Presentation On Centralised Computing - VDI
Presentation On Centralised Computing - VDI
Presentation On Centralised Computing - VDI
ON
Centralised Computing
Secure Centralised Computing
MOVE YOUR DESKTOP USERS
&
USERS ON P OOR BANDWIDTH
&
USERS WHO DO NOT H AVE ENDPOINT DEVICE BUT
N E E D A P P L I C AT I O N S BEYOND WEB BASED APPL
Need for Centralised Computing
• Audit Trail
• Stringent compliance adherence
• Extending BYOD
• Secure Third Party Vendor Access with Audit Trail/ Session Recording (alternate to tools like WebEx, AnyDesk, etc.)
End Computing challenges faced by all Customers
IDENTITY APPLICATION
ENDPOINT ACCESS
MANAGEMENT ACCESS SECURITY
• Audit of privilege • Secured remote • Allow users access
user access access to endpoints to specific
• Auditing access by over network: without applications only
vendors, extranet RDP, direct VNC • Auto-detection of
users • Restrict privilege high security and low
• Multi-factor user access from security networks
authentication: OTP/ endpoints • Role based remote
SMS, Mobile Token, • Protecting endpoints access from vendor
Email Token from network threats locations
and unauthorized • User should not be
remote control able to copy any data
Requirements – Security perspective 2
• IDRBT
has
released,
Cyber
Security
Checklist
2016,
recommending
banks
to
follow
best
pracCces
in
Endpoint
management,
privilege
user
access,
applicaCon
access
and
IdenCty
&
password
management
• $81
million
siphoned
off
by
hackers
from
Bangladesh
bank
by
execuCng
a
targeted
aKack
on
SWIFT,
originaCng
from
end
user
machine
which
had
direct
access
to
SWIFT
• Endpoints
at
banks
have
access
to
both
high
and
low
security
applicaCons
&
data,
allowing
hackers
to
target
such
endpoints
• AKack
surface
on
a
PC
is
very
large
as
the
OS,
local
app
and
capability
foot
print
is
very
large.
A
malware
can
come
through
Internet,
low
security
applicaCons
or
local
devices
used
by
end
users
• Privileged
account
credenCals
(local
/
domain
accounts)
are
shared
between
mulCple
users
and
are
prone
to
misuse
without
any
audit
/
tracking
• SophisCcated
aKacks
are
easily
possible
using
Man-‐in-‐the-‐browser,
keyloggers,
ransomware,
etc
when
the
applicaCons
execuCng
directly
on
endpoints
Virtual Desktop Computing Architecture
Data
Centre
Data remains within
datacenter
APPLICATION SERVERS
LAN /
CENTRALISED
PRIVATE WAN COMPUTING
INTERNET
All management is
centralized in
datacenter
DESKTOP
APPLICATION
VIRTUALIZATION
VIRTUALIZATION
(VDI)
THIN CLIENT
COMPUTING
Centralised Computing – certain Benefits
Easily enforce
Secure Remote Reduction in
Strong Endpoint Corporate policies
Access to energy costs &
Control on extranet
endpoints carbon footprint
devices
Centralised Computing – various USE Cases
SECURITY
V I R T U A L I Z AT I O N
VDI for
Virtualize &
centralized Thin client Bandwidth
Deliver Legacy
desktop Computing Optimizations
Applications
management
MOBILITY
Secure Remote
Anytime, Access for Access from Tabs,
BYOD Desktops in Cloud
Anywhere access Workforce, Chrome books
Vendors, Partners
The Solution Suite
Application
Device
Virtualization for Anytime, Anywhere Support Legacy
Independent BYOD
centralized desktop access Apps
Computing
management
Alternate to existing
VDI : Replace
inefficient and Thin Client Bandwidth
Desktop PC with
Expensive End Computing Optimizations
Virtual Desktop
Computing Platform
Key Features – Thin Client Options
Application Data
Secure Remote Access
Control and Endpoint Scan
to corporate network
Sandboxing
Remote Access to
Connect extranet
Endpoint Internet Hosted Virtual
users, partners,
Control Applications and
vendors
Virtual Desktops
Key Features - HyID
User Identification
Device Identification
Device Lockdown Business Apps:
Endpoint Security Email, Sharepoint
Network blinding Intranet, Web
Apps
PC
TABLET
TLS 1.2
Virtual Application Delivery
256 bit
Encryption
Secure Access
SMARTPHONE Gateway
Virtual
Desktop
G3
Security Needs – Important and Imperative for all Customers
Provide safe
Prevent User Prevent Malware
Internet browsing for
Profiling Attacks
isolated labs
• Stop Internet • Prevent cyber • User’s should be
websites or 3rd attacks that allows able to
party servers from malwares to plant conveniently &
collecting user’s user targeted securely access
data / info attacks to enter Internet from
network isolated labs
Security Benefits – Important to all Institutions
Safe Internet
Safe Internet Prevent Malware
browsing for
Browsing Attacks
isolated labs
• User’s consume • User’s Internet • Users use same
Internet from same downloads, whether machine to
desktop but Internet good or bad are consume Internet
runs on a different restricted to a without any risk of
machine, different separate network, getting any cyber
network in separate desktop attacks or being
anonymous method profiled
Use Case - Virtual Browser for Users
Internet
Browsers
Intranet
running
on
ApplicaCons
Virtual
Machines
Proposed
SoluCon
DMZ
Intranet
PC
with
Pla_orm
Thin
clients
Client/Browser
Secure Internet Browsing using VDI
VM
Internet
User
PC
with
a
local
browser
DMZ
Firewall
Proposed
SoluCon
based
on
Internet
Firewall
accessing
Centralised
Linux
TS
or
MicrosoX
RDS
CompuCng
Infrastructure
using
browser
or
using
the
client
of
Proposed
SoluCon
Only
display
data
(bitmap)
LegiCmate
as
well
as
of
the
VM
travel
to
end
malware
data
travel
over
user
PC.
No
malware
or
Internet
and
lands
into
Internet
data
travel
to
the
VM.
end
user
PC
VM
can
be
Linux
TS
based
or
Windows
RDS
server
Secure Internet Browsing – Deployment Architecture
Secure
Browser
Centralised
CompuCng
Pla_orm
Cluster
LAN/WAN
Users
Internal
File
Untrusted
Network
Firewall
Server
Secure
Access
OpConal
Internet
Pla_orm
in
Internal
Physical
Hosts
Firewall
Cluster
Firewall
with
Linux
Directory
Services
Secure Internet Browsing – Use Cases and User Functions
Tablet,
Smartphone
vCenter'Servers'
Client for '
CUSTOMER
PCs, INTERNET INFRA
Port:38866' Port:3389,'
Smartphones WITH
File'Server'
38871,'38870'
CUSTOMER
G3
Port:443' APPLICATIONS
Thin
Secured
Accops HySecure The
Control
Accops HyWorks
Controller
Clients
Thin clients Gateway with HyID,
Access
HyLite
Plane
172.16.113.71
Pla_orm
172.16.101.x
Endpoints
Virtual'Applica,ons,'
Internet / Untrusted Network Shared'Hosted'Desktops'
Win Server 2012 R2
G3
Port:389' Port:389' 172.16.113.72'
DMZ Ac,ve'Directory'
CASE STUDIES
Case Study – MNC Bank
Use Case:
• Core Banking Application deliver to end users and Benefits to Bank:
SaaS customers § Deliver CBS application from
datacenter to distributed end user
Problem Statement: based and ASP customers
• Deliver client-server based CBS application to § Single access portal for end users
users
and Centralized web based
• Deliver the CBS clients to SaaS customers of the
bank distributed across the state on different
management console for IT
connectivity options
• Centralized management console & Policy based
Load balancing
• Avoid frequent upgrade of client software on end
user machine
Solution:
• Using Proposed Application Virtualization solution,
the bank hosted the CBS application client in the
data-center and allowed their internal users as
well as their SaaS customers to come through a
single portal and access the CBS application with
full data isolation
Case Study – Large Indian BANK
Solution:
• Using the Solution Suite, Bank’s IT team gets a
centralized management console to see the live
devices and connect with the device over a
secure connection. RDP and VNC are not
opened on the network for obvious security
reasons
Case Study – LARGE MNC INVESTMENTS ORGANISATION
Use Case:
• Secure Remote access, Multi-factor authentication & Benefits to Customer:
Privileged User Management & Audit § Proposed Single Stack technology
enables, Seamless, easy secure
Problem Statement: remote access, avoiding risks of
• Critical servers must be audited for privileged access network level malware
• Multi-factor authentication for critical server access § Seamless two factor authentication
• Secure Remote Access by work from home and using SMS OTP for remote access
roaming users § Strong two factor authentication for
• Complete auditing of access server access with privilege user login
control and management
Solution:
• Using Secured Access & Identity Assurance solution,
§ Centralized dashboard for reporting
Customer allows its remote users, work from home
users to have secure access to corporate network.
The remote login is protected with SMS OTP. When
users want to access critical servers, the user’s must
present their domain credentials to authenticate,
allowing Customer to have complete audit trail of
privileged user access
Case Study – Data Aggregation & Analytics Organisation
Use Case:
• Complete data protection/DLP within LAN by power Benefits to Customer:
users § Secure sandbox computing
ensures full compliance to data
Problem Statement: protection policies
• Developers must be able to work on the applications § Developer’s productivity not
without ability to copy any data on their local effected by single side copy
machine protection
• Developer’s productivity should not go down § Access from anywhere, any device
• Developers should be able to work from home from
any device
with automated device enrollment
• Complete auditing of access & audit
§ Centralized dashboard for
Solution: reporting
• Using Proposed solutions, Customer built a secure
sandbox environment where the business line
applications are published. The developers can
connect to the secure computing environment via
Secure Access Platform protected with two factor
authentication, Device Authentication and access
the applications. Developers can not copy any data
via clipboard, print-screen, desktop reporting etc.
Case Study – SWIFT SECURITY
Problem
Statement:
• Bank
needs
to
provide
access
to
vendors
for
various
data
Benefits to Bank:
processing
needs,
like
eDMS
eForms
applicaCon
for
§ Deliver bank applications &
processing
scanned
documents
processing
data in secure sandbox. Data
• Currently
bank
has
to
provide
MPLS
connecCvity
and
never leaves data center.
manage
endpoints
for
data
protecCon
• Data
is
at
risk
as
the
data
gets
delivered
to
vendor
devices
§ No need to manage
• Access
may
be
slow
as
data
is
heavy
in
size
and
user
endpoints, automatic device
producCvity
is
low
enrollment and policy
enforcement from central
Solu.on:
console
• Using
Proposed
applicaCon
virtualizaCon
soluCon,
bank
can
§ Prevents users from copying
deliver
such
applicaCons
as
virtual
applicaCons
available
any data
over
the
HTML5
browser
soluCon.
The
users
can
connect
to
the
Centralised
CompuCng
portal,
login
and
launch
the
remote
applicaCon
in
a
browser.
The
data
of
the
applicaCon
never
flows
to
endpoint
as
the
applicaCon
client
is
running
on
remote
server.
This
also
saves
bandwidth
as
data
is
in
datacenter
only.
Case Study – Heavy ERP Access across remote locations (Medium Sized Indian Bank)
Problem
Statement:
• MicrosoX
Dynamics
consumes
requires
400kbps
to
Benefits to Bank:
work
• Deliver application to as low as 96
• Access
to
MicrosoX
Dynamics
CRM
from
Remote
kbps bandwidth locations
branches
with
96
kbps
to
1
Mbps
network
is
slow
or
• Improved CRM performance by
CRM
does
not
work
at
all.
almost 100x, access time reduced
• CRM
adopCon
is
low
and
CRM
user
producCvity
is
down
from 10 minutes to 10 seconds.
• Proposed End user experience
Solu.on:
enhancement pack make sure
• Using
Proposed
Virtual
Browser
soluCon,
bank
can
CRM works in virtual browser
publish
MS
Dynamics
CRM
as
a
virtual
applicaCon
and
rolled
out
the
published
CRM
to
end
users.
Users
working
from
any
type
connecCvity
can
launch
the
virtual
browser,
login
and
access
the
CRM
applicaCon
with
almost
100x
beKer
performance
Case Study – Thin Client Computing for a large Bank
Anywhere,)Any*me,)Any)device)Challenges) Data)at)Rest)(at)end)point))Challenges))
) )
Device* Device*
Endpoint*Scan* User*IdenDty* Blacklisted*
IdenDty*&* Security*
&*Role* User*Feeds*
and*Endpoint* ClassificaDon* Feeds*
Control*
User*Security*Context* Device*Security*Context*
Access*
via*
Access*
Access* Allow*Access* Gateway*
User* Request*
Access*as**
Contextual*Policy* Virtual*
Access*Portal* Enforce*2FA* App*
Engine*
Federated*
App* Request*
Deny*Access* Access*
with*SSO*
What will the proposed SSO Solution Address
Technical)Requirements)(mapped)against)SSO)Solu8on)!
Application Access Gateway with Web Based Management
SSL VPN Console 1. Secure Access to application with MFA
(OTP) - SSO
SPAN Technology, no network Integrates with AD / LDAP / 2. Secure Access limited to Authorized &
adaptor, high performance Novell trusted devices - SSO
3. Device forensic i.e. IP address/MAC/MB
Supports any TCP, UDP Web Launchpad, no admin rights ID/ HDD ID - SSO
Application required
4. Restricted access to Save/Download/Print
features, option to be enable and disable
Focus on Application delivery &
Auto-updating client at per user basis – achievable with SSO
not network delivery
5. Complete restriction of screenshot, print
Multi-factor authentication
screen,forsipping
Web Based
tools Management
– achievable with SSO
Built-in Two Factor Authentication HTML5 based access portal any application 6. Data copy, screen
Console
recording, remote (VNC/
WebEx) access protection – achievable with SSO
Linux based hardened gateway, Integrates with Proposed SSL Integrates with AD / LDAP /
Endpoint Security Scan Enabled available as software, virtual VPN or any existing VPN Novell
appliance
Integrates with Windows & Web based management
Linux Desktop/Server Login console