protecting the desktop with novell zenworks application virtualization
Post on 17-Jun-2015
1.273 Views
Preview:
DESCRIPTION
TRANSCRIPT
Protecting the Desktop with Novell® ZENworks® Application Virtualization
Ross ChevalierCTO Americas, President Novell Canada Novell, Inc/rchevalier@novell.ca
Ron van HerkTechnical Sales Specialist Novell, Inc/rvanherk@novell.com
© Novell, Inc. All rights reserved.2
Agenda
• What is Application Virtualization• How does it compare with Virtual Desktop• Why start with Novell® ZENworks® Application
Virtualization (ZAV)• Use Cases• ZAV Features• Demonstration
Application Virtualization
© Novell, Inc. All rights reserved.4
Why Virtualize?
Reduce helpdesk support calls
Agility
What to do with Conflicting Applications
Provide applications to students
Fast delivery of
applications
Keep desktop manageable
Security
© Novell, Inc. All rights reserved.55
Operating System
Host Hardware
VirtualApplication
VirtualApplication
VirtualApplication
Application Virtualization
• Isolates Windows applications from the underlying operating system.
• Virtual applications are not installed.
• Do not change the host OS or registry
© Novell, Inc. All rights reserved.6
The Reality of Today's Desktop
Security ToolsManagement Tools
User ProfileHardware Drivers
Windows OS
Physical Hardware
DLL “Hell”
E-mail clients Office Suites
Browser Plugins Run Times
Web Browsers Doc. Readers
Applications
• Single hard drive unnecessarily large
• Single partition i.e.: C: drive only• Operating System• Hardware manufacturer drivers• User's profile• Business installed applications• Business data• Personal installed applications• Personal data• Security tools for desktop
protection• Management tools for desktop
configuration
© Novell, Inc. All rights reserved.7
Application VirtualizationVirtualize applications – Desktop on a Stick
• Applications run in isolated environments (Sandboxes)
• Sandbox sharing• Patch applications using sandbox
merge• Allows multiple applications to run
at same time• Incompatible apps• Efficiencies• Streaming The ROI Factor
•60% savings on application testing, packaging and support •5-7% saving of overall application management
Source: Gartner April 2008, ID#G00155897
Physical Hardware
Office
2003
Office
2007
Client
InternetExplorer 6
Brow
serPlugins
Security ToolsManagement ToolsHardware Drivers
Windows OS
Peace and Harmony
ZENworks® Virtualized Apps
© Novell, Inc. All rights reserved.8
ZENworks® Application Virtualization
• Quickly creates a new, easy to deploy application• Zero setup on the host PC• No user training or user experience change• Launch applications on locked-down desktops• Applications run isolated from host OS and registry• Run conflicting applications• Custom templates and 70+ certified applications• Embed file system, registry, services and components
like .Net, Java Runtime and Adobe Reader
© Novell, Inc. All rights reserved.9
ZENworks® Application Virtualization(cont.)
Fast Zero to Virtual Applications in 20 Minutes!
Simple No extra client or server architecture to manage
Compatible Sidestep software conflicts
In many cases, application virtualization is faster, more flexibility, and has economic advantages over other virtualization approaches.
The Bottom Line
© Novell, Inc. All rights reserved.10
Application Isolation
VirtualRegistry
Virtual File System
File system reads and writes
Process and threading operations
Registry reads and writes
Host Operating SystemVirtual Application Compressed Executable
ZENworks® Virtual Operating System Kernel
Application
Host FileSystem
Host Registry
Audience Question : What value do you see here?
© Novell, Inc. All rights reserved.11
How Is Application Virtualization Different from Software Packaging?
• Traditional software packaging allows you to re-package software installers into MSI format so that the software can be installed via MSI on the local machine
• Application virtualization packages the software in a format that can be natively executed on a Windows workstation, without any installation taking place
• This means that no changes occur to the Window's registry or to the normal file system
– Changes are written to a sandbox that the administrator controls
11
© Novell, Inc. All rights reserved.12
Virtual Desktop
• Virtual Desktop is the process by which a complete desktop instance including OS, applications, device connectivity is delivered either by stream or preinstall
• Uses a very different licensing model• Requires significant bandwidth on deployment and
consistently if streaming• Can exist as a runtime or network only service• A very large project with multiple constituencies
12
© Novell, Inc. All rights reserved.13
Protecting the Desktop Case 1Incompatible Applications
• You need to deploy multiple versions of the same application• You cannot install multiple versions of the same application
because it will break the registry and the desktop environment
• Eg 1. Internet Explorer– Windows XP SP3 or Windows 7 have IE 8– You require IE6 for a specific web application
• Eg 2. Microsoft Access– App built in Access 2000, but Office Professional 2007 is
the default OA application suite• Solution – Build EXE or MSI installs for packaged apps
© Novell, Inc. All rights reserved.14
Protecting the Desktop Case 2Version Upgrade Testing
• You are standardized on Office 2007 but will receive via Software Assurance Office 2010 in June
• The two do not peacefully coexist• You need to test Office 2010 without removing Office
2007• You need to do this testing on multiple versions of
Windows both 32 bit and 64 bit• Solution – Build a 32 Bit and a 64 Bit version of Office
2010 and test as EXEs – no modification to the existing installations
© Novell, Inc. All rights reserved.15
Protecting the Desktop Case 3
• A Line of Business decision forces demand for immediate deployment of a new application suite that has to integrate with existing associations
• You don't have the time or the resources to do full stress and recursion testing before you have to roll out
• All the money for testing went to user training• Solution – Runtime EXE App using Xreg to do local
association
15
© Novell, Inc. All rights reserved.1616
What's In ZAV Today and Tomorrow
• Windows 7 support• Internet Explorer 6 emulation mode and coexistence with Internet Explorer 7/8• Application expiration
– Application can be configured to run for a specific number of days, or to expire on a specific date
– Expiration dialog can be configured• New Functions
– This option may be used to prevent interaction between virtualized and non-virtualized versions of the same application
– The startup executable optimization option attempts to launch the startup executable within the initial virtual machine
• Improved included Runtimes– Added SQL Server 2005 Express– Improved .Net 3.5 Client Profile process.
© Novell, Inc. All rights reserved.17
What's In ZAV Today and Tomorrow(cont.)
• Publish to USB– Registers applications automatically on attachment– Unregisters applications upon removal– Converts Sandbox to USB drive
• XREG– Tool that allows you to easily “register” a virtual application with the host– Automatically configures the file associations and shortcuts on the host– Can be used to “register” multiple virtual applications with a shared
sandbox– Can also be used to unregister applications and clear the sandbox
© Novell, Inc. All rights reserved.18
What's In ZAV Today and Tomorrow(cont.)
• 64 Bit Support– Exactly what it sounds like
• Streaming– Instead of pushing the package out to the desktop, you want to
stream the V-App from a central location– Bandwidth is available to support this
18
Demonstration
© Novell, Inc. All rights reserved.20
What You'll See
• Internet Explorer 6 and Internet Explorer 8 Co-existing• Two independent Office suites that would normally kill
each other, running at the same time• How to build Firefox as a Virtual Application including
custom home page• And... MAYBE a streamed app, if the code is ready in
time for us to build one (or more accurately if the code is ready in time for RON to build one)
Questions and AnswersDiscussion
Unpublished Work of Novell, Inc. All Rights Reserved.This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.
top related