Carrera Systems has introduced an enhanced client-side desktop virtualisation option, called MokaFive.
Client-side virtual desktop infrastructure (VDI) not only confers the benefits of VDI at much lower cost than server-based options, but also provides a practical security solution to the growing BYOD and mobility trends, says Hermann Sluiter, director of product development at Carrera Systems.
While server-based VDI runs images from central servers connected to desktops via a remote desktop protocol, client-based VDI allows for central management, but executes on the local device itself. The benefits of centralised control associated with VDI are retained, but at lower cost and with greater flexibility.
"Rather than paying for massive banks of high-powered servers - along with their associated power consumption, HVAC, etc - you can purchase commodity servers with commodity endpoints to deliver a far more flexible and powerful solution," says Sluiter. "MokaFive has been a pioneer in this approach and our clients have experienced up to 45% reduction in infrastructure TCO, 60% reduction in support costs, 90% reduction in server costs vs VDI, and 100% reduction in end-user PC procurement costs."
The benefits of client-side virtualisation extend beyond the cost factor, adds Sluiter. The system allows for offline access, unlike server-based VDI, while the centralised control enabled by the system lessens the complexity of a distributed infrastructure. "MokaFive supports layering, which gives us the ability to easily customise these workspaces depending on specific users, organisations or locations."
Client-based VDI is a response to growing trends in virtualisation, he notes. "The key areas that are driving MokaFive development are corporate mobility, distributed workforce enablement, new compliance requirements, simplified endpoint management and cloud-based document sharing/storage security."
The security concerns associated with BYOD are addressed by client-side VDI, says Sluiter. "Because MokaFive creates an encrypted connection to the enterprise via a containerised workspace, these can be installed on any device (individually owned or corporate) and enable fully secure and compliant access to corporate data and applications. Most importantly, they are completely isolated from the underlying host," he concludes. "Data cannot be passed from the container to the host, and vice versa. In addition, malware cannot be passed from the host to the container, preventing unauthorised intrusions, infections or data leaks."
Share