Research the different enterprise deployment models listed in Table 10-3. Create
ID: 3913558 • Letter: R
Question
Research the different enterprise deployment models listed in Table 10-3. Create a detailed chart listing their typical features, how they are used, and their advantages and disadvantages to both the enterprise as well as to the employee. Which of them is the most secure option? Which is the least secure option? Which of them is most advantageous for the enterprise? Which would you prefer to use? Which would you recommend for your school or place of employment? Why? Create a one-paragraph summary along with your chart.
Explanation / Answer
Q1) Create a detailed chart listing their typical features, how they are used, and their advantages and disadvantages to both the enterprise as well as to the employee
The desktop image is delivered over a network to an endpoint device, which allows the user to interact with the OS and its applications as if they were running locally. The endpoint may be a traditional PC, thin client or even a mobile device.
Because little actual computing takes place at the endpoint, IT departments may be able to extend the lifespan of otherwise obsolete PCs by repurposing them as VDI clients. And when the time does come to purchase new devices, organizations can buy cheaper, less powerful machines.
The cost savings associated with endpoint hardware can disappear quickly, however, after factoring in IT infrastructure expenses.
Storage in particular can make VDI cost prohibitive. When a desktop runs locally, the operating system, applications, data and settings are all stored on the endpoint. There is no extra storage cost; it's included in the price of the PC. With persistent VDI, however, the OS, applications, data and settings for every single user must be stored in the data center. Capacity needs, and the cost required to meet them, can quickly balloon out of control.
VDI's reliance on network connectivity presents another challenge. Users can't access their virtual desktops without a network connection, and weak connectivity can hinder desktop performance. This problem is especially common with graphics-intensive applications and other software with high processing demands
Damages caused if any needs to be taken care by the corporate.
Complete maintainance and installation costs are born by corporate.
Improper financial planning may lead to huge losses.
Q2) Which of them is the most secure option?
CYOD (Choose Your Own Device) as employees can choose the device they like and its all properly configured for security, performance, durability and reliability. So we can choose the device of our choice along with safety measures assured by the company.
Q3) Which is the least secure option?
COPE (Corporate Owned, Personally Enabled) as these types of devices are meant for company use and paid by the company but employees can use for personal use and there can be client/work sensitive data that might be misused for personal benefits. Also, if devices are stolen there can be chances of data theft and hard to recover lost data. So this is very unsecure.
Q4) Which of them is most advantageous for the enterprise? Which would you prefer to use?
CYOD because it can reduce hardware costs as compared to COPE. The end users are still in control of their own technology but the support and procurement standards are more streamlined given the more homogenous pool of device options and this ensures proper security checks from the enterprise end so as to prevent any illegal usages by the employee. So costs of implementation are less.
Please let me know in case of any clarifications required. Thanks!
Model Name Typical Features and How are they used Advantage Disadvantage BYOD Bring your own device is the most popular approach across our customer base. In the BYOD model, employees are granted full responsibility for choosing and purchasing the devices they use, as the smartphones, tablets, and other gadgets are their own. It is very popular among smaller businesses The key advantages of BYOD are lower hardware and service costs, higher user convenience, and little to no wireless carrier requirements for the organization The main disadvantage of this approach is that security is very difficult to enforce and therefore it exposes your organization to more legal implications and risks. This approach also makes it more difficult to manage configurations, replacements and repairs COPE Larger enterprises are more likely to employ the COPE model, as it maximizes control over mobility in many ways. Employees are given smartphones that are paid for by the company, meaning the business retains ownership of the devices. There is some flexibility involved as well, as enterprises can still offer employees options. It’s a popular choice for financial institutions and health care providers due to their regulatory needs for compliance and security COPE offers organizations the most control and authority over all mobile devices which results in lower security concerns than BYOD and CYOD. Repairs and replacements are more standardized and easier to execute. organizations will need to put more effort into setting and enforcing monitoring policies. They’ll also be fully responsible for keeping up with the latest innovations in the industry. With users’ productivity possibly affected by the added freedom, employers need to set up strict work policies. All of these lead to slow deployment, making enterprise mobility more of a challenge CYOD CYOD is one of the newer approaches we’re seeing. It is when companies give employees an approved set of devices from which to choose. Devices will either be paid for and owned by the employees, or the company will offer a renewable hardware stipend that allows the firm to retain possession following the termination or resignation of various users The main advantages of CYOD are that it can reduce hardware costs as compared to COPE. The end users are still in control of their own technology but the support and procurement standards are more streamlined given the more homogenous pool of device options The disadvantages include some of your users may be dissatisfied with their options, it does not completely eliminate hardware costs and the end users may struggle to manage repair and replacement. VDI Persistent VDI provides each user with his or her own desktop image, which can be customized and saved for future use, much like a traditional physical desktop. Nonpersistent VDI provides a pool of uniform desktops that users can access when needed. Nonpersistent desktops revert to their original state each time the user logs out.The desktop image is delivered over a network to an endpoint device, which allows the user to interact with the OS and its applications as if they were running locally. The endpoint may be a traditional PC, thin client or even a mobile device.
Because little actual computing takes place at the endpoint, IT departments may be able to extend the lifespan of otherwise obsolete PCs by repurposing them as VDI clients. And when the time does come to purchase new devices, organizations can buy cheaper, less powerful machines.
The cost savings associated with endpoint hardware can disappear quickly, however, after factoring in IT infrastructure expenses.
Storage in particular can make VDI cost prohibitive. When a desktop runs locally, the operating system, applications, data and settings are all stored on the endpoint. There is no extra storage cost; it's included in the price of the PC. With persistent VDI, however, the OS, applications, data and settings for every single user must be stored in the data center. Capacity needs, and the cost required to meet them, can quickly balloon out of control.
VDI's reliance on network connectivity presents another challenge. Users can't access their virtual desktops without a network connection, and weak connectivity can hinder desktop performance. This problem is especially common with graphics-intensive applications and other software with high processing demands
Corporate Owned Structure Here all operating devices Landphones, Desktop, IT Infrastructure are provide for use and all paid by the corporate and employees use them in order to accomplish the tasks No investment from the employee end. Since its purchased by corporates so best in class devices are provided for use.Damages caused if any needs to be taken care by the corporate.
Complete maintainance and installation costs are born by corporate.
Improper financial planning may lead to huge losses.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.