Manuel Utilisateur Documentation Technique | Manuel

Total Page:16

File Type:pdf, Size:1020Kb

Manuel Utilisateur Documentation Technique | Manuel Manuel Utilisateur Documentation Technique | Manuel Ref. : FR_IPDIVA_MU-0002_rev.2.02_Manuel utilisateur - Secure 8.1.2 Version : 2.02 Produit : IPdiva Secure Date : 05/06/2018 Objet : Ce manuel a pour but d’orienter les utilisateurs dans l’utilisation d’IPdiva Secure. L'utilisateur s'authentifie et aux regards de ses droits, la plateforme de Médiation lui présente les ressources qui lui sont accessibles. L'utilisateur peut activer une ressource afin d'accéder à son application de manière sécurisée. Documentation Technique | Manuel utilisateur 1 Manuel Utilisateur TABLE DES MATIERES 1. Préambule .........................................................................................................4 2. Règles pare-feu ..................................................................................................4 3. Installation des différents clients IPdiva ................................................................4 3.1 IPdivaClient / IPdivaClient VPN .......................................................................4 Systèmes d’exploitation et navigateurs supportés .......................................4 Installation sur Microsoft Windows ............................................................5 Installation sur Mac OS ......................................................................... 12 3.2 ActiveX / Java (antérieur) ............................................................................ 16 Systèmes d’exploitation et navigateurs supportés ..................................... 16 Installation de l’ActiveX ......................................................................... 17 Java .................................................................................................... 18 Configuration des différents navigateurs .................................................. 19 3.3 Client RDP (pour MAC OS X uniquement) ....................................................... 25 3.4 Utilitaires complémentaires IPdiva (facultatif) ................................................. 26 IPdivaConnect (pour Windows) ............................................................... 26 IPdiva Agent GUI (Pour Windows) ........................................................... 30 4. Connexion au portail d’accès .............................................................................. 37 4.1 Page d’accueil ............................................................................................ 37 4.2 Authentification .......................................................................................... 39 Choix du domaine d’authentification (optionnel) ....................................... 40 Identification et authentification ............................................................. 41 Contrôles d’intégrité et de conformité ...................................................... 45 4.3 Interface utilisateur ..................................................................................... 46 Présentation des ressources ................................................................... 46 Lancement d’une ressource .................................................................... 47 Cas d’erreurs connus ............................................................................. 51 Utilitaires ............................................................................................. 53 Historique ............................................................................................ 54 Déconnexion ........................................................................................ 55 5. Smartphone et synchronisation ActiveSync .......................................................... 57 5.1 Configuration ActiveSync (Messagerie mail) sur smartphone / tablette .............. 57 6. Incidents de fonctionnement. ............................................................................. 62 Documentation Technique | Manuel utilisateur 2 Manuel Utilisateur FIGURES Figure 1 : Liste d'utilitaires accessible pour l'utilisateur ..................................................5 Figure 2 : Liste d'utilitaires accessible pour l'utilisateur ..................................................9 Figure 3 : Téléchargement de l’utilitaire IPdiva Client pour Mac OS ............................... 12 Figure 4 : Téléchargement de l’utilitaire IPdiva VPN pour Mac OS .................................. 14 Figure 5 : Démarrage du mode privé depuis le menu du navigateur Firefox .................... 37 Figure 6 : Fenêtre de navigation privée ...................................................................... 37 Figure 7 : Fenêtre de bienvenue ............................................................................... 38 Figure 8 : Exemple de fenêtre de sélection du certificat ............................................... 39 Figure 9 : Fenêtre d’authentification .......................................................................... 40 Figure 10 : Sélection d’un domaine d’authentification .................................................. 41 Figure 11 : Démarrage du mode privé depuis le menu du navigateur Firefox .................. 42 Figure 12 : Authentification forte avec mot de passe unique ......................................... 43 Figure 13 : Exemple de mail reçu avec le mot de passe unique ..................................... 43 Figure 14 : Demande de présentation d'un certificat utilisateur ..................................... 44 Figure 15 : Champ identifiant renseigné automatiquement après vérification du certificat 45 Figure 16 : Présentation des ressources ..................................................................... 46 Figure 17 : Pop-up de confirmation pour l'exécution d'IPdivaClient ................................ 47 Figure 18 : Exemple de lancement d'une ressource SSH avec IPdivaClient ..................... 48 Figure 19 : Comportement indiquant l'utilisation de l'ActiveX / Java .............................. 48 Figure 20 : Sélection et lancement d’une ressource ..................................................... 49 Figure 21 : Ressource chargée via ActiveX ................................................................. 50 Figure 22 : Configuration d'un proxy ......................................................................... 51 Figure 23 : Configuration d'IPdiva Client .................................................................... 52 Figure 24 : Configuration d'un proxy authentifiant ...................................................... 52 Figure 25 : Accès à l'onglet "Utilitaires" ..................................................................... 53 Figure 26 : Contenu de l'onglet "Utilitaires" ................................................................ 53 Figure 27 : Affichage de l'historique des connexions sur IPdiva ..................................... 54 Figure 28 : Onglet "Déconnexion" ............................................................................. 55 Figure 29 : Confirmation de déconnexion ................................................................... 56 Figure 30 : Exemple de suppression des données de cache sous IE ............................... 56 Documentation Technique | Manuel utilisateur 3 Manuel Utilisateur 1. Préambule L’accès au portail IPdiva vous permet d’accéder à des ressources mises à disposition par votre administrateur. Certaines de ces ressources nécessitent l’installation de composants particulier sur le poste utilisateur. Les ressources en question sont reconnaissables au fait qu’elles fassent appel à un plugin. Vous trouverez dans cette documentation les informations nécessaires concernant l’installation de ces composants, en fonction du système d’exploitation utilisé. 2. Règles pare-feu Lors de l’utilisation du client IPdiva ou des plugins ActiveX/Java, l’utilisation de ressources nécessitant ces utilitaires est soumise à une connexion vers le serveur IPdiva sur une adresse et un port spécifique. La configuration étant définie par votre administrateur, veuillez le contacter afin qu’il vous informe sur l’adresse et le port à autoriser pour la connexion des plugins. 3. Installation des différents clients IPdiva Depuis la version IPdiva Secure 8.1, IPdiva introduit un nouveau client pour l’utilisation des ressources IPdiva. Le but de ce client IPdiva est de remplacer les composants ActiveX / Java utilisés dans versions précédentes d’IPdiva et suite à l’arrêt du support JAVA sur les navigateurs Mozilla Firefox (depuis la version 52) / Google Chrome (depuis la version 43). Sans contre-indication particulière de la part de votre administrateur, privilégiez l’installation du composant « IPdivaClient ». 3.1 IPdivaClient / IPdivaClient VPN Systèmes d’exploitation et navigateurs supportés Les systèmes d’exploitation ainsi que les navigateurs supportés par IPdivaClient sont les suivants : Documentation Technique | Manuel utilisateur 4 Manuel Utilisateur Navigateur Internet Mozilla Google Microsoft -------------- Explorer (10 Safari Firefox Chrome mini) Edge *OS Windows 7 Oui Oui Oui N/C N/C Windows 8 / 8.1 Oui Oui Oui N/C N/C Windows 10 Oui Oui Oui Oui N/C Mac OS El N/C Oui Oui N/C Oui Capitan (10.11) Mac OS Sierra N/C Oui Oui N/C Oui (10.12) Max OS High N/C Oui Oui N/C Oui Sierra (10.13) * IPdivaClient sera supporté ultérieurement sur certaines distributions Linux. Installation sur Microsoft Windows L’installation d’IPdivaClient se fait au moyen d’un package à exécuter sur le poste utilisateur. Ce dernier peut être récupéré depuis le menu « Utilitaires » lorsque vous êtes connectés
Recommended publications
  • Hot Topics: Networking, Security, and Energy Share Session Boston
    Business Service Management for Performance Hot Topics: Networking, Security, and Energy Share Session Boston Laura Knapp WW Business Consultant [email protected] 650-617-2400 1 © Applied Expert Systems, Inc. 2010 Business Service Management for Performance Network Security Energy 2 © Applied Expert Systems, Inc. 2010 Business Service Management for Performance New Era of Mainframe Computing Types if Virtualization Server/machine Desktop/Session Application 3 © Applied Expert Systems, Inc. 2010 Business Service Management for Performance New Era of Mainframe Computing? Server/machine Masking of server resources from server users Consolidation of multipppyle physical servers onto a single physical base AKA virtual private servers, guests, instances, containers Three popular approaches: virtual machine (VM) – host guest paravirtual machine – variation on VM where the guest OS is modified Operating system layer – all guests use same OS as the host – single OS kernel 4 © Applied Expert Systems, Inc. 2010 Business Service Management for Performance New Era of Mainframe Computing? Desktop/Session (Aka server side virtualization - virtual desktop – client virtualization) Separates a personal computing desktop from a physical machine Uses client-serve computing and virtual desktop interface (VDI) The deskt op i s st ored on a remot e cent ral server Programs, applications, processes and data are run centrally’ Access from PC, notebook, smartphone, thin client Providers Cendio ThinLinc , Citrix XenDesktop , Ericom WebConnect , Iland Workforce Cloud , Leostream , Microsoft Remote ,Desktop Services , MokaFive Suite , NComputing , Security and other items controlled at central NX technology , Pano Logic , Parallels Virtual Desktop , Infrastructure , Red Hat, RingCube vDesk , Sun Virtual location Desktop Infrastructure , Systancia, ThinDesk , Userful , VMware View , Wyse 5 © Applied Expert Systems, Inc.
    [Show full text]
  • In Windows Server 2008 R2 and Windows Server 2008 (The Former Containing the Later Release of Hyper-V)
    Hyper-V Microsoft Hyper-V Developer(s) Microsoft Initial release July 26, 2008 (KB950050)[1][2] R2 Service Pack 1 Stable release (KB976932)[3][4] / March 15, 2011; 15 months ago Windows 8 (both its server and client versions) (future) and Operating system Windows Server 2008 or standalone Type Virtual machine License Proprietary Hyper V Slide 1 of 21 Microsoft Hyper-V ■ Microsoft Hyper-V, ✦ codenamed Viridian ✦ and formerly known as Windows Server Virtualization, ✦ is a hypervisor-based virtualization system for x86-64 systems ■ A beta version of Hyper-V was shipped with certain x86-64 editions of Windows Server 2008, and the finalized version (automatically updated through Windows Update) was released on June 26, 2008 ■ Hyper-V has since been released in a free stand-alone version, and has been upgraded to Release 2 (R2) status Hyper V Slide 2 of 21 Versions and variants ■ Hyper-V exists in two variants: ✦ as a stand-alone product called Microsoft Hyper-V Server 2008 (Hyper-V Server 2008 R2 for the second release), ✦ and as an installable role in Windows Server 2008 R2 and Windows Server 2008 (the former containing the later release of Hyper-V). ■ The stand-alone version of Hyper-V is free, and was released on October 1, 2008. ■ It is a variant of the core installation of Windows Server 2008 that includes full Hyper-V functionality; other Windows Server 2008 roles are disabled, and there are limited Windows Services. ■ The free Hyper-V Server 2008 variant is limited to a command line interface (CLI), where configuration of the "Host" or "Parent" (Hyper-V Server 2008) OS, physical hardware and software is done using shell commands.
    [Show full text]
  • Endpoint Protection Platform for Virtual Desktop Infrastructure (VDI) Datasheet
    EPP VDI DATASHEET Endpoint Protection Platform for Virtual Desktop Infrastructure (VDI) Datasheet Introduction The SentinelOne Endpoint Protection Platform offers a lightweight and efcient solution to secure the growing need for virtual environments, including thin clients, layered applications, and other VDI scenarios. VDI solutions have been an underlying IT trend in some of the key business sectors for a number of reasons ranging from cost, compliance and seasonality of workers. And improvement storage performance improvements will only drive the adoption further. Securing VDI deployments is imperative to minimize the business risk and achieve regulatory compliance, especially in the face of increasing magnitude and complexity of cyber threats. VDI also presents some unique challenges for security along with some common issues seen in traditional endpoint deployments. Patching is not always rapid: Patching requires updating the golden image and need to be certified before rollout. Balancing cost and complexity: One of the biggest desired benefits of virtualization is cost savings with oversubscription. VDI implementations tend to be as light-weight as possible to optimize deployments and maximize resource utilization. Consequently, the layers of security controls are always deep. False sense of security: Given the temporal nature of VDI sessions, there is sometimes a false sense of security that drives user behavior. The threats to this environment however are as real – malware such as screen scrapers and key loggers put user credentials and business information at an equivalent risk as traditional endpoint because the virtual desktop is not isolated from corporate environment. VDI performance accentuates risk: Traditional AV scans that cause performance problems on traditional endpoints with dedicated CPU experience a more extreme resource crunch when running in shared virtual CPU environment resulting in AV storms.
    [Show full text]
  • 6 KEY FACTORS WHEN CHOOSING VDI SECURITY WHITEPAPER Contents
    6 KEY FACTORS WHEN CHOOSING VDI SECURITY WHITEPAPER Contents The Need for Securing VDI3 VDI Approaches and Trends 4 6 Key Factors When Choosing VDI Security 5 Why Choose SentinelOne 6 Key Benefits 7 Supported Virtual Providers 7 6 Key Factors When Choosing VDI Security The Need for Securing VDI Common risks impacting data still prevail in VDI environments: ransomware, social engineering, drive-by downloads, network sniffing, vulnerability exploits, insider threats, privileges escalation, and malware. Some would claim VDI is a more secure option, mainly because one can terminate the VDI instances once done, but the overall security state is as strong as its weakest link – and VDI deployments tend to be exactly that for several reasons: • Patching cycles require updating the golden image and are therefore not rapid. • VDI implementations commonly try to consume as little resources as possible, so administrators try to reduce the amount of software deployed - something in the expense of protection. • The human factor: users tend to be less aware of security implications when running on VDI because they often don’t own the system and use it for a temporal session. Executive Summary In recent years, more and more enterprises have adopted VDI (Virtual Desktop Infrastructure) environments due to a variety of operational benefits. From a security standpoint, the common risks impacting data still prevail in VDI environments. To address security, manageability, and performance needs, security software needs to meet several benchmarks before VDI deployment. 3 6 Key Factors When Choosing VDI Security VDI Approaches and Trends In the world of virtual desktop infrastructure, there are two basic approaches: persistent and non-persistent.
    [Show full text]
  • What's New in Applidis Fusion 4 Service Pack 3
    What’s new in AppliDis Fusion 4 Service Pack 3 Systancia Publication: November 2013 Summary This new AppliDis Fusion 4 Service Pack 3 version introduces significant new features and enhancements to the solution. The 4 following major features have been integrated: - AppliDis Standby Databases synchronization management engine. - AppliDis Session Booster - Dynamic VDI machines Provisioning - Toolbox Copyright Copyright © Systancia 2013 – All rights reserved. Systancia and AppliDis are trademarks of Systancia. The information provided in this document is by way of information only, and does not therefore constitute any kind of commitment for Systancia. The information contained herein may be amended by Systancia at any time without notice. Trademarks of other companies: all other trademarks, product names and company names referred to in this document are mentioned for explanatory purposes and belong to their respective holders. More specifically, Microsoft, Windows, Windows 2003 and Windows 2008 Server, Windows 2008 Server R2, Windows 2012 Server, Windows 2012 Server R2, SQL Server are trademarks of Microsoft Corporation in the United States and in other countries. Systancia Actipolis 3 3, rue Paul Henri Spaak 68390 Sausheim France Phone: (+33) 3 89 33 58 20 Fax: (+33) 3 89 33 58 21 Web: http://www.systancia.com Email: [email protected] Table of content Introduction ...................................................................................................................................... 5 AppliDis Standby Database engine
    [Show full text]
  • Comparison of Remote Desktop Software - Wikipedia
    9/29/2020 Comparison of remote desktop software - Wikipedia Comparison of remote desktop software This page is a comparison of remote desktop software available for various platforms. Contents Remote desktop software Operating system support Features Terminology See also Notes References Remote desktop software https://en.wikipedia.org/wiki/Comparison_of_remote_desktop_software 1/9 9/29/2020 Comparison of remote desktop software - Wikipedia First Latest Free for Free for public Software Protocols Creator stable year, License personal commercial release version use use date AetherPal Proprietary AetherPal Inc. 2011 2016, Valet Proprietary No No Ammyy Admin Proprietary Ammyy Inc. 2007 2015, 3.5[1] Proprietary Yes No AnyDesk Software 2020-07-28, AnyDesk Proprietary 2015 Proprietary Yes No GmbH 6.0.7 Anyplace Control Anyplace Control Proprietary 2002 2012, 5.4.0.0 Proprietary No No Software AnywhereTS RDP, ICA Qzone ? 2009, 3.4 Proprietary Yes Yes Apple Remote Desktop RFB (VNC) Apple 2002 2017, 3.9[2] Proprietary No No Apple Screen Sharing (iChat) Proprietary, RFB (VNC) Apple 2007 2014, 1.6 Proprietary Yes Yes AppliDis RDP Systancia ? 2013, 4 SP3 Proprietary No No BeAnywhere Support Proprietary BeAnywhere 1996 2015, 6.00 Proprietary No No Express 2020-07-29, Cendio ThinLinc RFB (VNC) Cendio AB 2003 Proprietary Yes[a] Yes[a] 4.12.0 Chicken of the VNC RFB (VNC) ? 2002 2011-02, 2.1.1 GPL Yes Yes BSD Client, 2018, Chrome Remote Desktop Chromoting Google 2011 Proprietary Yes Yes 70.0.3538.21 Server CloudBerry Lab (CloudBerry May 25, Proprietary
    [Show full text]
  • Nutanix Acropolis Virtualization Datasheet-R1.Indd
    Nutanix Virtualization Nutanix Acropolis is a turnkey infrastructure platform delivering enterprise-class storage, compute and virtualization services for any application. As a fully integrated IT solution, it eliminates the cost and complexity of legacy datacenter products that are individually deployed and separately managed. For maximum flexibility, enterprise professionals have the choice of using VMware vSphere®, Microsoft Hyper-V® or the built-in virtualization capabilities of Acropolis to run their applications on Nutanix. Acropolis includes its own natively integrated hypervisor - the Acropolis Hypervisor (AHV) - which is built on proven open-source KVM technology and security hardened. The platform also incorporates the Acropolis App Mobility Fabric (AMF) - a highly available and scalable management layer enabling easy workload migration between hypervisors and different runtime environments. Together, AHV and AMF decouple applications from the underlying infrastructure, delivering enterprise IT the flexibility and choice to choose runtime environments best for their applications and services. Acropolis works with Nutanix Prism to give administrators consumer-grade simplicity in managing their entire virtual environment. Incumbent Virtualization Nutanix VM Virtualized Computing VM Virtualized Computing Data VM-centric Data Services VM VM-centric Storage Hypervisor Storage LUN-centric Storage Simple Converged Stack Why Nutanix for Virtualization? • Built in virtualization and integrated management that is simple to deploy, scale
    [Show full text]
  • First Concept for Tricerat Simplify Suite V5 Review by Wilco Van Bragt
    Product Review Systancia AppliDis December 2016 Wilco van Bragt Review Systancia AppliDis Page 2 of 22 Introduction Systancia Several years ago there were numerous products on the market offering a Server Based Computing (SBC) solution. VDI was introduced and even more products became available. However, in the last years many of these products are not here anymore. In the current landscape the big three dominating this market are: Microsoft RDS, VMware Horizon View and Citrix XenApp/XenDesktop. However, now another player is coming to the stage; Systancia. They have already been in the market for years, but were working in a kind of stealth mode in their home country France. In this review I’m going to be taking a look at their flagship product, AppliDis. Let’s start with a quick infrastructure overview of the product, before we are going to start the installation. AppliDis Components The AppliDis infrastructure workspace exists of different roles, which can be combined or installed separately over several machines. Wilco van Bragt Review Systancia AppliDis Page 3 of 22 The heart of the AppliDis infrastructure is the Administration server. Via this server the configuration is made and all other components are communicating via the Administration Server. The administration server stores the configuration into a database. The database can be a SQL or Oracle database, where Microsoft SQL Express is supported. AppliDis has the option to configure a back-up database on a different database server for fail-over/disaster purposes. This is also possible with using MS SQL express, so you don’t have any additional license costs.
    [Show full text]
  • Fiche Technique Applidis
    Quick Start Guide Quick Start Guide pour AppliDis Fusion 4 vLab Version document : 1.09 Diffusion libre Objet du document Ce document présente toutes les étapes nécessaires à l’installation et à l’utilisation de la machine virtuelle AppliDis Fusion 4 vLab. AppliDis Fusion 4 vLab est une façon simple et autonome de tester AppliDis Fusion 4, la solution de virtualisation de Systancia. Quick Start Guide Copyright © Systancia 2013 – Tous droits réservés. Systancia et AppliDis sont des marques de Systancia. Les informations fournies dans le présent document sont fournies à titre d’information, et de ce fait ne font l’objet d’aucun engagement de la part de Systancia. Ces informations peuvent être modifiées sans préavis de la part de Systancia. Ce document ainsi que le logiciel AppliDis font l’objet d’une licence d’utilisation. Il ne s’agit pas d’un transfert de propriété. L’accord de la licence d’utilisation est proposé lors de la phase d’installation. Les utilisateurs ne souhaitant pas souscrire cette licence d’utilisation ne devront pas installer le logiciel AppliDis. Au titre de la licence d’utilisation, il est rappelé notamment qu’il est interdit toute reproduction ou tout usage non autorisés de tout ou partie du logiciel AppliDis. Ce qui intègre ce document : aucun élément de la présente documentation ne pourra, sauf accord écrit exprès de la société Systancia, être reproduit, transmis sous quelque forme et par quelque moyen que ce soit pour quelque usage que ce soit autre que l’usage personnel de l’acheteur. Ce document est à destination d’utilisateurs avertis, disposant de notions de base du système d’exploitation Windows de Microsoft.
    [Show full text]
  • Fiche Technique Applidis
    Quick Start Guide Quick Start Guide for AppliDis Fusion 4 vLab Version document : 1.09 Unlimited distribution Document purpose This document presents all the required steps to install and use AppliDis Fusion 4 vLab virtual machine. AppliDis Fusion 4 vLab is an evaluation platform which offers a simple and autonomous way to test AppliDis Fusion 4, Systancia’s solution for virtualisation. Quick Start Guide Copyright © Systancia 2013 – All rights reserved. Systancia and AppliDis are trademarks of Systancia. The information provided in this document is by way of information only, and does not therefore constitute any kind of commitment for Systancia. The information contained herein may be amended by Systancia at any time without notice. This document and the AppliDis software are covered by a user license. This is not a transfer of ownership. The user is required to accept the user license agreement at installation time. Users who do not wish to accept this user license should not install the AppliDis software. Under the terms of the user license, no reproduction or unauthorised use of all or part of the AppliDis software is permitted. This includes this document: no part of this documentation may be reproduced or transmitted in any form by any means whatsoever for any use other than the personal use of the purchaser, except with the express written agreement of Systancia. This document is intended for experienced users who have a basic understanding of the Microsoft Windows operating system. Systancia shall not be held liable for any handling errors in the use of the AppliDis Fusion 4 vLab virtual machine.
    [Show full text]
  • LEADERSHIP COMPASS by Paul Fisher Privileged Access Management
    KuppingerCole Report By Paul Fisher LEADERSHIP COMPASS May 07, 2020 Privileged Access Management Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Privileged accounts have traditionally been given to administrators to access critical data and applications. But, changing business practices, hybrid IT, cloud and other aspects of digital transformation has meant that users of privileged accounts have become more numerous and widespread. To reduce the risk of privileged accounts being hijacked or fraudulently used, and to uphold stringent regulatory compliance within an organization, a strong PAM solution is essential. By Paul Fisher [email protected] Content 1 Introduction ................................................... 5 1.1 Market segment .............................................. 5 1.2 Delivery models .............................................. 6 1.3 Required capabilities ........................................... 7 1.3.1 Privileged Account Data Lifecycle Management (PADLM) ................. 7 1.3.2 Shared Account Password Management (SAPM) ....................... 8 1.3.3 Application to Application Password Management (AAPM) ................ 8 1.3.4 Controlled Privilege Elevation and Delegation Management (CPEDM) ......... 8 1.3.5 Endpoint Privilege Management (EPM) ............................. 9 1.3.6 Session Recording and Monitoring (SRM) ........................... 9 1.3.7 Just in Time (JIT) ............................................ 9 1.3.8 Privileged
    [Show full text]
  • Download Systancia Brochure
    Waarom kiest u voor AppliDis Fusion 4? ■ Is winstgevend door de unieke geïntegreerde aanpak van de oplossing; ■ Vereenvoudigt en beheert de gehele VM en Desktop omgeving d.m.v. één web console; ■ Levert veilige mediarijke desktops aan gebruikers; ■ Beschermt uw bestaande IT investering door het gebruik van een op standaards gebaseerde oplossing die in iedere omgeving werkt; Het installeren en beschikbaar stellen ■ Anticipeert op gebruikerseisen en administreert de gebruikte middelen op de achtergrond; ■ Versterkt uw infrastructuur en een toename van beschikbaarheid; van Applicaties en Desktops was nog ■ Verruimt beveiliging van applicaties door het veilig stellen van machine data en gebruikersinformatie; nooit zó eenvoudig! ■ Verlaagt de management kosten van servers en desktops; ■ Bewaart en ondersteunt ook verouderde applicatie software. Systeem eisen Partner AppliDis Fusion 4 Voor de eisen die aan uw systeem worden Applicatie en Desktop virtualisatie gesteld, verwijzen we naar: http://www.systancia.com/applidis-fusion-4 AppliDis Fusion 4 Klant citaten “Onze AppliDis oplossing is door de jaren heen gegroeid en wij zijn zeer tevreden met de mogelijkheid van het uitgeven van applicaties. Vandaag de dag hebben onze gebruikers toegang tot de uitgegeven applicaties in een volledige beveiligde omgeving en hebben veel voordeel van het zeer betrouwbare systeem.” ■ Department of Employment, France - M. P.Louet - Thin Client and Specific solutions division Direction. “Wij gebruiken mobiele apparaten voor directe toegang tot patiëntinformatie aan het bed. De ApplDis oplossing van Systancia komt perfect tegemoet aan onze behoeften, zowel technisch als financieel bezien. Wij hebben de AppliDis oplossing op onze mobiele PC’s geïnstalleerd, op trolly’s in het ziekenhuis en ook op Motion C5 tablet PC’s.
    [Show full text]