?
How do we handle authentication and access
control?
64Easily provision access to your users
65Users are happier and better supported than ever