59
© 2014 VMware Inc. All rights reserved. VMware End User Computing Any app on any davice © 2015 VMware Inc. Tutti i diritti sono riservati. Laura Ferro EUC Business Specialist

VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

  • Upload
    lamanh

  • View
    221

  • Download
    0

Embed Size (px)

Citation preview

Page 1: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved.

VMware End User Computing Any app on any davice

© 2015 VMware Inc. Tutti i diritti sono riservati.

Laura Ferro EUC Business Specialist

Page 2: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

By 2017 there will be more mobile devices on the planet than people

2

Page 3: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

VMware Leapfrogs into the Leadership Position

CONFIDENTIAL 3

Source: IDC 2015

Topping all other vendors in both categories, strategies and capabilities.

Page 4: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

VMware Leapfrogs into the Leadership Position

CONFIDENTIAL 4

Source: IDC 2015

Topping all other vendors in both categories, strategies and capabilities.

2013 2015

Page 5: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Business Mobility Transformation

5

Deployed globally by 2019 3.5 Billion

Source: Forrester Research World Mobile And

Smartphone Adoption Forecast, 2014 To 2019 (Global:

August 2014)

Page 6: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Business Mobility Transformation

6

>50% Customer-facing

and employee-facing

IT investments will be

Mobile-focused

Source: Gartner 2015 CIO Agenda: 2,810 CIOs responded to this year’s survey, representing approximately $397 billion in IT spending across 84

countries

Page 7: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Defining Business Mobility

7

Business Mobility

Users Any Application Any Device

• Flexible Delivery

• Unified Experience

• Self-Service

LOB Business Process Innovation

• Effective employees

• Collaborative partners

• Satisfied customers

IT Mobile Cloud Architecture

• Centralized identity

• Flexible platform

• Security & management

Page 8: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Mobile-Cloud Era

Client-Server Era

Need to Bridge Two Worlds

#vmwmobility

3

Page 9: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

The demand for your services is changing

10

82%

53% Use multiple

devices

Use apps across many

platforms

37%

Work from multiple locations

Anytime, anywhere workers

29%

93% Y/Y growth in Anytime, Anywhere

Workers Source: Forrester End-user Computing Survey

2013 Comparing 2012 to 2013 responses among NA, and EMEA respondents

Page 10: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Result: The Growing Complexity of Today

Personal Devices Corporate Devices

Diverse Apps

Diverse Platform

Data Everywhere

Diverse

Devices

Mobile

Page 11: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Ingorare il problema

.......Non aiuta!

o “chiudere” l’utente….

Page 12: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved.

End-User Computing Strategy

2015 Go-to-Market Strategy

Page 13: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

14

\ Virtual Compute Virtual Storage Virtual Networking

Desktop Mobile

SELF-SERVICE

IDENTITY

APPS

DATA

POLICY

Private Public Hybrid

AUTOMATION

Cambia l’approccio

Page 14: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Outcomes with the New Model of IT

15

Security Controls

Native to Infrastructure

Streamlined and

Automated Data Center

Operations

App and

Infrastructure Delivery

Automation

High Availability

and Resilient

Infrastructure

Business

Mobility

Data Center

Virtualization and

Hybrid Cloud Extensibility

CapEx

Reduction

Secure, Faster

Delivery

of Mobile Apps

Improved Security

to Effort Ratio OpEx

Reduction

IT Service Delivery

Time

in Minutes

Improved

Uptime

Page 15: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

What LOB Wants: Business Process

Innovation

What IT Wants: Mobile Cloud Architecture

16

What Users Want: Any App on Any Device

Page 16: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

What Users Want: Any App on Any Device

17

Page 17: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

What LOB Wants: Business Process Innovation

$

Healthcare

• Patient

experience

• Patient care

• Remote care

Government

• Mission support

• Fast

collaboration

• Disaster prep

Education

• Rich learning

• Compliant

practices

• Simple management

Retail

• Customer

relationships

• In-store processes

• Employee training

Financial

Services

• Branch management

• Wealth management

• Advisory resources

Page 18: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

What IT Wants: Mobile Cloud Architecture

Page 19: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved.

VMware Workspace™ Suite

Page 20: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Consultants

Contractors

Auditors

Vendors

Suppliers

The Evolving Business Requires Comprehensive Mobility Strategy

21

Extending

and Unifying

End User

Experience

Addressing

Multiple

Use

Cases/proce

sses

Enabling

Next-Generation

Apps

Connecting

people &

things across

the

Organization

Page 21: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Desktop Transformation

Business Innovation

Mobile Management

BYO

VMware Workspace Suite: Enabling Business Mobility

22

Workspace Suite

Horizon Desktop

AirWatch Mobile

Content Locker

Identity Manager

User IT

Page 23: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved.

Il Portfolio

Page 24: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

A comprehensive Horizon Portfolio

26

Horizon

Air

Horizon 6

Horizon

View

Standard Edition

Horizon

Advanced Edition

Horizon

Enterprise Edition

Local Central Cloud

Horizon FLEX

Page 25: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Centralized Image

Management

Automated Windows 7 & 8.1

Migration

End Point Protection

(Backup & DR)

Endpoint Repair

Hardware Migration

Mirage Capabilities

Page 26: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Mirage™ Server

Manage Centrally while Executing Locally

Centralized Images

Network Optimized Synchronization & Streaming

Core Image

Desktops/Laptops with

Mirage Client

Local Copies

Mirage architecture

Page 27: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Deliver: Empower your workforce with

secure, roaming access to your same

desktop and apps across devices

Broker: Manage and secure virtual

desktops and published applications from

a single admin console while removing data

off endpoints

Horizon View virtualizes desktops into a central service + Publish Applications to any device

Transform: Simplify desktops and

apps into the datacenter with

virtualization

Page 28: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Horizon View for Linux

32

• Less costly alternative to Windows

• Provide IP protection for existing Linux use cases

• Centralized control and management for Linux Desktops

• Support 3D and Linux office applications

Page 29: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Supported Distributions

34

Supported Linux Distributions (32bit &

64bit)

Ubuntu LTS (32bit and 64bit)

RedHat Enterprise Linux 6.6 (RHEL 6.6)

CentOS 6.6

NeoKylin (Tech Preview)

Page 30: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Identity manager Main Capabilities Workspace aggregates the most app types, provides the only true cross-device app store

Desktop Laptop Tablet Phone

Identity Manager

Aggregation | Security | Self-Service | Analytics

12

Page 31: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved.

VMware Identity Manager Identity Management for the Mobile Cloud Era

Page 32: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

38

Challenges Customers are Facing with Identity

Protecting apps and data from unauthorized

access is important but authentication and ease

of use needs to be straightforward

Enforce security and

compliance without

hampering workers

Employees and their devices are increasingly on the go.

Access control to apps becomes more important

than networks. Device diversity adds to the

complexity

Time and complexity in

delivering new apps and

services

Real-time visibility, proactive alerting, reporting and

analytics are all required to know what apps are being used, when, and by whom.

This helps manage licensing, SLAs, and maintenance

windows

Gaining visibility into

user access, who has

access to what and

when

Complexity of scale

and growth

(Operations, Helpdesk)

A general state of readiness to scale as traffic, users and devices

grow in number across the organization

Must be consumer-friendly and simple to use

Must enforce policies set for compliance / governance, privacy,

and data loss

Must support any app type

Must work across any device, managed or

unmanaged

Must provide analytics and reporting on user access to

apps for compliance and planning

Must eliminate password reset tickets

Automate and streamline onboarding and revocation

CU

ST

OM

ER

CH

AL

LE

NG

ES

S

OL

UT

ION

NE

ED

S

Page 33: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

7 Must-Haves for a Cloud / Mobile Identity Management Solution*

1

Directory Integration 2

Policy Management

3

Application Provisioning

4

Analytics / Reporting

5

Cross-device Catalog and Launcher 6

Single-Sign-on

7

Multi-Factor Authentication

*Source: 2015 Gartner IDaaS MQ

Page 34: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

VMware Identity Manager – What It Does

Build an App Catalog • Install apps directly onto springboard or access through responsive HTML5 app portal

• Auto-Provisioning Workflows

Federate User Identity

• SSO with Domain Login

• Permits Strong Authentication - Provision and revoke access instantly

One-Touch Authentication • No configuration or login required

• Leverage device ownership and unlock to establish authentication

Conditional Access • Managed or Unmanaged devices, Network Scope, Authentication Strength

• Set policy levels by app

Secure Data on Device • Encrypt and wipe application data using optional AirWatch Mobility Management

• Apply Device-based restrictions (cut/copy/camera/GPS/Open in)

✔ ✗

Page 35: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Identity manager Overview

One login | One experience | Any device

Virtual Desktops

Citrix XenApp

Office 365 View Hosted Apps

ThinApp Packages Google Apps

App Approvals

App Catalog

Custom Branding

Context Aware

143

Page 36: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Secure, Virtual Workspace

44

One login | One experience | Any device

Page 38: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved.

Vmware App Volume

© 2015 VMware Inc. Tutti i diritti sono riservati.

Page 39: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

VMware App Volumes Real-time Application Delivery with Lifecycle Management

47

OS

App Volumes

Real-time App Model

OS

Applications

Traditional VM

Data/Files

Settings App Container App Container User changes

Abstraction layer

Infrastructure CPU Storage Networ

k

Benefits

• Deliver and manage applications with a minimum of 30% reduction in storage capacity

• Update application workloads in seconds and at scale

• Provide seamless end-user experience across non-persistent environments

Solution

• Real-time application delivery system to instantly deliver applications with complete lifecycle management

• Virtualize above the OS

Page 40: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

VMware App Volumes

• Real-Time application delivery at scale and in seconds

• Optimized application delivery reduces VDI storage costs

• Deliver persistent user experience with non-persistent economics

• Complete application lifecycle management

• Customers with VDI or Presented Apps

• Customers using or considering Personal Virtual Disk (PVD)

• App Volumes included in Horizon Enterprise – Upsell Opportunity

• Compliment Citrix XenApp and XenDesktop environments with App Volumes

• Enables IT to instantly deliver applications with complete application lifecycle

management

• Seamless end-user experience while reducing infrastructure and management costs

• Allows IT to deliver a stateless desktop without any trade-off between user experience

and costs

Key Benefits

Value Proposition

Customer Opportunity

Page 41: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved.

VMware User Environment Manager UEM

© 2015 VMware Inc. Tutti i diritti sono riservati.

Page 42: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Gestione centralizzata dei profili e delle policy

IT

Ripristino semplificato delle impostazioni in base a una policy 51

Page 43: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

VMware User Environment Manager

IT

User Environment

Manager

Impostazioni IT

Personalizzazione

e profili degli utenti

Policy dinamica

52

Cloud

Virtuale

Fisico

Page 44: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Accesso coerente e personalizzato da vari dispositivi

Le impostazioni personalizzate delle applicazioni pubblicate

Persistono quando si effettua il login al desktop virtuale

53

Page 45: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Policy contestuale dinamica Caso d'uso: stampa location-based

L'utente vede solo la stampante al 1° piano

L'utente vede solo la stampante al 2° piano

54

Page 46: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Configurazione di policy dinamiche in più posizioni

Desktop

virtuale

Desktop

fisico

Desktop

cloud

Impostazioni

stampante

Mapping

di rete

Impostazioni

basate su ADMX

Impostazioni

delle

applicazioni

Posizioni

55

Page 47: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved. © 2015 VMware Inc. Tutti i diritti sono riservati.

Vm ware Workspace Environment Management WEM (bundle)

Page 48: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Horizon App Management Bundle (WEM)

58

• WEM offering optimized to improve app delivery and management for XenApp and XenDesktop

• Allows customers to realize better TCO on existing investments

• 45% off compared to a la carte

• Go after massive XA/XD install base

• Lead with differentiated App Volumes

Workspace Portal and ThinApp

• App catalog and App isolation

App Volumes

• Just in time App delivery

UEM

• Profile management and personalization

vRealize Operations for Published Apps

• App Monitoring, management and automation for XenApp

Citrix XenDesktop

and XenApp

Page 49: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Identità degli utenti e policy IT dinamiche

Fisico Cloud Virtuale

Workspace Environment Management

59

Monitoraggio end-to-end

Distribuzione e isolamento delle applicazioni

Page 50: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved.

VMware Horizon Flex

© 2015 VMware Inc. Tutti i diritti sono riservati.

Page 51: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

A comprehensive Horizon Portfolio

63

Horizon

Air

Horizon 6

Horizon

View

Standard Edition

Horizon

Advanced Edition

Horizon

Enterprise Edition

Local Central Cloud

Horizon FLEX

Page 52: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Horizon FLEX

Horizon FLEX Packaging

CONFIDENTIAL 65

Mirage

FLEX Policy Server

FLEX Client

(Mac & PC)

Image

Mngmt

Clients

Control

Page 53: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

© 2014 VMware Inc. All rights reserved.

vmware Horizon DaaS: Delivering Desktops as a Service

66

Page 54: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

VMware Horizon Portfolio

67

Desktop and App Virtualization

Horizon 6

Virtualized

Infrastructure

Software Defined Datacenter

Management & Automation

Horizon DaaS

Page 55: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Hybrid Cloud

68

Any cloud with a single end-user client

VMware Cloud*

Private Cloud

Partner Cloud

Desktops Apps

local

hosted

local

hosted

Desktops Apps

local local

hosted hosted

Many Clouds One

User Experience

Horizon 6 On-Premise Horizon DaaS

* vCHS availability in EMEA limited to UK currently

Page 56: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Cloud Makes the Complex Easy

CONFIDENTIAL 69

Management, devices, apps, OS

• Desktop management

• Access devices (end-point) – PC, laptop, tablet, etc.

• Applications – Word, Excel, LOB apps, antivirus, etc.

• Image creation, deployment and maintenance

• Operating system licenses – Windows clients/server

CAN BE PROVIDED BY:

END CUSTOMER

SERVICE PROVIDER

SOLUTION PROVIDER

Software • DaaS software

• Server/data store

• SW patching

and administration

• Support and maintenance

Hardware • Servers

• Storage (RAID protected)

• Networking infrastructure

• Hardware Administration

• Support and maintenance

Facilities • Data center

• Racks

• Power and cooling

• Security

Support • 7 x 24 x 365 L2+ support for desktop admin

• DaaS platform — certified

• support personnel

• Integrated incident, service

request and escalation

management system

PROVIDED BY

SERVICE PROVIDER

• 24 x7 Enterprise ITIL Support

• Enterprise Security

• Enterprise Class

Data Center Operations

Page 57: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

70

We Build Strategies

And Plans Because

Things Change

… Not Because They

Stay The Same

Page 58: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

DEMO

71

Page 59: VMware End User Computing - Asystel Italia · VMware Leapfrogs into the Leadership Position CONFIDENTIAL 3 Source: IDC 2015 Topping all other vendors in both categories, strategies

Business Mobility

• Defines our

strategy

• Top of mind for

your customers

• Birthright of

VMware

• We have the

tools to take

you there