REMOTE ACCESS SOLUTIONS Why and How March 2015 Allow Allow DC headquarters staff work remotely Allow access to IT resources from anywhere and using any device What type of users school plans to support? Work from home Remote branches Work from anywhere – field agents Factors to generally consider for Business Managers Better IT Agility: Flexible Solution for rapidly changing IT environment BYOD: Empowering employees to choose their own devices Collaboration Work from anywhere Document Access and Application Access How Many? Business Provided Laptops to take home? WHY – DEFINE BUSINESS REQUIREMENTS Network Bandwidth Client Side/School Staff network bandwidth Server Side/Headquarters network bandwidth Security Desktop Hardware Lifecycle Desktop Management WHY – DEFINE IT REQUIREMENTS Desktop Virtualization Citrix, VDI and Remote Desktop Web Interface and others Virtual Private Network Cisco, Juniper VPN and others HOW – THE SOLUTIONS Virtual Desktops Thin Client Processing Power and Storage on the Servers Advantages Create and update virtual desktop images within minutes Extend life of older workstations (underpowered) using server resources Secure remote access Access Multiple Virtual Desktops from single physical workstation Documents stored on virtual desktop guest (host server). Same desktop view irrespective of client device. Disadvantages Centralization means less customization Multimedia applications impacted – no video virtualization Single Point of failure – If host server fails everyone is affected Monday Morning Syndrome – Large number of users logging in at the same item. Slow performance. License per desktop – Additional Cost DESKTOP VIRTUALIZATION – WHAT IS IT? VIRTUAL PRIVATE NETWORK – WHAT IS IT? Extended Network Thick Client Processing and Storage on Local Desktops/Devices Advantages Highly customized desktop. Use local resources – printers and monitors Offline access to files since local storage is used Access network drives locally Existing Cisco devices in school infrastructure – No additional cost Disadvantages Network security risk if not properly configured ACLs Firewalls Large files (documents) – slower VPN - CONTINUED