Archive

Posts Tagged ‘XenDesktop’

VDI Smackdown: Head-to-head analysis of Citrix XenDesktop, Microsoft etc… via @rpruijt

Great work!!!! 🙂 Continue reading!!!

by Ruben Spruijt 

Are you looking for an independent overview of desktop virtualization solutions and curious about the different strategy questions? Do you want detailed information about the features and functions each desktop virtualization vendor is offering!? If so the VDI Smackdown you definitely must read!
In the current market there is an increasing demand for unbiased information about desktop virtualization solutions. This white paper is focused on solutions that are anticipated to have an important role in desktop virtualization deployments. An overview of available features of each solution has been created to allow an understanding and comparison of capabilities.

The latest solutions included in the feature matrix are: Citrix XenDesktop 5.6FP1, Citrix VDI-in-a-Box 5.2, Dell vWorkspace 7.6, Microsoft RDVH Windows8/Server 2012 and VMware View 5.2; The English whitepaper can be downloaded here. The Japanese version will be available as soon as possible.

Empowering the end-user by giving access to Windows, Web and Mobile applications so he can access data and information systems from both private and public datacenters regardless of the device or location is the ultimate strategic objective.
The delivery of the classic (Windows) desktop interface can be divided in two segments:

  • the classic desktop and laptop, running Windows, Linux or Mac OS X;
  • the virtual desktop running in the datacenter or local on the classic workstation.

In essence “desktop virtualization” is the de-coupling of the desktop, operating system and the applications from the underlying endpoint or device. This kind of virtualization can be subdivided into two types:

  • With the first type applications are executed remotely, server hosted, and presented at the endpoint via a remote display protocol.
  • With the second type applications are executed at the endpoint, client-side and presented locally.

Making Windows, Web and Mobile applications available to the end-user, regardless of the technology being used, is an important strategic objective of an advanced IT infrastructure. The Virtual Desktop (vDesktop) is an essential component in the range of Application and Desktop delivery solutions and in essence, it provides the following functions:

  • Flexibility: Detach the vDesktop from the endpoint; Several vDesktops can be used next to one another
  • BYO: enables delivery of applications and desktops for BYO scenario’s;
  • Access: vDesktop works independently of location, endpoint and network;
  • Security: Server Hosted – VDI; data in the computing center;
  • Freedom: Every user can have his own desktop with administrator privileges when needed;
  • Management: Centrally managed and hardware independent;
  • Legacy: It is simple to offer legacy applications on a state-of-the-art platform;
  • Sustainability: Power Management, handling the necessary resources in an efficient manner

The transition to a dynamic and optimized desktop is causing many IT organizations to reevaluate traditional IT operations, deployment, delivery, packaging, support, and management methods.
Desktop virtualization is a key component in the optimized desktop. It’s important to have a Vision and Strategy around application and desktop delivery and enterprise mobility. Designing, building, managing and maintaining the desktop virtualization…

Continue reading here!

//Richard

#Citrix #BYOD Architecture overview – #XenMobile, #Mobility

February 28, 2013 Leave a comment

I must say that this blog post is of course Citrix “twisted”, but I really like it! And it shows how Citrix provides a pretty complete offering in order to deliver Mobility- and BYO-compliant services.

The Citrix blog written by Christopher Campbell makes sense and I also agree that a picture is worth a thousand words! 🙂

I’m going to make this real easy and simple. As my grandfather would say “A picture is worth a thousand words”.

If you’re a XenDesktop or XenApp customer this is what your environment probably looks like.

Now this is what you need to enable BYOD and add that MAM, MDM, MIM (Data) and overall EMM functionality you’re looking for.

This is what your environment looks like after you enable BYOD.

Didn’t get that? OK, here is what BYOD looks like with multiple vendors.

Now, here is what BYOD looks like with Citrix.

Got it?

Read the whole blog post here!

//Richard

February Edition of #Citrix #XenDesktop Technical Newsletter Now Available

February 21, 2013 Leave a comment

February XenDesktop newsletter is out! Here’s a subset of what you can read from the Citrix blog post.

Using XenDesktop? Then you need to get the XenDesktop Technical Newsletter! The newsletter is comprised of the best technical resources from across Citrix Services: Consulting, Technical Support, Education, and Technical Readiness. In its third year the newsletter is designed to help customers run their XenDesktop optimally and get more out of their investment in Citrix desktop virtualization. And its FREE!

I am pleased to announce that the February 2013 edition of the newsletter is now available.

Check out the archive page, where you can access both the current and past issues, as well as subscribe to the FREE monthly newsletter.

The February edition of the newsletter is packed with great content, including:

  • Optimal XenApp 6.5 VM Configuration (Blog)
  • Introduction to the new Project Accelerator (Blog)
  • Deploying XenApp 6.5 using PVS (Blog)
  • Insider Troubleshooting tips for Administrators (eBook)
  • Whats new with Excalibur (Blog)
  • Top Knowledge Center content for December 2012 (Articles, hotfixes, whitepapers, etc…)
  • How to configure Access Gateway 5 standalone for use with XD5 (tech note)
  • XenDesktop Tools & Hotfixes
  • And much more.

If you have any feedback/suggestions please let us know. Also don’t forget to Sign-up now!

//Richard

It all ADDS up with #BYOD (Assess + Design + Deploy + Support = Success)

February 21, 2013 Leave a comment

Below you can read about a couple of webinars coming up on Citrix’s view on how to get your BYOD strategy up and running!

Cowboy consumerization is here…and it’s here to stay.  You may not want to admit it, but you already have a few “outlaws” in your organization who are using their own devices, regardless of whether you allow them to or not. In fact, you probably have entire departments accessing email, apps and data on devices and through services that are not secure. The consumerization of IT is here to stay, so you may as well embrace it.

When business information is accessed by user-owned, consumer-grade devices, the right technology foundation is essential to ensure IT control. The question is where to begin. What are the business, user and IT benefits of enabling bring-your-own device (BYOD)?

The business wants to make employees more productive yet remain compliant. Users want access to all their enterprise apps and data from their many devices and IT wants to ensure security and control in a way that’s simple to manage.

Before you begin a BYOD initiative, it’s important to understand the underlying products that will become a part of your BYOD solution and their functionality and feature sets. One size does not fit all and, even though a BYOD solution may seem complex, it’s important to realize that it all boils down to addressing four key things:

  • Multiple Devices – Employees are bringing their own devices (on average 3) into the workplace – whether you like it or not.
  • Lots of Apps – IT have lots of them and different types (Windows, Web, SaaS and Mobile) that everyone want access to from their device.
  • Unmanaged Data – Employees are..

Continue reading here!

//Richard

#Citrix #AppController 2.5 Implementation Tips – #CloudGateway, #BYOD

February 19, 2013 Leave a comment

Great blog post by Matthew Brooks!

AppController is a component of the Citrix CloudGateway Enterprise suite that orchestrates access to Enterprise Cloud applications.  Those applications may take many forms including Mobile Applications, Software-as-a-Service hosted in public clouds, and Web links.  Below I provided some tips to help with the implementation of AppController 2.5 (which is the latest version as of the publishing of this blog).

System Related

Including settings such as the Hostname, SSL certificates, and Restore.

TIPs:

  • Take a hypervisor level snapshot after the initial installation so that you can easily return to that base level if configuration or integrations efforts go awry.
  • The hostname cannot contain special characters in the AppController certificate signing request.
  • The hostname must match SSL certificate.
  • The system cert must be chained to its CA/(s).

Active Directory Related

Including settings such as the Server (Domain Controller), Base DN, and Service Account credentials.

TIPs:

  • The AppController only supports integration with a single domain.  Multiple domains require multiple AppControllers.  The NetScaler Access Gateway may be configured to allow users to access a single fully qualified domain name, yet be directed to their respective domain AppController through the use of Global Groups.  See CTX116169 for more informationhttp://support.citrix.com/article/CTX116169
  • All user accounts must have a first name, last name, and email address configured or they will receive an authorization error when attempting to launch applications.  The bind Administrator account must also have email address configured or directory integration will fail.
  • Only LDAP (TCP 389) may be configured through the wizard that must be completed initially.  Thereafter LDAPS (TCP 636) may be configured through the full administration menu.
  • If the server name domain name is a load balanced DNS entry the initial import may work, yet subsequent bind attempts will fail.  Alternatively you may use the IP address of an LDAPS load balancer on a Netscaler with specific domain controllers configured as services.  See CTX135092 for more information http://support.citrix.com/article/CTX135092

Network Related

Including settings such as the IP address, @Workweb and NTP server.

TIPs:

  • Use IP private addresses as system addresses if possible.  When Trust Settings are configured for NetScaler Access Gateway it does not allow SSO to public addresses.  If public addresses must be used the NetScaler may be configured with an SSL Bridge to access the AppController.  See NetScaler Traffic Management document for more information.
  • NTP must be configured or SAML authentication may fail for SaaS sites if the time difference is significant.
  • When Trust Settings are configured for NetScaler Access…

Continue reading here!

//Richard

1st Test of Webroot SecureAnywhere – #Webroot, #SecureAnywhere, #BYOD – via @WeCloud

February 12, 2013 2 comments

It’s not very often that I test endpoint protection, antivirus or antimalware software. But tonight I started to have a look at Webroot and I must say that I’m really liking it!

There are some parts in particular that I like about it:

  1. It’s “cloud” based, so you don’t need your own costly infrastructure! 
  2. It takes seconds to deploy to a new Windows instance
  3. It scanned the XenDesktop controller that I installed  it on in 42 SECONDS! Wow! That’s amazing! 😀
    Scan_Time_42_seconds_wow
  4. The footprint is close to NOTHING!
  5. The installer is just a couple of MB!!
  6. It fits into the BYOD model

First of I just started a new trial, which was really easy! Just log on to the webpage and register, then after entering your info you’re all set and ready do deploy your “agents”.

My first thought was that this is really great for environments where you’d like low footprint, quick installation and low maintenance efforts of your antivirus software. And the way that Webroot does the scanning of the files etc. is so great and makes the software so quick and neat!

This must be perfect for XenDesktop and XenApp environments is my thought!! I’ll try it our more and will let you know! And why not provide this as an option in your BYOD program?

Here are some reviews that I was given by WeCloud, and they pretty much (or actually more) confirm that this is some good software!

PC Mag Review –  SecureAnywhere Antivirus
“Installer and program are incredibly tiny”
“Perfect score in my malware-blocking test”
 Read the review here!
 V3 Test & Review – Secure Anywhere

“Easy-to-use and excellently-designed malware protection with powerful central management and deployment features, and which should appeal to a wide range of businesses”. 
Read the review here!

AV Wars (RescuTechs LLC)
“No antivirus program we tested performed better at detection and removal of rootkits and scareware.”
Read the review here!

AV Test (Independent IT-Security Institute)
“100% Protection against 0-day malware attacks, inclusive of web and e-mail threats (Real-World Testing)” 
Read the review here!

//Richard

#Citrix #StoreFront Planning Guide

February 6, 2013 2 comments

Ok, this product has caused some headache since it was released. And I must say that this guide is something that Citrix should have release a long time ago… there are so many companies out there struggling with how to deal with Web Interface being faced out and how/what to do with StoreFront!

So enjoy!

Download StoreFront Planning Guide!

//Richard

Mac Receiver Launches Application and Closes Abruptly – #Citrix, #Receiver

February 4, 2013 2 comments

Ok, had a bit of a “challenge” today with my little Receiver 11.7 on my Macbook Air…. the darn thing just “vanished” after the XenApp/XenDesktop session was shown for about half a second…

And the solution was the following:

Symptoms

User is unable to login from a MacBook using the Citrix Receiver for Mac. The session launches and eventually disappears without any error message.

Cause

Since the Mac devices do not have a registry like Windows devices, a license needs to be issued to the client devices name. If the device does not have a name then it cannot be issued a license. It attempts to assign a license to a null value, which it cannot do and hence the session drops.

Resolution

  • Find the System Preferences Icon on the toolbar.

  • Open the Sharing folder in the System Preferences options.

  • Check the Computer Name field. If it…

Continue reading here!

//Richard

Virtualizing your desktops? Six experts share their advice – #Citrix, #XenDesktop

February 1, 2013 Leave a comment

If you follow a few simple principles, desktop virtualization projects are pretty straightforward. 

But if you barrel ahead, ignoring little things like users, apps, data and hardware, you could be in for a bit of a train wreck. 

So we thought we’d make this easy – with a new eBook that captures best-practice deployment advice from six of the most experienced desktop virtualization experts: Desktop Virtualization Deployment Insights: Six Experts Share Their Advice.

What to know when starting out on a virtual desktop implementation project

Download the free eBook from here: Desktop Virtualization Deployment Insights: Six experts share their advice

//Richard