Archives

VMware Workspace ONE

Switching from ACC to VMware IDM Connector made easy!

If you have been integrating VMware IDM with Active Directory using AirWatch Cloud Connector (ACC), and need to switch to IDM connector to take advantage of various features such as MFA integration, Horizon & Citrix desktops/apps integration and others, then we have made it easier to switch without having to reconfigure application entitlements.

If you have been holding off from deploying the IDM connector because you don’t havevSphere license to deploy the virtual appliance, then there’s good news. IDM connector is now available on the Windows platform and integrated with the ACC installer. Read this blog post for details.

Using ACC Switch to Using IDM connector

Readdetailed description below on how to make this switchby Vishal Gupta, Product Managerwho drove this feature.

How to switch?

We believe switching should as easy as flipping a switch!

And that is why we have introduced an easy step-by-step few click process to switch from ACC to IDM connector. New &#rsquo;Convert&#rdquo; feature will eliminate significant downtime.

Watch this video for step-by-step how-to instructions.

After the conversion is complete ensure to disablethe sync settings from AirWatch console.

The post Switching from ACC to VMware IDM Connector made easy! appeared first on VMware End-User Computing Blog.

Read more..

Switching from ACC to VMware IDM Connector made easy!

If you have been integrating VMware IDM with Active Directory using AirWatch Cloud Connector (ACC), and need to switch to IDM connector to take advantage of various features such as MFA integration, Horizon & Citrix desktops/apps integration and others, then we have made it easier to switch without having to reconfigure application entitlements.

If you have been holding off from deploying the IDM connector because you don’t havevSphere license to deploy the virtual appliance, then there’s good news. IDM connector is now available on the Windows platform and integrated with the ACC installer. Read this blog post for details.

Using ACC Switch to Using IDM connector

Readdetailed description below on how to make this switchby Vishal Gupta, Product Managerwho drove this feature.

How to switch?

We believe switching should as easy as flipping a switch!

And that is why we have introduced an easy step-by-step few click process to switch from ACC to IDM connector. New &#rsquo;Convert&#rdquo; feature will eliminate significant downtime.

Watch this video for step-by-step how-to instructions.

After the conversion is complete ensure to disablethe sync settings from AirWatch console.

The post Switching from ACC to VMware IDM Connector made easy! appeared first on VMware End-User Computing Blog.

Read more..

Introducing VMware Enterprise Systems Connector

You asked for it, and we delivered. Happy to announce availability ofVMware Enterprise Systems Connector (VESC), a unified installer to install bothVMware IDM connector and AirWatch Cloud Connector (ACC)on the Windows platform starting with AirWatch 9.1 release. You can download the VESC installer from the AirWatch console.

Here’s detailed description onVMware Enterprise Systems Connector by Andrew Hornsby, Product Manager responsible for this component.

Overview

In AirWatch 9.1, the AirWatch Cloud Connector (ACC) and VMware Identity Manager connector have been included as components in a new Windows installer called the VMware Enterprise Systems Connector. During the installation process, you will be able to choose which components to install, as shown below.

With the VMware Identity Manager connector now available on Windows, vSphere license and an additional server are no longer required to connect your identity manager tenant to your on-premises enterprise systems like Active Directory. Prior to the release of the VMware Enterprise Systems connector, the identity manager component was only available as a Linux virtual appliance.

Both components are recommended for anyone upgrading to Workspace ONE, and are necessary for environments utilizing identity centric features not supported by the &#rsquo;use AirWatch to authenticate users&#rdquo; option in the Workspace ONE Getting Started Wizard. These use cases include Horizon and Citrix integration, RSA Secure ID integration, Integrated Windows authentication, and complex multi-domain and multi-forest Active Directory. The &#rsquo;use AirWatch for authentication&#rdquo; option, sometimes referred to as VMware Identity Manager &#rsquo;ACC integration&#rdquo; is still supported, but we encourage utilization of the full functionality of the Enterprise Systems Connector for the best compatibility and user experience. If you have already deployed and are utilizing Workspace ONE, but now want to start using the identity component of the VMware Enterprise Systems connector, you will be able to migrate without removing your directory or user entitlements.

Deployment Model:

Both the VMware IDM Connector and ACC components offer outbound only connections to their respective services. They can also coexist on the same Windows server, allowing you to effectively upgrade your existing ACC instances to the full VMware Enterprise Systems Connector. The resulting deployment model is shown below.

Automatic Upgrades:

As long as .NET 4.6.2 has been installed on the server, automatic update for existing ACC deployments will continue without any change in existing functionality. However, if you wish to install the VMware IDM Connector component offered by the VMware Enterprise Systems Connector, you must download and run the installer. Automatic update is not yet supported for the VMware IDM Connector, so it must be manually updated by downloading and running the installer for each new version.

Availability:

VMware Enterprise Systems Connector is available with AirWatch 9.1. The installer is available in the AirWatch Console in Enterprise Integration settings, the same location where the ACC Installer was previously available, as well as within the Workspace ONE Getting Started wizard.

Documentation:

With the release of AirWatch 9.1, existing ACC documentation is updated to reflect the updated branding and additional component installation and configuration. This documentation is available on myAirWatch here.

The post Introducing VMware Enterprise Systems Connector appeared first on VMware End-User Computing Blog.

Read more..

Welcome to VMware: A New Hire’s True Story of Lost Luggage, Bug Registers & Workspace ONE

My first week at VMware was daunting: flying from Ireland to our head office in Palo Alto, losing my luggage and credit cards not working. On my first day, I ran around like a headless chicken trying to meet with my new team with nothing but worn clothes and trainers. In all, it was an absolute nightmare. Sometimes life throws lemons at you with such energy that it&#rsquo;s hard to do anything useful.

Arriving &#rsquo;relatively&#rdquo; on time for my first day, my next hurdle was onboarding with VMware IT. Having worked in the field for the last decade and consulting with many customers, I know first-hand just how unproductive and frustrating first days can be. Despite being eager to please and trying to hit the ground running, most workers find that IT is not ready for them. With all the personal panic that morning, the last thing I wanted to do was perform the ever-familiar &#rsquo;first day&#rdquo; dance that us consultants are all too familiar with.

You probably will not be surprised that at VMware, we drink our own Champaign when it comes to end-user computing (EUC) technologies. For the first time, I experienced VMware Workspace ONE as a user, and I was productive within minutes. In only a few clicks, my phone, personal iPad and work laptop were registered and enabled with Single Sign-On (SSO) to company email, data, Office 365, apps and intranet. I quickly checked my work email and took a few notes in Microsoft OneNote. By lunch, I reviewed roadmaps and bug registers. By the end of the day, I was sending IMs and scheduling follow-up meetings with my new colleagues (who are awesome, by the way).

Workspace ONE gave me a single identity and a familiar look and feel. Moreover, I had every single resource I needed in one place on every device (both corporate and BYO)—securely and efficiently. I did not have 20 passwords to remember or lists of internal URLs bookmarked on my local device. I was cloud-enabled and ready to charge. As a consultant and customer in my past life, this onboarding process is everything my customers asked me for. It amazed me to see it working so fluidly at VMware. My first day in VMware was a mess of personal stress and pressure, but for once, not because of IT or my employer.

[Related: Simplifying App Access & Management with Workspace ONE]

As I am a remote worker and global business traveller, Workspace ONE continues to bridge the gap to my corporate network, allowing me true freedom to stay productive &#rsquo;anywhere on any device.&#rdquo; Historically, I am cynical of this claim, having walked this walk before with other vendors and having my hands burnt. Workspace ONE finally showed me this can be achieved today. I can tell you first hand that it can be done, and Workspace ONE can help you achieve it—today.

We welcome our competitors focus on this market. It really validates what we achieved with our digital workspace vision and Workspace ONE. We will welcome them with open arms to the market when they execute on this vision. In the meantime, Workspace ONE will continue to innovate and deliver a unified workspace for you and your workers—today.

Learn more about Workspace ONE here, and see it for yourself in our free hands-on lab.

Because you liked this blog:

  • What Does a Digital Workspace Mean to You?
  • Better Together: Workspace ONE & Office 365
  • New Research: Top 10 Identity & Access Management Challenges

The post Welcome to VMware: A New Hire&#rsquo;s True Story of Lost Luggage, Bug Registers & Workspace ONE appeared first on VMware End-User Computing Blog.

Read more..

Memorial Healthcare Protects Patient Data with a Secure Digital Clinical Workspace

Memorial Healthcare, a top-rated community hospital in Michigan that&#rsquo;s won awards for patient engagement, sees technology as a key to advancing healthcare in its region. Their secure clinical digital workspace allows staff to access the apps and data they need anytime, anywhere. To transform security and protect patient data, Memorial Healthcare deployed VMware NSX, AirWatch and Horizon to secure endpoints and app infrastructure, while streamlining compliance.

Technology ultimately supports the hospital&#rsquo;s mission of helping patients in its region. To aid smaller hospitals that are critical to the area, Memorial Healthcare uses its infrastructure to provide easier access to shared services, including disaster recovery. Having access to secure information on mobile devices and virtual desktops let physicians and staff keep a consistent workflow no matter where they are, in the hospital or in the wider community.

Click here to learn more about how you can empower the digital workspace, such as the secure clinical digital workspace for healthcare, in your company.

More stories you might like:

  • American Red Cross Uses VDI for Faster Disaster Relief
  • Explore Sally Beauty’s Innovative Digital Workspace
  • 3BD/2BA with Security & Simplicity: TCAD Streamlines with Digital Workspace Solutions

The post Memorial Healthcare Protects Patient Data with a Secure Digital Clinical Workspace appeared first on VMware End-User Computing Blog.

Read more..

This Week’s Top EUC News Will Blow Your Mind

Never miss an announcement. Get top end-user computing (EUC) news in your inbox every Friday. Sign up to the right.

&#rsquo;Microsoft Azure users now have access to genuine desktop as a service solution.&#rdquo;

That&#rsquo;s SiliconANGLE on our huge news this week: We&#rsquo;re delivering VMware Horizon Cloud on Microsoft Azure. By connecting Azure to the Horizon Cloud control plane, our joint customers are empowered with more flexibility to deliver virtual desktops and apps. Get the FAQs here.

&#rsquo;Our customers have their preference of public cloud offerings and should be able to choose the industry leader in desktop and app virtualization regardless of that cloud preference.&#rdquo;
—Dave Grant, VP of Product Marketing for VMware End-User Computing, at VMware Radius

Plus, using Horizon Cloud with on-premises infrastructure? Here&#rsquo;s what&#rsquo;s new for you.

The digital workspace just upped its IQ.

VMware also announced the acquisition of Apteligent this week and the integration of the mobile app intelligence solution into our digital workspace platform. Read the juicy details here.

&#rsquo;The Apteligent platform enables both mobile app developers and IT organizations to analyze mobile application performance in real time, enabling them to understand user behavior to address the issues that matter the most—and directly impact business and revenue.&#rdquo;
—Sumit Dhawan, VMware EUC SVP & GM of Desktop Products & Solutions

Forget stereotypes. We&#rsquo;re all Generation Digital.

Millennials aren&#rsquo;t the only generation demanding mobile technology at work. Employees of all ages recently said mobile tech makes them more productive (60%), more creative (45%) and more satisfied at work (53%). Read more in this new VMware Radius series.

It&#rsquo;s a &#rsquo;privilege&#rdquo; to meet you, VMware User Environment Manager 9.2.

User Environment Manager (UEM) essentially separates a user&#rsquo;s personality from the underlying Windows machine, said Andy Morris, virtualizing their preferences. Version 9.2 offers a cool new trick: User privilege elevation. Here&#rsquo;s what it does.

Plus, watch these six videos for a technical deep dive into UEM 9.2.

And IT lived happily ever after.

User satisfaction is up, and costs are down at Memorial Healthcare after the hospital deployed VMware NSX, VMware AirWatch and Horizon. Hear their digital clinical workspace story.

&#rsquo;I don&#rsquo;t think there&#rsquo;s much within our infrastructure that VMware hasn&#rsquo;t enabled.&#rdquo;
—Thomas Kurtz, Ph. D, VP of Information Services & CIO for Memorial Healthcare

Let&#rsquo;s talk tech.

  • Citrix Synergy, May 23–25 in Orlando (VMware booth 309)
  • VMware SociaLabs—Horizon 7 & AirWatch, May 23 (San Diego), June 6 (Reston) & June 20 (Halifax)
  • Boston Summer VMUG UserCon, June 1
  • Unlocking Mobility with Derived Credentials &AirWatch, June 23 online
  • VMworld 2017, Aug. 27–31 in Vegas

The post This Week&#rsquo;s Top EUC News Will Blow Your Mind appeared first on VMware End-User Computing Blog.

Read more..

WannaCry : comment une entreprise peut-elle se protéger d’une cyber-attaque ?

Article proposé par nos experts Stéphane Padique & Ghaleb Zekri

Appareils connectés détournés, ville de Dallas piratée, cyber-attaques contre Yahoo et aujourd&#rsquo;hui Ransonware &#lsquo;WannaCry&#rsquo;… les cyberattaques n&#rsquo;en finissent plus de défrayer la chronique.

Voici 3 étapes clés que les entreprises devraient suivre pour se prémunir de ces menaces aux effets parfois dévastateurs:

1) Avant l&#rsquo;attaque : la prévention

Il est important que les entreprises mettent en place une infrastructure informatique préparée à recevoir ce type d&#rsquo;attaque et puisse prendre le contrôle de la partie contaminée rapidement.

Les directeurs informatiques doivent ainsi changer l&#rsquo;approche qu&#rsquo;ils ont de la sécurité en adoptant une sécurité en couches englobant l&#rsquo;utilisateur, le terminal, les applications, les données et le réseau.

Ils doivent très rapidement être capables d&#rsquo;identifier les éléments faibles qui nécessitent un renforcement de la protection en appliquant les mises à jour nécessaires ou, en cas d&#rsquo;indisponibilité de cette mise à jour, d&#rsquo;élever le niveau de filtrage pour ces éléments.

2) Au moment de l&#rsquo;attaque : l&#rsquo;isolation

Il est aujourd&#rsquo;hui technologiquement possible de mettre en quarantaine le serveur ou toute autre partie de l&#rsquo;informatique contaminée automatiquement et instantanément sans intervention humaine et sans revoir l&#rsquo;architecture en place du système d&#rsquo;information (VMware NSX). Cela permet d&#rsquo;isoler l&#rsquo;élément contaminé et d&#rsquo;éviter la propagation latérale de la menace qui pourrait, à l&#rsquo;image de la grippe, devenir très virale selon les cas.

En parallèle, le département informatique devra aussi rapidement déplacer l&#rsquo;environnement utilisateur infecté pour en créer un nouveau, sain, ce qui nous amène à l&#rsquo;étape 3.

3) Après l&#rsquo;attaque : la remise en état

Il est essentiel pour les entreprises de réinstaller à distance le système dans son état d&#rsquo;avant attaque et d&#rsquo;effectuer toutes les mises à jour nécessaires.

L&#rsquo;utilisateur retrouvera ainsi son environnement de travail ainsi que ses données décryptées sans avoir cédé à la demande de rançon du pirate.

Il faudra évidemment penser à décontaminer les éléments qui avaient été précédemment isolés.

Si nous prenons le scénario d&#rsquo;une grande entreprise sous attaque avec 10 000 postes infectés utilisant VMware NSX et VMware Workspace One:

  1. Le virus est détecté dans l&#rsquo;entreprise, les administrateurs système bloquent les postes de travail du site infectés avec VMware NSX et protègent les serveurs d&#rsquo;applications
  2. Les administrateurs poste de travail activent les image VDI WS1 et rendent disponibles 2000 environnements de travail instantanément dans le Software-Defined Data Center (SDDC) pour les sous-traitants et fonctions vitales de l&#rsquo;entreprise.
  3. En parallèle chaque utilisateur parmi « les autres 8 000 » reçoit dans son Smartphone avec VMware Workspace One un email de notification d&#rsquo;accès à ses applications métiers en mobilité et sur des postes de travail Home office et BYOD. Les applications sont ajoutées par les administrateurs au profil des utilisateurs instantanément sans passage sur aucun poste.
  4. Les administrateurs entament un retour automatique en conformité des postes de travail.
  5. Tout rentre dans l&#rsquo;ordre sans interruption de services côté utilisateur et Datacenter.

Pour aller plus loin, regardez cette vidéo sur comment stopper une attaque grâce à la micro-segmentation avec VMware NSX :

Vous pouvez aussi lire notre blog post « Use a Zero Trust Approach to Protect Against WannaCry »

Read more..

WannaCry : comment une entreprise peut-elle se protéger d’une cyber-attaque ?

Article proposé par nos experts Stéphane Padique & Ghaleb Zekri

Appareils connectés détournés, ville de Dallas piratée, cyber-attaques contre Yahoo et aujourd&#rsquo;hui Ransonware &#lsquo;WannaCry&#rsquo;… les cyberattaques n&#rsquo;en finissent plus de défrayer la chronique.

Voici 3 étapes clés que les entreprises devraient suivre pour se prémunir de ces menaces aux effets parfois dévastateurs:

1) Avant l&#rsquo;attaque : la prévention

Il est important que les entreprises mettent en place une infrastructure informatique préparée à recevoir ce type d&#rsquo;attaque et puisse prendre le contrôle de la partie contaminée rapidement.

Les directeurs informatiques doivent ainsi changer l&#rsquo;approche qu&#rsquo;ils ont de la sécurité en adoptant une sécurité en couches englobant l&#rsquo;utilisateur, le terminal, les applications, les données et le réseau.

Ils doivent très rapidement être capables d&#rsquo;identifier les éléments faibles qui nécessitent un renforcement de la protection en appliquant les mises à jour nécessaires ou, en cas d&#rsquo;indisponibilité de cette mise à jour, d&#rsquo;élever le niveau de filtrage pour ces éléments.

2) Au moment de l&#rsquo;attaque : l&#rsquo;isolation

Il est aujourd&#rsquo;hui technologiquement possible de mettre en quarantaine le serveur ou toute autre partie de l&#rsquo;informatique contaminée automatiquement et instantanément sans intervention humaine et sans revoir l&#rsquo;architecture en place du système d&#rsquo;information (VMware NSX). Cela permet d&#rsquo;isoler l&#rsquo;élément contaminé et d&#rsquo;éviter la propagation latérale de la menace qui pourrait, à l&#rsquo;image de la grippe, devenir très virale selon les cas.

En parallèle, le département informatique devra aussi rapidement déplacer l&#rsquo;environnement utilisateur infecté pour en créer un nouveau, sain, ce qui nous amène à l&#rsquo;étape 3.

3) Après l&#rsquo;attaque : la remise en état

Il est essentiel pour les entreprises de réinstaller à distance le système dans son état d&#rsquo;avant attaque et d&#rsquo;effectuer toutes les mises à jour nécessaires.

L&#rsquo;utilisateur retrouvera ainsi son environnement de travail ainsi que ses données décryptées sans avoir cédé à la demande de rançon du pirate.

Il faudra évidemment penser à décontaminer les éléments qui avaient été précédemment isolés.

Si nous prenons le scénario d&#rsquo;une grande entreprise sous attaque avec 10 000 postes infectés utilisant VMware NSX et VMware Workspace One:

  1. Le virus est détecté dans l&#rsquo;entreprise, les administrateurs système bloquent les postes de travail du site infectés avec VMware NSX et protègent les serveurs d&#rsquo;applications
  2. Les administrateurs poste de travail activent les image VDI WS1 et rendent disponibles 2000 environnements de travail instantanément dans le Software-Defined Data Center (SDDC) pour les sous-traitants et fonctions vitales de l&#rsquo;entreprise.
  3. En parallèle chaque utilisateur parmi « les autres 8 000 » reçoit dans son Smartphone avec VMware Workspace One un email de notification d&#rsquo;accès à ses applications métiers en mobilité et sur des postes de travail Home office et BYOD. Les applications sont ajoutées par les administrateurs au profil des utilisateurs instantanément sans passage sur aucun poste.
  4. Les administrateurs entament un retour automatique en conformité des postes de travail.
  5. Tout rentre dans l&#rsquo;ordre sans interruption de services côté utilisateur et Datacenter.

Pour aller plus loin, regardez cette vidéo sur comment stopper une attaque grâce à la micro-segmentation avec VMware NSX :

Vous pouvez aussi lire notre blog post « Use a Zero Trust Approach to Protect Against WannaCry »

Read more..

Horizon Cloud Service with On-Premises Infrastructure May 2017 Release Updates

There are several technical updates this quarter to VMware Horizon Cloud Service with On-Premises Infrastructure. For more details on this release, see the Horizon Cloud with On-Premises Infrastructure Release Notes.

Support for Cloud-Based Workspace ONE

With this release, we now support cloud-based deployments of VMware Workspace ONE. End users can access their VMware Horizon Cloud virtual desktops from the Workspace ONE application catalog and utilize single sign-on for authentication. We previously supported only on-premises deployments of Workspace ONE.

 

New Desktop Configuration – Performance (Enterprise Plus)

We have added a new desktop configuration option to better suit the needs of your power users. With Horizon Cloud with On-Premises Infrastructure, you can now deliver Performance (Enterprise Plus) Desktops, with an 8 vCPU and 16 GB vRAM configuration.

Smart Policies Support

You can now leverage Smart Policies in Horizon Cloud. Smart Policies allow you to have fine-grain control over a user&#rsquo;s desktop experience. You can dynamically enable, disable, or control access to user features in Horizon Cloud based on who the user is, and how they are accessing Horizon Cloud. Smart Policies were released as an integration between VMware Horizon 7 and VMware User Environment Manager in 2016.

For example, with Smart Policies, an administrator can decide to disable access to USB devices or to cut-and-paste from within the Horizon Client if users are attempting to access the Horizon Cloud environment from an untrusted or external network. You can also dynamically control display-protocol configurations based on the type of device that is being used.

Smart Policies in Horizon Cloud work the same as they do in Horizon 7. VMware Senior Product Line Manager Aaron Black wrote an excellent blog post pointing out some great use cases for Smart Policies. If you want to try out Smart Policies in your Horizon Cloud deployment, download the Reviewers Guide for View in VMware Horizon 7: Smart Policies.

vSphere 6.5 Support

We have added support for VMware vSphere 6.5 on certified vSAN Ready Nodes. For details on supported hardware models from partners, see the Horizon Cloud with On-Premises Infrastructure page.

SmartNode Consolidation

We have consolidated the management tier of a Horizon Cloud with On-Premises Infrastructure deployment into a single virtual appliance. The Horizon Cloud Node appliance manages all of the critical functions including App Volumes, Instant Clone creation, and communication with the Horizon Cloud control plane. This change was made to keep the Horizon Cloud Node footprint small and efficient. For more details, see Horizon Cloud with On-Premises Architecture.

Summary

With this release of Horizon Cloud with On-Premises Infrastructure, new features include

  • Support for cloud-based Workspace ONE
  • New desktop configuration: Performance (Enterprise Plus)
  • Smart Policies support
  • vSphere 6.5 support
  • Multi-region management
  • SmartNode consolidation

Horizon Cloud with On Premises Infrastructure continues to add new functionality on a regular basis. For more information, see Horizon Cloud Service with On-Premises Infrastructure.

The post Horizon Cloud Service with On-Premises Infrastructure May 2017 Release Updates appeared first on VMware End-User Computing Blog.

Read more..

3BD/2BA with Security & Simplicity: TCAD Streamlines with VMware Digital Workspace Solutions

Home of the University of Texas at Austin, a number of growing companies and almost as many great barbecue joints, Travis County, Texas is one of the fastest growing areas in the U.S. The entity that determines property taxes there, Travis County Central Appraisal District (TCAD), has seen its workloads grow along with the population. TCAD needed better efficiency, higher security and a simpler way to monitor IT applications to protect citizens&#rsquo; sensitive property information.

Now with VMware’s digital workspace solutions, TCAD can:

  • Meet its security needs with micro-segmentation;
  • Transform desktops into a digital, mobile workspace for field appraisers and business users; and
  • Meet strict regulatory compliance.

The results? Seamless access to business-critical apps, reduced hardware costs with VDI, top-notch service and taxpayer savings.

Want to learn how VMware’s digital workspace solutions can help your business enable your workers with secure access to work apps and data from anywhere? Click here to sign up for a behind-the-scenes peek.

More videos you might like:

  • American Red Cross Uses VDI for Disaster Relief
  • Explore Sally Beauty’s Innovative Digital Workspace
  • Simplifying App & Access Management with VMware Workspace ONE

 

The post 3BD/2BA with Security & Simplicity: TCAD Streamlines with VMware Digital Workspace Solutions appeared first on VMware End-User Computing Blog.

Read more..

Go Que Newsroom

Categories