In fact, as they started a virtualization pilot in early 2010, they figured they could do a widespread deployment without much difficulty and move most of the company's employees into a virtual desktop environment over two to three years.
Then reality hit.
"When we originally went into the pilot, we thought it would be a revolution -- that we'd put these machines out across the organization and we'd save a lot of money," says Steve Weber, Southern's director of client services. "What I learned going through this is that it wasn't ready for the revolution, but it had evolution aspects."
The company's experience illustrates the complexities of desktop virtualization. On the one hand, IT leaders recognize that the architecture promises to deliver some powerful benefits and financial returns. On the other, they're learning that those returns don't come easily.
"I think it's a much better architecture. It's more stable. It's more secure. It's easier to manage. And I think it will become the preferred architecture," Weber says. "But the question is, how do you get there?"
Southern is working on the answer.
The Atlanta-based energy company first considered desktop virtualization in 2004, when it started to virtualize its data center. Client services manager Mark Canup says the company pushed for data center virtualization for the typical reasons: reduced costs, increased flexibility, and lower energy use.
Back then, Southern's IT executives believed that desktop virtualization could deliver similar benefits, Canup says. But while server virtualization in the data center moved ahead, initial attempts at desktop virtualization yielded few returns. That's because desktop virtualization five or so years ago essentially meant moving applications off a desktop and putting them on a server.
"You had a PC behind the data center for every thin client you had in the field when it first started out, and you couldn't get enough virtual desktops on one server to make sense," Weber says.
That had changed by late 2009, when Southern decided to launch a pilot desktop virtualization project.
This independent paper from senior analyst Jon Collins at FreeForm Dynamics considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could potentially increase the attack surface of the companies. It defines the scale and types of threat, what to look for in a corporate web security solution and compares the different types of technological approach available to companies and the processes that need to be considered for effective protection.Security is not an option. This KnowledgeVault Series offers professional advice how to be proactive in the fight against cybercrimes and multi-layered security threats; how to adopt a holistic approach to protecting and managing data; and how to hire a qualified security assessor. Make security your Number 1 priority.Social-networking sites have revolutionized how businesses use the Internet. Instead of relying on faltering newspapers to find job candidates, companies can access thousands of potential employees through Facebook and Twitter. But social-networking sites have also left businesses vulnerable to new security threats. So are they tools to be used or security traps to be avoided?
No comments:
Post a Comment