Secure Workspace refers to safe access to applications. Those applications must be accessible everywhere. Usually, a VPN is constructed in order to have access to protected resources. This however, limits the flexibility because you only have access to an application of a device on which the VPN client is installed. Another limitation of client-server applications is that you need a specific client to access the application. That creates an additional security risk because, at that time, the data will be on the remote client.
There is a solution that eliminates those restrictions: published applications or full virtual desktop infrastructure. Through a very limited client which you can install on almost any device, you can have access as if you were working locally.
Since only screen and keyboard strokes will be sent over the network, all data can reside in the central data center. Thus, you will experience the same speed and security. The authentication of the user is of extreme importance nowadays. A strong authentication method in combination with VDI is highly recommended.
Virtualization is emerging at different levels. Until recently, it was only common at server level, today it is very often used at endpoint level and in the data center. At those endpoints, there are more and more virtual desktop initiatives. At the datacenter, there is the adaption of Software Defined Networking (SDN) and Software Defined Data Centers (SDDC). The reason for those trends is the flexibility and agility of the environment. The goal is to have a complete infrastructure stack that can be deployed by a single person. It is no longer necessary to wait for the various departments to deploy the individual components. Clear examples of such environments which emerged from the concept of SDDC are Amazon and Azure. The same concepts are also becoming more and more common in larger enterprises.
Something that is very important to us, is the option for extra security. Due to the concept of service chaining and micro segmentation, it is possible to redirect specific traffic streams through dedicated security appliances, even if the traffic is between two devices on the same layer 2 subnet.
The need for storage continues to increase. A flexible and scalable solution, scalable both in terms of capacity as well as performance, is a must. Performance is typically expressed in number of IOPS (Inputs/Outputs per Second). Redundancy is also very important. Enterprises cannot afford to lose data. In order to provide the necessary redundancy there are multiple options, ranging from redundant disks to completely redundant systems that are spread over multiple locations. It is up to the SecureLink consultants to design the best architecture for customers based on their individual needs.
Backup is closely related to storage as well. Backups are more and more located off-site: on your own infrastructure or even in the cloud. The challenge is to have a flexible solution that provides a fast restore in case you need it. Typical backups are part of a total disaster recovery scenario and must be looked at with due attention.