Symantec – Data Protection Solutions

2017-07-27T00:01:11+00:00 May 26th, 2010|Uncategorized|


While small and midsize businesses don’t typically generate the same amount of data that larger enterprises do, they still need the same kind of protection to ensure the timely recovery of essential business data

A recent survey has found that while small and midsize businesses are grappling with explosive data growth, the backup processes they have in place often put that data at risk.
The survey, by Rubicon Consulting, found that 92% of companies have deployed some form of data backup technology, yet 50% of them have lost data. Of the companies that lost data, approximately one-third lost sales, 20% lost customers, and one-quarter claimed the data loss caused severe disruptions to the company.
The survey also found that concerns about potential data loss run high among SMBs. Respondents rated backup as their second-highest computing priority, after defense against viruses and other malware, and ahead of issues like reducing costs and deploying new computers. And yet nearly one-third of SMBs surveyed do nothing to back up their PCs.
This article looks at some of the top backup challenges SMBs face today and the steps they need to take to ensure that their backup practices keep pace with their data growth.

Top backup challenges

While small and midsize businesses don’t typically generate the same amount of data that larger enterprises do, they still need the same kind of protection to ensure the timely recovery of essential business data. Given their smaller budgets and lack of technical expertise compared with larger enterprises, SMBs require solutions that are both cost-effective and easy to use. A recent study by the TANEJA Group emphasized that point when it identified the top challenges SMBs face today with regard to data protection:

  • Implementing comprehensive protection with minimal impact on business operations. It is estimated that data volumes are increasing by as much as 50% per year. At the same time, the demand for higher system availability is shrinking backup windows. Together, these trends are placing greater pressure on small and midsize businesses to improve backup efficiencies and deliver prompt Microsoft Windows data and system recovery. Gone are the days when critical systems could be shut down to perform backup operations.
  • Meeting increasingly stringent backup and recovery requirements. The requirements to recover lost or corrupt data to a specific point in time and reduce the overall time to restore data are becoming more stringent and are now often measured in hours instead of days. Increasingly, tape-based backup infrastructures are unable to meet these requirements.
  • Dealing with limited backup administration resources. This is a key issue particularly with smaller companies that may not have dedicated IT staff. But even larger SMBs rarely have a dedicated backup admin. According to the TANEJA Group study, “a large percentage of critical data is generated by distributed clients, and an inability to protect this data can leave SMBs open to data loss that can have a significant impact on the business.”
  • Deploying disaster recovery strategies cost-effectively. As the Rubicon Consulting survey made clear, data protection practices aren’t where they should be for most SMBs. Too often SMBs lack the resources, administrative expertise, and off-site storage required to provide true disaster recovery capabilities. Plus, as a disturbing number of news stories has made clear, the legacy practice of backing up to tape can be fraught with risk.
  • Leveraging new technologies non-disruptively. Because SMB have significant investments in their infrastructures and processes, they are unlikely to deploy new technologies unless this can be done without disrupting day-to-day business operations.
  • Maintaining a secure backup and recovery environment. The TANEJA Group is unequivocal on this topic: “SMBs need to think about this issue in two areas: providing adequate security including encryption and virus protection, plus centralized management of an entire data protection infrastructure, ensuring backup data both in-flight and at rest is protected and efficiently managed.”

Meeting backup challenges

SMB environments may not need the scale provided by enterprise backup and recovery solutions, but they do need much of the functionality. That means policy-based backups, automated operations, and centralized management should be key design tenets to help lightly staffed SMBs effectively manage system and data protection operations. Integrated disaster recovery capabilities, meanwhile, make it easier to rapidly restore complete systems. And newer technologies such as disk-based backup, snapshot backups, data deduplication, continuous data protection, and cloud-based backup options can help SMBs address shrinking backup windows, increasingly stringent RPOs/RTOs (recovery point objectives/recovery time objectives), and recovery reliability concerns.

Backup Exec for Windows Small Business Server is Symantec’s data protection solution for Microsoft Windows Small Business Server Standard and Premium Editions. Easy to install and manage, Backup Exec for Windows Small Business Server includes many valuable features with the core license:

  • Provides continuous disk-based data protection and automated disaster recovery for Microsoft Windows Small Business Server
  • Optimizes both tape and disk storage environments
  • Provides complete data protection of physical and virtual server environments
  • Supports fast and efficient backups and granular restores, allowing administrators to restore individual Microsoft Exchange email messages, Microsoft SharePoint documents, and Microsoft Active Directory user preferences in seconds
  • Offers continuous data protection for desktops and laptops, providing point-in-time recovery
  • Allows users to easily restore their own files, saving IT administration resources
  • Ensures that all data is backed up even while files are open.

Symantec Online Storage for Backup Exec

Symantec Online Storage extends the key capabilities of Backup Exec, adding the ability to store copies of backups in secure, redundant data centers managed by Symantec. Online Storage gives businesses a secure, cost-effective option for storing backup data off-site without the inconvenience and cost of tape vaulting services or other forms of off-site tape storage.

To use Symantec Online Storage, administrators simply connect to the Symantec Protection Network portal through the Backup Exec console, create an account, and select a service plan that meets their off-site storage requirements. The cost of the service is based on total storage consumed, with pricing by storage tiers. Businesses can upgrade storage tiers as their needs grow. The cost of the service can be controlled by limiting the amount of data stored in Symantec’s data centers.


For small and midsize businesses, where money and staff time are at a premium, there is always something more pressing to do than manage backups. But as data volumes increase, so too does the risk of irrevocable harm to a company’s bottom line if that data isn’t protected. SMBs should look for solutions from a trusted provider that offer simplified management and the ability to scale as their business grows.

Symantec to Acquire VeriSign’s Security Business

2017-07-27T00:01:11+00:00 May 26th, 2010|Uncategorized|

Symantec Corp. (Nasdaq: SYMC) today announced that it has signed a definitive agreement to acquire VeriSign’s (Nasdaq: VRSN) identity and authentication business, which includes the Secure Sockets Layer (SSL) Certificate Services, the Public Key Infrastructure (PKI) Services, the VeriSign Trust Services and the VeriSign Identity Protection (VIP) Authentication Service. The combination of VeriSign’s security products, services and recognition as the most trusted brand online and Symantec’s leading security solutions and widespread distribution will enable Symantec to deliver on its vision of a world where people have simple and secure access to their information from anywhere.

“With the anonymity of the Internet and the evolving threat landscape, people and organizations are struggling to maintain confidence in the security of their interactions, information and identities online. At the same time, people’s personal and professional lives have converged and they want to use their various digital devices to access information wherever they are without jeopardizing their privacy,” said Enrique Salem, president and CEO, Symantec. “At the same time, IT is faced with the challenge of giving users the appropriate access, while ensuring that corporate data is not at risk. We believe the solution to this dilemma lies in the ubiquity of identity-based security. With the combined products and reach from Symantec and VeriSign, we are poised to drive the adoption of identity security as the means to provide simple and secure access to anything from anywhere, to prevent identity fraud and to make online experiences more user-friendly and hassle-free.”

Under the terms of the agreement, Symantec will purchase the specific assets from VeriSign, including the majority stake in VeriSign Japan, for a purchase price of approximately $1.28 billion in cash. Symantec expects the transaction to be 9 cents dilutive to non-GAAP earnings per share in fiscal year 2011, due to the purchase price accounting write down of deferred revenue, and accretive to non-GAAP earnings per share in the September 2011 quarter. The agreement is subject to customary closing conditions, including regulatory approvals, and is expected to close in the September quarter.

Enabling a New Vision of Computing
Through this acquisition, Symantec can help businesses incorporate identity security into a comprehensive framework so that IT can confidently and securely adopt new computing models, from cloud computing to social networking and mobile computing to user-owned devices, that promise operational efficiencies and freedom of choice for their employees and customers. That framework is based on five imperatives that Symantec is enabling as part of its new vision of computing and includes:

  • Identity security: proving that people and sites are who they say they are
  • Mobile and other device security: securing mobile and other devices and the information on them
  • Information protection: protecting information from loss, attack, theft and misuse and ensuring the ability to recover that information
  • Context and relevance: delivering information that is relevant to people in both their personal and professional roles
  • Cloud security: ensuring the secure delivery of applications and information from both public and private clouds

Ease-of-use, speed-of-delivery and user-driven preferences are the new imperatives in today’s workplace. People whose personal and professional lives have converged onto their digital devices increasingly expect the freedom to work from anywhere using their own devices, to use any application and to collaborate with anybody in their social network to effectively get their jobs done and simultaneously live their network-enriched lives.

IT departments struggle to meet user expectations with simple, secure and cost-effective solutions. Cloud computing can provide instantaneous scale and delivery of applications and desktops by enabling businesses to leverage services from the cloud instead of deploying applications on premise. Identity-based security gives IT the assurance that as information moves in and out of the cloud it is always protected — across any device and between the network and devices they control and those that they don’t. The user’s identity drives what information they can access and how it can be used and shared, independent of the device or application.

Creating Mutually Trusted Interactions Online

VeriSign’s SSL Certificate Services provide users with assurance that the websites they are interacting with are legitimate and secure and that their information will be safe when they share it with that site. The VeriSign check mark signifies the authenticity of the websites that users visit and assures them that any sensitive information they share with that site will be encrypted during online transactions. With more than one million web servers using VeriSign SSL certificates, and an infrastructure that processes more than two billion certificate checks daily, VeriSign has the leading share of the SSL market. The addressable market for the server and user authentication segment is estimated to reach $1.6 billion by 2013.

Symantec’s current portfolio and along with assets from VeriSign provide the depth and breadth of technologies to make identity-based security of information more universal and part of a comprehensive security solution. By combining VeriSign’s SSL Certificate Services with Symantec Critical System Protection or Protection Suite for Servers, Symantec will help organizations ensure a higher level of security on their web servers as well as verify that security, providing users with the trust and confidence necessary to do business online.

VeriSign helps organizations validate the identity of users through its VeriSign Identity Protection (VIP) user authentication service that complements the existing Identity Safe capabilities within the Norton products. The cloud-based VIP service helps organizations doing business online confirm the identities of their customers, employees and partners through user-owned digital certificates that reside on a card, token or other device such as a mobile phone, ensuring that they are giving only legitimate users access to their information. VeriSign has already issued more than two million VIP credentials to individuals and has a network of hundreds of merchants.

Through Symantec’s worldwide distribution network and footprint on more than one billion systems – including end-user devices such as laptops, desktops and smart devices, as well as servers – Symantec can facilitate the ubiquity of identity security through digital certificates for both individuals and companies. This is critical to creating mutually trusted interactions online. Merchants have added incentive to join the VIP network if user certificates are widely distributed. More merchants in the VIP network means a more secure and convenient experience for customers moving among member sites. Merchants benefit as well from knowing their customers are also trusted and secure.

Symantec can expand the VIP ecosystem by incorporating user certificates into its Norton-branded consumer products providing a channel through which consumers can easily create secure identities that can be authenticated when they do business online. In addition, the combination of the information classification capabilities of Symantec’s Data Loss Prevention solutions and Data Insight technology along with VeriSign’s identity security services, will allow us to help customers ensure that only authorized users have access to specific information.

Signifying Trust Online

The VeriSign check mark is the most recognized symbol of trust online with more than 175 million impressions every day on more than 90,000 websites in 160 countries. Symantec’s security solutions and the company’s Norton-branded suites protect more than one billion systems and users around the world. With the addition of VeriSign’s security assets, Symantec will become the leading source of trust online. Following the close of the transaction, Symantec plans to incorporate the VeriSign check mark into a new Symantec logo to convey to users that it is safe to communicate, transact commerce and exchange information online.

Integrating Dell EqualLogic SANS with Citrix XenServer

2017-07-27T00:01:11+00:00 May 21st, 2010|Uncategorized|



Server virtualization can offer strategic value to organizations in a number of arenas. By creating an abstraction layer between operating systems and physical hardware, IT administrators can consolidate server capacity, parcel out computing resources as needed, and streamline system provisioning and deployment, all while improving service levels and network security. Server virtualization also facilitates support for multiple operating systems, broadened choices among vendors and solutions, and employee empowerment across organizations, regardless of location.

In implementing virtualization solutions, however, IT managers often overlook a major opportunity: the integration of the virtualization platform and the shared storage backend. The result of this oversight: two critical components that effectively operate as discrete silos, creating new inefficiencies and increasing administrative workloads.


To address this problem, Citrix and Dell have introduced the next generation of virtualization and storage with the Citrix XenServer Adapter for Dell EqualLogic PS Series SAN arrays. Available as part of Citrix XenServer 5.0 Dell Edition, this module allows IT administrators to hand off storage virtualization operations from the server virtualization software over to the EqualLogic SAN, for effective handling and superb overall performance.

The adapter integrates EqualLogic control interfaces directly into the XenCenter Management Client, helping improve overall system performance, enabling more efficient disk utilization, and realizing more completely the benefits of storage consolidation. The integration also leverages the automated features designed into both the XenServer and the PS Series arrays, reducing administrator workloads and increasing efficiency over more conventional, stove-piped deployments. 

Through this partnered integration, Dell and Citrix offer organizations the full benefit of virtualization, including centralized storage, live migration, high availability, realtime streaming and improved management of workload and life-cycle costs.


With their ease-of-use, storage virtualization, and automation features, EqualLogic SANs provide a flexible means for managing storage resources, gracefully scaling, and reducing overall complexity, resulting in low total costs of ownership (TCO). When deployed within a XenServer environment, EqualLogic SANs can simplify the tasks and routines by which applications and data are stored and protected. Unlike other SAN platforms, the EqualLogic PS Series arrays share processor and storage resources dynamically, and perform load-balancing continuously, allowing more efficient implementation of these vital resources.

The Citrix XenServer Adapter for Dell EqualLogic capitalizes on this intelligence and goes even further, allowing simple management of these resources — storage provisioning, intelligent backup, rapid recovery, and capacity growth — live in production environments, with no application interruption or downtime. The XenServer Direct Storage Adapter enables IT administrators to perform unique EqualLogic capabilities through the Citrix XenCenter Management Client, automating the creation and assignment of dedicated storage volumes to each Virtual Machine (VM), without the manual work required by classic direct-storage mapping technologies.

As an integrated virtualization solution, XenServer and EqualLogic maintain high operating efficiency by delegating such advanced capabilities as Thin Provisioning, Fast Cloning, and Automated Snapshots to the EqualLogic SAN. Thin Provisioning helps IT administrators control costs by dedicating only the storage capacity needed in the short term, and maintaining unallocated storage in a common pool for later use by applications or user groups as disk resources are actually consumed. Fast Cloning lets storage administrators create copies of entire volumes (e.g., virtual drives or LUNs) as a background process, without disrupting network operations. Once created, clones can be used to accelerate the provisioning and deployment of standardized VMs, as well as to test new applications, configurations or procedures. Snapshots are space-efficient, point-in-time captures of storage volumes that can be created without disrupting network operations, for use in backing up or testing data.

In addition, XenServer supports iSCSI multipath I/O (MPIO) and simplified disaster recovery, two strategic tools for improving business continuity even in the event of network failures or other outages. MPIO support allows multiple networkpaths — e.g., separate subnetworks or VLANS — for both the SAN arrays and the virtualization servers, as a means of both improving performance and safeguarding against Ethernet switch failures or other network problems. Disaster recovery tools apply snapshot and fast cloning technologies to the processes of initial VM placement, the real-time movement of VMs via XenMotion, and automatic high availability.


Dell and Citrix have partnered to bring virtualization ready platforms for today’s dynamic and growing data centers. With the 64-bit open-source Xen hypervisor at its core, Citrix XenServer Dell Edition is a powerful virtualization solution that enables efficient resource consolidation, utilization, dynamic provisioning, and integrated systems management. XenServer Dell Edition has a small footprint and is optimized to run from an internal flash storage in Dell PowerEdge servers.

EqualLogic SANs deliver the benefits of consolidated networked storage in a self-managing, iSCSI storage area network that is affordable and easy to use, regardless of scale. By eliminating complex tasks and enabling fast and flexible storage provisioning, EqualLogic solutions can reduce the costs of storage acquisition and ongoing operations.

Citrix XenServer Dell Edition is certified and fully supported by Dell for select server and storage configurations. Citrix XenServer Dell Edition comes pre-installed with Dell OpenManage Server Administrator, which enables systems management right out of the box without any additional need to install an agent on the host.


What is Unified Communications?

2010-05-20T17:54:00+00:00 May 20th, 2010|Uncategorized|

Many people ask what is Unified Communications.  The answer is simple.  It is the ability to streamline communications.  The common way this is done is by integrating all or a few of the following communication tools.

  • Email
  • Calendering
  • Voicemail
  • Instant Messaging
  • Telephone Systems
  • Video and Audio Conferences and Meetings

Microsoft does a good job explaining it in the video below.

Five Reasons To Make Dell EqualLogic PS Series Your Storage Consolidation Solution

2010-05-17T16:56:29+00:00 May 17th, 2010|Uncategorized|


The PS Series’ unique peer storage architecture consolidates all storage resources into an easy-to-manage tiered pool of storage, securely accessed by servers across a standard Ethernet network. The PS Group Manager provides a single, intuitive administrative interface, accessible from anywhere on the network.


The all-inclusive feature set of the Dell EqualLogic PS Series makes advanced virtualization and data protection features available to enterprises of all sizes, without breaking the bank. Automatic system expansion, data protection, and tiering functions minimize administrative tasks even as storage needs grow over time.


Bringing additional storage online is truly seamless; additional disk and controller resources are automatically brought online without disrupting applications accessing the storage pool. Performance scales linearly as workloads are automatically load balanced, spreading data across all active disks, arrays, and interface ports. In addition, built-in thin-provisioning functionality improves flexibility and scalability, reducing administrative costs and making the Dell EqualLogic “pay-as-you-grow” strategy seamless for applications.


PS Series arrays are built for enterprise deployments, providing fully redundant, hot-pluggable system architecture that minimizes administrative tasks even as storage needs grow over time. Volumes are RAID-protected, and through advanced system and disk monitoring, faults can be quickly recognized and addressed without downtime. Low overhead snapshots and remote replication enable you to simply create a virtually unlimited number of space-efficient point-in-time copies at primary and remote sites for quick recovery from disk or backup to tape.


Dell EqualLogic PS Series supports initiators across all major operating systems. Gigabit Ethernet NICs and HBAs provide high performance, multi-path access to centralized storage assets. Boot-from-SAN and virtualized desktop capabilities allow system disks to be totally removed from distributed server and desktop assets, benefiting from the high availability and data protection features offered by the SAN.

For more information, please visit

Bandwidth Requirements for XenDesktop 4

2017-07-27T00:01:11+00:00 May 17th, 2010|Uncategorized|

Great resource for determining bandwidth requirements for XenDesktop
The following graph provides a summary of the Average Bandwidth consumed for native Citrix XenDesktop and the performance benefits gained when Citrix Branch Repeater is integrated into the Citrix XenDesktop solution. All the numbers shown below are for the respective workflows over a WAN connection of 1.5 Mbps, 80ms latency and 1% packet loss (with the exception of the HD video which required a 10Mbps connection based on the high data rate of the video).

For complete article

Source: Citrix

Wyse Xenith™ – The zero client built for Citrix

2017-07-27T00:01:11+00:00 May 17th, 2010|Uncategorized|

Meet Wyse Xenith

Zero delays, Zero management, Zero security issues – Citrix HDX.

Outfit your cloud with the fastest, easiest to manage, and most secure Citrix client we’ve ever built – and that’s saying something.

From the company that invented the category and built more zero clients than anyone.

Yes, anyone.


Zero Delays


Go from 0 to productivity faster than a Ferrari.

Wyse Xenith is ready to work in six seconds because its dynamically delivered firmware is smaller than a single digital photograph. Its efficient design is three times faster than competing devices and sports gigabit LAN and wireless-n, so it’s ready for serious tasks whether you’re wired in or not. With an industry first media decoder in hardware, Wyse Xenith will be able to deliver HD video without taxing your server, network or patience.


Zero Management


That’s right, no management. It’s a zero configuration client.

Most thin clients require you to add software, tweak settings, or configure them in some way before you can use them. Not Wyse Xenith. Just take it out of the box and connect it to your network – your Citrix XenDesktop server configures it to your preferences.

Wyse Xenith is completely configurable, yet no management software is needed. So unlike some clients, when a hot new feature is released, you won’t need to buy new ones to get it.


Zero Security Issues


It’s one less thing to worry about.

Wyse Xenith is the only dynamically configurable zero client that is virus and malware immune.

Yes, immune.

There are no Windows or Linux APIs for viruses to latch on to, so even network and memory-borne viruses can’t attack. Unlike other HDX compatible clients, Wyse Xenith needs absolutely no local firewall or anti-virus protection.


Zero Energy Use (Almost)


Save $70 a year in energy versus a PC*

Wyse Xenith draws less than 7 watts of power – in full operation.

That’s less than every PC on the planet. And no multimedia rich client on the market today uses less energy.

When you hug a tree – it might hug back.


Zero Compromise User Experience


Wyse Xenith is built for Citrix environments.

XenApp, XenDesktop, it’s what Wyse Xenith lives for.
It’s quite simply the best Citrix HDX client this side of Win32.
With HDX support that goes beyond any non-windows device on the market today.

The desktop just got a lot easier.


Processor: VIA 1GHz
Chipset: VIA VX855
Memory: 128MB Flash / 512MB RAM DDR2
I/O peripheral support: One DVI-I port, DVI to VGA (DB-15) adapter included
Dual-video Support with optional DVI-I to DVI-D plus VGA-monitor splitter cable (sold separately)
Four USB 2.0 ports (2 on front, 2 on back)
Two PS/2 ports
One Mic In
One Line Out
Enhanced PS/2 Keyboard with Windows Keys (104 keys)
PS/2 Optical mouse included
Networking: 10/100/1000 Base-T Gigabit Ethernet
Internal 802.11 b/g/n (optional) eliminates theft of external wireless adapters
Display: VESA monitor support with Display Data Control (DDC) for automatic setting of resolution and refresh rate
Dual monitor supported
Single: 1920×1200@60Hz, Color depth: 8, 15, 16, 24 or 32bpp,
Two independent full resolution frame buffers
Dual: 1920×1200@60Hz, Color Depth: 8, 15, 16, 24 or 32bpp
Audio: Output: 1/8-inch mini jack, full 16 bit stereo, 48KHz sample rate
Input: 1/8-inch mini jack, 8 bit stereo microphone
Physical characteristics: Height: 1.38 inches (34mm)
Width: 6.94 inches (177mm)
Depth: 4.75 inches (121mm)
Shipping Weight: 6 lbs. (2.7kg)
Mountings: Horizontal feet (optional vertical stand)
Optional VESA mounting bracket
Device Security: Built-in Kensington security slot (cable sold separately)
Power: Worldwide auto-sensing 100-240 VAC, 50/60 Hz. Energy Star V.5.0 compliant power supply
Average power usage with device connected to 1 keyboard with 1 PS/2 mouse and 1 monitor: Under 7 Watts
Temperature Range: Horizontal and Vertical positions: 50° to 104° F (10° to 40° C)
Humidity: 20% to 80% condensing
10% to 95% non-condensing
Safety Certifications: German EKI-ITB 2000, ISO 9241-3/-8
cULus 60950, TÜV-GS, EN 60950
FCC Class B, CE, VCCI, C-Tick
WEEE, RoHS Compliant
Warranty: Three-year hardware warranty

Wyse Announces the First Zero Footprint Software Engine for Cloud Client Computing

2017-07-27T00:01:11+00:00 May 12th, 2010|Uncategorized|

Today at Citrix Synergy 2010, the conference where virtualization, networking and cloud computing meet, Wyse Technology revealed the Wyse Zero™ engine. Wyse Zero™ is software that simplifies the development of cloud connected devices. Wyse Zero™, which connects users to cloud computing services and virtual desktops with efficient communications and protocol technology, is already in use in millions of devices, including thin clients, handheld smart devices, and zero clients. Specifically, the Wyse Zero™ engine is currently powering all devices that are utilizing Wyse ThinOS, all implementations of Wyse PocketCloud and — as of today — all Wyse Xenith™ devices.

“Wyse Zero™ addresses the limitations with current embedded options and is already powering the next generation of smart devices connecting to the cloud to provide virtual desktop access.”
.For current users of Wyse ThinOS, the highly optimized, management-free solution for Citrix XenApp, Citrix XenDesktop, Microsoft Terminal Server and VMware View virtual desktop environments, Wyse Zero™ ensures that every Wyse thin client delivers flexible and secure user access, boots-up in seconds, updates itself automatically, and delivers IT managers with simple, scalable administration to suit their organization’s needs; all while featuring an unpublished API that delivers built-in protection from viruses and malware.

For the thousands of users of Wyse PocketCloud on Apple’s iPhone, iPad and iPod touch, Wyse Zero™ functionality expands the end user browsing capability to include Adobe Flash support, for example, by intelligently using cloud resources.

Announced today in conjunction with Citrix Synergy 2010, Wyse Xenith™ will also capitalize on the Wyse Zero™ engine. This technology foundation completely eliminates the management and security issues associated with traditional clients, while ensuring a high-definition HDX user experience. More information on Wyse Xenith™ is available at

“For cloud computing to continue to take hold in the enterprise, OEMs require a software ingredient that simplifies the development of cloud connected devices; one with a lightweight footprint that can perform at the speed of business,” according to Curt Schwebke, Chief Technical Officer at Wyse. “Wyse Zero™ addresses the limitations with current embedded options and is already powering the next generation of smart devices connecting to the cloud to provide virtual desktop access.”

The Wyse Zero™ engine delivers several benefits:

•Rich – includes networking, management, and protocol technology
•Fast – does not require an underlying operating system, starts instantly, and provides a fast user experience
•Secure – no attack surface, so no vulnerability to virus and malware threats
•Green – lowest carbon footprint, energy efficient
About Wyse Technology

Wyse Technology is the global leader in cloud client computing, leveraging its industry-leading thin and zero client computing-based desktop virtualization software, hardware and services. Cloud Client Computing is the ultimate client computing solution for our time. It replaces the outdated computing model of the unsecure, unreliable, un-green and expensive PC. It delivers the security, reliability, user experience with the lowest energy usage and total cost of ownership. It simply connects all the dots: Thin and zero client computing, unified communications, desktop virtualization and the web for users to reach the clouds – in a private, public, government or hybrid cloud. It is software. It is hardware. It is services. It is in business. It is at home. It is on the go. It is freedom – so users can focus on what is important. Wyse partners with industry-leading IT vendors, including, Cisco, Citrix, CSC, IBM, Microsoft, and VMware. Wyse also partners with globally-recognized distribution and service partners along with its award-winning partner programs to service any customer, anywhere and anytime, in the world. Wyse is headquartered in San Jose, California, U.S.A., with offices worldwide.

Source: Wyse via BusinessWire

Microsoft’s System Center Essentials 2010

2017-07-27T00:01:11+00:00 May 12th, 2010|Uncategorized|

Microsoft System Center Essentials 2010 will be Microsoft’s second release of an IT systems management product specifically designed for the midsized business. Based heavily on customer feedback, Essentials 2010 will offer integration of physical and virtual server management and monitoring into one product and one console. Essentials 2010:

  • Provide a unified solution with a single console for managing a broad range of tasks across your servers (virtual and physical), clients, hardware, software and IT services for a unified experience.
  • Enables you to proactively manage your IT environment, helping keep your system up-to-date with a solution that accelerates problem resolution and enables automation of system updates and data collection.
  • Is easier to deploy and maintain helping simplify complex management tasks for increased IT efficiency.

The following screen shows the Essentials 2010 console.

New Investments for Essentials 2010

Unified Experience

  • Integration of virtualization management, including live migration
  • Automated computer grouping
  • Server management limit increased to 50

Proactive Management

  • Automated management of updates and installation deadlines
  • Improved software distribution targeting
  • Dynamic importation of monitoring management packs

Increased Efficiency

  • Quick provisioning of new virtual machines
  • Easy server conversions from physical to virtual
  • Intelligent placement of virtual workloads

Load More Posts