Unsolved
This post is more than 5 years old
2 Intern
•
256 Posts
0
1793
July 17th, 2010 05:00
7/22 EMC Solutions for VMware Webcast: EMC Proven Solutions for VMware View. Learn how to realize the cost savings and flexibility offered by a virtual desktop environment.
Thursday, July 22, 2010, 11:00 am ET
EMC Hosts: Jennifer Gill, Solutions Marketing Manager and Brian Johnson, Principal Solutions Lead, Virtualization Practice
Register now http://info.emc.com/mk/get/DBM7858-8419_raf_lp?reg_src=PA_VMware
In terms of patch management, security, and information compliance management, desktops are the most difficult to maintain. Centralized management with desktop virtualization is the best way to gain control.
EMC Proven Solutions for VMware View enable you to realize the cost savings and flexibility offered by a virtual desktop environment. Attend this webcast and find out how you can:
- Improve end-user productivity and performance
- Optimize asset utilization
- Increase control over desktop information
- Easily meet SLAs (service level agreements)
- Support compliance initiatives related to desktop information


betsey_bolton
2 Intern
•
256 Posts
0
July 18th, 2010 05:00
The following demos will also be presented during this 7/22 webcast:
Demo 1
VMware View Composer and RSA enVision – This demonstration will highlight RSA Envision integration with VMware View 4. It will also demonstrate the creation of a persistent desktop pool based on VMware View Composer linked clone technology.
The RSA enVision 3-in-1 platform offers an effective security and information event management (SIEM) and log management solution, capable of collecting and analyzing large amounts of data in real-time, from any event source and in computing environments of any size.
Demo 2
VMware View virtual desktops protected with RSA Data Loss Prevention (DLP). – This demonstration will illustrate how sensitive data can be controlled via policy management and classification at the endpoint (virtual desktop). It will walk the user through a real world example of a desktop user attempting to print sensitive data and the actions that can be taken automatically to maintain the integrity of a corporate information policy.