Content of Figures
Commissioned by VMware
Agility and efficiency are key aspects for organisations in the digital transformation. Enabling the right people to access the right resources is a k ...Login Get full Access
- Mobile and traditional user devices converge into a unified endpoint management infrastructure.
- Application management across various OS ecosystem ...
3 Building blocks within the organisation
A lot of effort has already been spent on maintaining the information that is essential for delivering applications to end users within an organisatio ...Login Get full Access
3.1 Strong identities for all types of users
Identity Management is typically not expected to take centre stage when it comes to implementing enterprise infrastructures. Many enterprise processes ...
The definition, implementation and execution of stable life-cycle management processes, facilitate the existence of strong online identities. These ca ...Login Get full Access
3.2 Providing application infrastructure
Providing unified access to all required infrastructure and application frameworks available is another important area requiring an efficient applicat ...
It is a major technological challenge to provide different types of applications, which require alternative approaches regarding user interface design ...Login Get full Access
3.3 Managing endpoints and devices
The landscape for end-user devices has dramatically changed in the last five to ten years. The days are over for the company managed desktop PC as the ...Login Get full Access
3.4 Assigning and controlling access
The opportunity of designing and enforcing adequate policies for application access is one key benefit of an integrated, Unified Endpoint Management s ...Login Get full Access
4 Assembling a unified application workspace approach
Modern approaches for the design of digital workspace environments combine the following into a single holistic infrastructure; identity management, a ...Login Get full Access
4.1 The unified application workspace approach
Modern approaches combine current technologies with a strong cloud based infrastructure, to create a unified administration of applications, identitie ...Login Get full Access
4.2 Application delivery beyond client server
There is a strong convergence between desktop and mobile computing, while at the same time a move away from traditional client-server paradigm to clou ...Login Get full Access
4.3 Transforming business requirements and security demands into policies
There are no longer any traditional perimeters for business using cloud services, as mobile devices allow users to directly connect customers and part ...
The enrolment process for an individual device should make sure that all required components (from web browser via native apps to virtualisation clien ...Login Get full Access
5 Workspace ONE: The VMware approach to identities, applications and endpoints
VMware has constantly and strategically transformed its overall approach to this complex topic from individually managed solutions to a unified, holis ...Login Get full Access
5.1 Identity Management as the administrative glue
Originally Identity Management has been considered as a service on its own and a separate, but accessible infrastructure building block. VMware has ex ...Login Get full Access
5.2 Any application on any device
By implementing abstraction layers between the application layer and the device, the cloud delivery and the application representation, VMware can del ...Login Get full Access
5.3 Application delivery
The delivery of virtualized applications is implemented by using cloud-based and virtualized infrastructures, including:
- Public clouds for differe ...
5.4 Policy-based authorization and authentication
Based on the valid authentication of a user, as associated with an end user device, VMware Workspace ONE can define and impose rules based on various ...Login Get full Access
6 Migrating to a standardized yet tailored endpoint application delivery
The approach as described in this document, comes with the promise of improving end-user simplicity and enterprise security. It also implies the poten ...Login Get full Access