VDI Smackdown

Total Page:16

File Type:pdf, Size:1020Kb

VDI Smackdown VDI Smackdown Author(s) : Ruben Spruijt Version: 2.3 Date: November 2013 VDI Smackdown solutions overview and feature comparison matrix © 2013 PQR, all rights reserved. All rights reserved. Specifications are subject to change without notice. PQR, the PQR logo and its tagline Eenvoud in ICT are trademarks or registered trademarks of PQR in the Netherlands and/or other countries. All other brands or products mentioned in this document are trademarks or registered trademarks of their respective holders and should be treated as such. Version 2.3 November 2013 VDI Smackdown solutions overview and feature comparison matrix DOCUMENT OVERVIEW HISTORY Version Date Author(s) Remarks 1.0 June 2010 Ruben Spruijt Release ‘the Matrix’ 1.1 February 2011 Ruben Spruijt Release ‘the Matrix reloaded’ 1.2 February 2011 Ruben Spruijt 1.3 February 2012 Ruben Spruijt 1.4 June 2012 Ruben Spruijt Release ‘The Matrix Revolutions’ 2.0 March 2013 Ruben Spruijt Release ‘The Matrix vNext’ 2.1 May 2013 Ruben Spruijt 2.2 September 2013 Ruben Spruijt 2.3 November 2013 Ruben Spruijt REVIEWER Version Date Reviewer Remarks 2.2 August 2013 Erik van Veenendaal 2.3 November 2013 Erik van Veenendaal Sven Huisman Version 2.3 November 2013 VDI Smackdown solutions overview and feature comparison matrix TABLE OF CONTENT 1. Introduction ..................................................................................................................... 1 1.1 Objectives........................................................................................................................ 1 1.2 Intended audience ........................................................................................................... 1 1.3 Vendor involvement ......................................................................................................... 1 1.4 Feedback ......................................................................................................................... 1 1.5 Contact............................................................................................................................ 1 2. About .............................................................................................................................. 3 2.1 About PQR ....................................................................................................................... 3 2.2 Acknowledgments ............................................................................................................ 3 2.3 Quote’s ............................................................................................................................ 5 3. Application and Desktop Delivery ...................................................................................... 6 3.1 Strategy .......................................................................................................................... 6 3.2 The essence of application and desktop delivery ................................................................ 7 3.3 Overview of application and desktop delivery solutions ....................................................... 8 3.4 Trusted and untrusted work place scenarios ...................................................................... 8 3.5 Secure access .................................................................................................................. 9 3.6 Mobile Application Delivery ............................................................................................... 9 3.7 Web application acceleration ............................................................................................. 9 3.8 Connection broker .......................................................................................................... 10 3.9 Application virtualization ................................................................................................. 10 3.10 Application layering ........................................................................................................ 10 3.11 OS provisioning .............................................................................................................. 11 3.12 Server-Hosted Desktop Virtualization (VDI) ...................................................................... 11 3.13 VDI with GPU acceleration .............................................................................................. 11 3.14 Session Virtualization (TS) .............................................................................................. 12 3.15 Client-Side virtualization ................................................................................................. 12 3.16 Workspace Aggregation .................................................................................................. 13 3.17 Client management ........................................................................................................ 13 3.18 Vendor matrix, who delivers what ................................................................................... 14 4. Desktop Virtualization ..................................................................................................... 16 4.1 Introduction ................................................................................................................... 16 4.2 User Centric Computing .................................................................................................. 16 4.3 Desktop virtualization types ............................................................................................ 17 4.4 Server hosted desktop virtualization directions ................................................................. 18 4.5 VDI strategy .................................................................................................................. 20 4.6 Microsoft Licensing for VDI solutions ............................................................................... 23 4.7 HTML5 .......................................................................................................................... 26 4.8 Workspace Aggregation .................................................................................................. 26 5. Vendors and their solutions ............................................................................................. 27 5.1 Introduction ................................................................................................................... 27 5.2 Ericom PowerTerm WebConnect ..................................................................................... 27 5.3 Citrix XenDesktop ........................................................................................................... 29 5.4 Citrix VDI-in-a-Box (Kaviza) ............................................................................................ 32 5.5 Dell vWorkspace ............................................................................................................ 34 5.6 Desktone ....................................................................................................................... 35 5.7 LISTEQ BoxedVDI .......................................................................................................... 37 5.8 NICE DCV ...................................................................................................................... 39 5.9 Microsoft RDVH - Virtual Desktop Infrastructure ............................................................... 40 5.10 Oracle Virtual Desktop Infrastructure ............................................................................... 43 Version 2.3 November 2013 VDI Smackdown solutions overview and feature comparison matrix 5.11 Red Hat Enterprise Virtualization for Desktops ................................................................. 44 5.12 Virtual Bridges, VERDE ................................................................................................... 46 5.13 VMware View ................................................................................................................. 47 5.14 VMware Mirage .............................................................................................................. 49 5.15 Unidesk ......................................................................................................................... 53 6. VDI features Comparison ................................................................................................ 57 6.1 Introduction ................................................................................................................... 57 6.2 Product Version .............................................................................................................. 57 6.3 Scope ............................................................................................................................ 57 6.4 Feature compare matrix ................................................................................................. 57 6.5 Compare Matrix, Features ............................................................................................... 58 7. RemoteFX/RDP Software clients ...................................................................................... 79 7.1 Vendors and their solutions ............................................................................................. 79 7.2 Product Version .............................................................................................................
Recommended publications
  • Xen Enterprise
    Xen: the Past, Present and Exciting Future Ian Pratt Chairman of Xen.org, SVP and Founder of Bromium Sponsored by: & 1 Outline • Community Update • Xen 4 Review • Xen and the next wave of virtualization 2 COMMUNITY UPDATE 3 2011 Highlights • Inclusion of Xen into Linux 3 (and distros) • New Initiatives: – Project Kronos – Xen.org Governance – Renewed focus on Xen for ARM • Successful Community Initiatives – Documentation Day – Google Summer of Code – Hackathons: Cambridge (Citrix) and Munich (Fujitsu) • Lars Kurth: (not so) new Community Manager 4 Contribution Statistics By Change Sets Contributors to Xen.org 5000.0 200 4500.0 180 4000.0 160 3500.0 140 3000.0 120 XenARM** 2500.0 100 PVOPS Individuals 2000.0 XCP 80 Orgs 1500.0 Xen HV 60 1000.0 40 500.0 20 0.0 0 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011* *) End of Sept 2011 **) Activity on Development branch (not yet in xen-unstable) 5 2010 & 2011 Contributors (by KLOC) 2010** 2011** *** 1% 2% 3% 4% 5% 4% 6% 5% Citrix HV 28% Citrix XCP Citrix XCP 5% Citrix HV Oracle Samsung* 39% 11% Intel Novell 6% Novell Oracle Fujitsu AMD 7% AMD Individual Individual 13% Intel Misc 18% Misc 8% University 20% 15% *) Activity on Development branch (not yet in xen-unstable) **) Includes PVOPS ***) Until Sept 2011 6 Developer mailing list traffic Conversations, excluding patches excluding Conversations, 1000 1500 2000 2500 500 0 Oct-03 Dec-03 Feb-04 Apr-04 Jun-04 Aug-04 Oct-04 Dec-04 Feb-05 Apr-05 Jun-05 Aug-05 Oct-05 Dec-05 Feb-06 Apr-06 Jun-06 Aug-06 Oct-06 Dec-06 xen-devel Feb-07 Apr-07 Jun-07 Aug-07
    [Show full text]
  • Sun Secure Global Desktop 4.41 Release Notes
    Sun Secure Global Desktop 4.41 Release Notes Sun Microsystems, Inc. www.sun.com Part No. 820-4905-12 August 2008, Revision 01 Submit comments about this document at: http://docs.sun.com/app/docs/form/comments Copyright 2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved. Sun Microsystems, Inc. has intellectual property rights relating to technology that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at http://www.sun.com/patents and one or more additional patents or pending patent applications in the U.S. and in other countries. This document and the product to which it pertains are distributed under licenses restricting their use, copying, distribution, and decompilation. No part of the product or of this document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and in other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, Java, JavaScript, SunSolve, JavaServer, JSP,JDK, JRE, Sun Ray, and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and in other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc.
    [Show full text]
  • Bromium Advanced Endpoint Security Protect | Detect | Respond
    Data Sheet Bromium Advanced Endpoint Security Protect | Detect | Respond At a Glance Today’s enterprises are fighting a losing battle against advanced, Bromium Advanced Endpoint Security targeted and often undetectable cyber attacks. In spite of the uses micro-virtualization and contextual, increased spend on more and more layered security solutions, real-time detection to protect across all major threat vectors and attack types. organizations are not making headway against attackers. Enterprises Enterprises can finally defeat cyber attacks and eliminate endpoint breaches. are getting breached, users’ productivity is hampered by side effects of security solutions, and IT is stuck on a treadmill of never-ending Key Business Benefits patching and remediation. PROTECT AGAINST ZERO-DAY ATTACKS Revolutionary micro-virtualization technology prevents known and Bromium® Advanced Endpoint Security next-generation endpoint protection unknown cyber attacks from offers a better way to defeat cyber that integrates endpoint threat isolation, compromising endpoints and your attacks that target the endpoint, where threat analytics and continuous host corporate network more than 70% of breaches originate. monitoring to enable organizations TRUE PREVENTION WITHOUT The first to deliver an endpoint security to protect, detect and respond to USER DISRUPTION Users can safely click on anything from solution based on virtualization, targeted attacks, zero-day threats and home, branch offices, airports and cafes— Bromium offers comprehensive attempted breaches in real time. without the need for restrictive policies DETECT ATTEMPTED BREACHES Behavioral detection techniques alert and monitor suspicious activity on the host system ELIMINATE REMEDIATION AND EMERGENCY PATCHING COSTS Bromium-protected endpoints are self-remediating because any possibility of malware persistence is eliminated.
    [Show full text]
  • Entity Framework with Microsoft Azure
    Microsoft Azure Step by Step Guide This free book is provided by courtesy of C# Corner and Mindcracker Network and its authors. Feel free to share this book with your friends and co-workers. Please do not reproduce, republish, edit or copy this book. Nitin Pandit Software Engineer, Microsoft.Net Consultant Noida C# corner Delhi Chapter Lead C# corner MVP Amit Mishra (Co-Author, Format Editor) Index Page No Chapter 1 - Getting Started With Microsoft Azure 1-17 Chapter 2 - How To Host Your Web Apps On Azure Via FileZilla 18-31 Chapter 3 - Configuring A Custom Domain Name For An Azure 32-40 Website Chapter 4 - Virtual Machine In Microsoft Azure Step by Step - Part 41-50 One Chapter 5 - Creating A Virtual Disk Virtual Machine In Microsoft 51-66 Azure Step by Step: Part Two Chapter 6 - Use of SQL Azure In Visual Studio 2015 Step By Step 67-98 Guide Chapter 7 - Entity Framework With Microsoft Azure SQL 99-113 Chapter 8 - Introducing U-SQL- Make Big Data Processing Easy 114-117 Chapter 9 - Installation Of Azure SDK And Blob Storage In Azure: 118-139 Part 1 Chapter 10 - Upload Image To Azure Blob Storage In ASP.NET: Part 140-163 2 Chapter 11 - Demo Project Azure Blob Storage With ASP.NET MVC 164-204 5.0: Part 3 Chapter 12 - Getting Started With Azure DocumentDB: Day 1 205-224 Chapter 13 - Querying In The Azure DocumentDB: Day Two 225-242 Chapter 14 - Manage Azure Mobile Services: Part One 243-259 Chapter 15 - How To Create A Mobile App In Microsoft Azure 260-277 Chapter 16 - Manage Database Settings Of Azure Mobile Services 278-281 Chapter 17
    [Show full text]
  • Improving Desktop System Security Using Compartmentalization
    Improving Desktop System Security Using Compartmentalization by Mohsen Zohrevandi A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved April 2018 by the Graduate Supervisory Committee: Rida Bazzi, Chair Gail-Joon Ahn Adam Doupé Ming Zhao ARIZONA STATE UNIVERSITY August 2018 ABSTRACT Compartmentalizing access to content, be it websites accessed in a browser or docu- ments and applications accessed outside the browser, is an established method for protect- ing information integrity [12, 19, 21, 60]. Compartmentalization solutions change the user experience, introduce performance overhead and provide varying degrees of security. Strik- ing a balance between usability and security is not an easy task. If the usability aspects are neglected or sacrificed in favor of more security, the resulting solution would have a hard time being adopted by end-users. The usability is affected by factors including (1) the gen- erality of the solution in supporting various applications, (2) the type of changes required, (3) the performance overhead introduced by the solution, and (4) how much the user expe- rience is preserved. The security is affected by factors including (1) the attack surface of the compartmentalization mechanism, and (2) the security decisions offloaded to the user. This dissertation evaluates existing solutions based on the above factors and presents two novel compartmentalization solutions that are arguably more practical than their existing counterparts. The first solution, called FlexICon, is an attractive alternative in the design space of compartmentalization solutions on the desktop. FlexICon allows for the creation of a large number of containers with small memory footprint and low disk overhead.
    [Show full text]
  • Collabkit – a Multi-User Multicast Collaboration System Based on VNC
    Humboldt-Universität zu Berlin Institut für Informatik Lehrstuhl für Rechnerorganisation und Kommunikation Diplomarbeit CollabKit – A Multi-User Multicast Collaboration System based on VNC Christian Beier 19. April 2011 Gutachter Prof. Dr. Miroslaw Malek Prof. Dr. Jens-Peter Redlich Betreuer Peter Ibach <[email protected]> Abstract Computer-supported real-time collaboration systems offer functionality to let two or more users work together at the same time, allowing them to jointly create, modify and exchange electronic documents, use applications, and share information location-independently and in real-time. For these reasons, such collaboration systems are often used in professional and academic contexts by teams of knowledge workers located in different places. But also when used as computer-supported learning environments – electronic classrooms – these systems prove useful by offering interactive multi-media teaching possibilities and allowing for location-independent collaborative learning. Commonly, computer-supported real-time collaboration systems are realised using remote desktop technology or are implemented as web applications. However, none of the examined existing commercial and academic solutions were found to support concurrent multi-user interaction in an application-independent manner. When used in low-throughput shared-medium computer networks such as WLANs or cellular networks, most of the investigated systems furthermore do not scale well with an increasing number of users, making them unsuitable for multi-user collaboration of a high number of participants in such environments. For these reasons this work focuses on the design of a collaboration system that supports concurrent multi-user interaction with standard desktop applications and is able to serve a high number of users on low-throughput shared-medium computer networks by making use of multicast data transmission.
    [Show full text]
  • Securing the Path to Windows 10 How to Achieve the Benefits of Virtualization-Based Security Without a Hardware Refresh White Paper
    White Paper Securing the Path to Windows 10 How to Achieve the Benefits of Virtualization-based Security Without a Hardware Refresh White Paper Introduction “Bromium, a Microsoft partner, For enterprises the #1 reason to upgrade to Windows 10 is delivers hardware-enforced improved security, but the critical enhancements that rely on security to today’s deployed Windows endpoints. More hardware protection will be difficult to adopt until you buy importantly, Bromium enables new PCs. Bromium, a Microsoft partner, delivers hardware- IT organizations to easily upgrade existing PCs to Windows 10 with enforced security to today’s deployed Windows endpoints. More hardware-enforced security importantly, Bromium enables IT organizations to easily upgrade that extends the in-box security existing PCs to Windows 10 with hardware-enforced security that of Windows 10, without a hardware refresh, accelerating extends the in-box security of Windows 10, without a hardware Windows 10 rollouts.” refresh, accelerating Windows 10 rollouts. Windows 10 Security Windows 10 Enterprise promises many security enhancements over Windows 7 and 8, and introduces a family of hardware-assisted security technologies in Device Guard (DG). DG helps to ensure a secure boot, whitelists kernel code and offers credential protection and biometric authentication. The most important Figure 1: Windows 10 Device Guard SECURING THE PATH TO WINDOWS 10 2 White Paper “VBS uses endpoint CPU feature is virtualization-based security (VBS) which uses Hyper-V, enhanced with virtualization to isolate and elements of micro-virtualization, to help protect the operating system using protect two critical Windows hardware virtualization. The Bromium / Microsoft partnership aims to accelerate services: Windows Code Integrity service which protects the kernel the roadmap for VBS.
    [Show full text]
  • Vmware Wants to Reign Supreme
    August/September 2010 | Vol. 3 | No. 5 VirtualizationReview.com King of Clouds VMware wants to reign supreme. + VDI Update Acronis Backup & Recovery Q&A with Amir Sharif of Parallels Thethingwithdata:ifyoudon’t getinfrontofit,you’llsoonbe buried under it. To help you keep pace with your ever-increasing amounts of data, CDW’s storage specialistscanhelpyousimplifyyourstoragesystemsfor increased flexibility and optimization. We can assist you with everything from product recommendations to designing and implementing complete storagesolutions—including multi-tiered storagecomponents,deduplicationandvirtualizationtechnology.Noneedtoworry aboutyourdata;we’llkeepyouontopof it. VMware® vSphere™ IBM® System x3650 IBM System Storage™ Enterprise Plus M3 Rack-mount Server DS5020 Acceleration Kit1 $ .99 CALL FOR PRICING Single licenses available. 4743 License for 8 processors CDW 2051288 CDW 1863874 CALL FOR PRICING CDW 1753279 Hard drives sold separately Smarterdatastoragestartshere. 800.399.4CDW | CDW.com/infrastructure 1Requiresaminimumofone-yearsupportandsubscription(SaS)atthetimeofpurchase;callyourCDWaccountmanagerfordetails.Offersubject toCDW’sstandardtermsandconditionsofsale,availableatCDW.com.©2010CDWLLC VISIT VIRTUALIZATIONREVIEW.COM contents 16 “If you look at apples to apples, we come out actually lower on cost per application. Not only do we come out lower on cost per application, we can run more applications on a given server than any of our competition.” Raghu Raghuram, General Manager and VP, Server Business Unit, VMware Inc. The ease
    [Show full text]
  • Windows Protocols and Test Suites Overview
    Windows Protocols and Test Suites Overview Althea Champagnie, Senior Program Manager Min Li, Principal Software Engineering Manager Agenda • Overview of Windows Protocols • What do the Windows protocols cover • What resources are available • Introduction to Protocols Test Suites • What test suites are available and how they work • What test cases are covered by the RDP test suites • Where to find the test suites and how to use them Overview of Windows Protocols Althea Champagnie, Senior Program Manager Microsoft Interoperability Guidelines Our goal is to ensure that third-party developers have access to the interoperability information, tools, and resources they need to successfully develop the services, products, and platforms that apply to Microsoft We love our developers! Technical Events Tools Documents Support Events • Co-sponsored industry events • SNIA Storage Development Conference • SambaXP • RDP-focused events • Presentations, I/O Labs, Meetups, and more. • A virtual RDP event is being planned for later in the year • Find more info at InteropEvents.com. What Are The • Detailed technical specifications for Microsoft protocols Protocols that are implemented and used by Windows to interoperate or communicate with other Microsoft Technical products Specs? • Descriptions of extensions to industry-standard and other published protocols that are used by Windows • Essential resource for developers doing protocol implementation work • Includes use cases • Find them at https://aka.ms/techspecs What Are The • “… illustrate how Windows
    [Show full text]
  • 2X Server Based Computing Leitfaden
    2X Server Based Computing Leitfaden Stellt Strategien zur Umsetzung von Server Basierendem Computing vor Dieser kurze Leitfaden zum Server Basierendem Computing beschreibt Wege IT Netzwerke so zu optimieren das Hardware-, Energie- und Administrationskosten gesenkt werden koennen . Alle in diesem Dokument angegebenen Informationen können ohne vorherige Ankündigung geändert werden. In Beispielen verwendete Firmen, Namen und Daten sind, sofern nicht anders angegeben, rein fiktiv. Ohne vorherige ausdrückliche und schriftliche Zustimmung von 2X Software Ltd. darf dieses Dokument weder ganz noch teilweise in irgendeiner Form, sei es elektronisch oder mechanisch, oder zu irgendeinem Zweck reproduziert oder übertragen werden. 2X ApplicationServer und 2X LoadBalancer sind von 2X Software Ltd. urheberrechtlich geschützt. ©1999- 2006 2X Software Ltd. Alle Rechte vorbehalten. 2X Server Based Computing Leitfaden 2 VORTEILE DES SERVER-BASIERTEN COMPUTING MIT 2X....................................................... 2 EINSATZ EINES EINZELNEN TERMINAL-SERVERS .................................................................... 3 EINSATZ VON ZWEI TERMINAL-SERVERN................................................................................... 4 LASTVERTEILUNG ZWISCHEN CITRIX-SERVERN....................................................................... 5 DIREKTER VERBINDUNGSMODUS ............................................................................................... 6 INSATZ EINES GATEWAYS (REGULÄRER/SSL-GATEWAY-MODUS)........................................
    [Show full text]
  • It's That Time
    December 2014 / January 2015 | Vol. 8 No. 1 VirtualizationReview.com 2015 READERS CHOICE AWARDS WINNER IT’S THAT TIME OFYEAR! Eggnog, presents and the products you like best. PLUS > VIRTUAL PREDICTIONS > DELL’S VDI STRATEGY > UNTANGLING VMWARE DRS VISIT VIRTUALIZATIONREVIEW.COM contents The objective is helping organizations accomplish their 6 goals; not to push any specifi c type of technology. By Dan Kusnetzky 2015Readers Choice Awards “Chromebook desktop ÌÌÌÌ Winner ÌÌÌÌ access looks especially promising, especially in the education market.” Garret Grajek, dinCloud 18 6 December 2014 / January 2015 | VIRTUALIZATION REVIEW | VOL. 7, NO. 2 FEATURES 11 Best Cloud Storage Product 15 Best Network 4 The 2015 Reader’s Choice 12 Best Cloud Security Product Virtualization Product Awards and Buyer’s Guide 12 Best Cloud Software Product 16 Best Virtualization Security Product You, the readers, have spoken. 13 Best Business Continuity Product Here are the virtualization and Best Converged 14 Best Virtualization 17 cloud computing products that Automation Product Infrastructure Product rock your world. Best Virtualization Training 15 Best Storage 17 6 Best Application Virtualization Product Virtualization Product 6 Best Server Virtualization Product Best Desktop Virtualization/ 7 18 2015 Virtualization Predictions COLUMNS Virtual Desktop Infrastructure Product What can you expect to happen 2 Editor’s Note: KEITH WARD in the virtualization and cloud 3 Expectations for 2015 8 Best Mobile Virtualization/ BYOD Product industries in the coming year?
    [Show full text]
  • Download Article
    Advances in Computer Science Research (ACRS), volume 54 International Conference on Computer Networks and Communication Technology (CNCT2016) Research and Implementation of RDP Proxy Proxy-based Audit System 1 2, 3 Xiao-Liang ZHANG , Xiao-Yu WU and Wu-Xia ZHANG 1,2,3 School of Computer Science and Technology North China Electric Power University Beijing, China [email protected] Keywords: RDP protocol, The agency agreement, The audit system, The operation playback, Security. Abstract. Using the Windows RDP protocol developed by Microsoft Inc to connect and operate the remote machines which base on the same system become a trend. However, the RDP has caused many security problems. It is necessary to design and implement a audit system to ensure the system’s security and guarantee the machines run correctly. It points out improper methods than before and accomplishes the RDP proxy proxy-based audit system to solve the problems. Introduction The expansion of Business Scale have a influence on the working place and implementation in the different workplaces. The operator operate the remote servers in accordance with RDP protocol. RDP provides a graphical interface to help the maintain staffs interact with the remote server system. In comparison to the former, the operations become easier and the efficiency of workers' operation become better[1]. Using the remote desktop client we can connect any server that support the remote control and can decrease the workload. Remote desktop procedure just convey the information of the user’s mouse, keyboard and other device to the remote server system and never involved in the data processing, so that the level of hardware requirements commonly.
    [Show full text]