The adoption of virtualization continues to accelerate. According to a recent survey conducted by Vanson Bourne (and commissioned by virtualization management vendor Veeam), more than 92% of large businesses have adopted virtualization, with four out of every ten servers now being virtual.
The virtualization space is also shaping up to be a battle of Goliaths. VMware is still the top vendor by far, but Citrix and Microsoft are coming on strong. Meanwhile, plenty of other vendors, including many startups and service providers, offer a range of ancillary virtualization products and services, including everything from security suites to virtual infrastructure monitoring services.
It’s a confusing landscape that will only get more so in the near term. To help you make sense of it, I polled a group of nearly 50 recent purchasers of virtualization products and services, asking them what the deciding factors were as they selected their solutions. Here are five of the most common and important questions they asked before making a decision.
1. How will virtualization affect security?
Prior to launching virtualization efforts, the State of New Mexico Human Service Department suffered a major security breach. As a result, the agency implemented heavy-duty security, including air gaps, strict partitions and new policies separating various assets into secure zones.
As with many other organizations, the NM HSD embraced virtualization as a way to stretch dollars, while also hoping to achieve a number of other benefits. However, they feared that security would bring those efforts to a screeching halt.
Gurusimran Khalsa, systems group supervisor for NM HSD, had concerns about VMware’s vCenter. “That one tool rules everything,” he said. “If someone gets access to vCenter, they gain access to everything.”
Adding to those worries, NM HSD stores social security numbers, personal health information and other sensitive data. Thus, the agency must comply with a number of regulations.
The agency sought a solution that would allow them to duplicate their robust security profile in a virtualized environment. After evaluating a number of vendors, they chose a combined solution from Altor Networks (now Juniper) and HyTrust.
Altor provides virtual firewalls, while HyTrust delivers access control, policy enforcement and tools that help with compliance. With security concerns addressed, NM HSD moved aggressively to virtualize more of their infrastructure. “
I’d estimate that we’re over ninety-five percent virtualized,” Khalsa said. “Without those two security products, there is no way we’d be this far along.”
2. How will it change workflows?
Seattle Children’s Hospital prides itself on the attention its staff pays to patients and their families. Unfortunately, traditional computing was distracting staff from that focus.
“In the team room, it took a doctor two minutes to log in to the workstation,” said Jake Hughes, Senior Enterprise Architect. “Then he logged out – which locked the workstation so nobody else in the team room could use it. When he went to the patient’s room, he had to spend another two minutes logging in before he could pull up the patient’s file. The patient and family were just sitting there, watching. It sent the wrong message.”
Seattle Children’s IT staff supports 5,500 workstations with a staff of approximately 180. Seattle Children’s used Citrix XenDesktop to create single sign-on access to multiple siloed applications with just one reconnect.
For optimal access to the VDI, Seattle Children’s then implemented 3,000 Wyse Xenith zero clients (a term used for extremely thin clients) across all its clinical environments, with another 1,000 devices to be implemented soon.
The combination has fundamentally changed workflows. VDI logon times have been reduced from minutes with a PC, or 50 seconds on a VDI client, to just 20 seconds on the Wyse Xenith. Users just log on once at the beginning of the day, and then move around the hospital, with the option of plugging their Gemalto smart cards into the smartcard readers of whatever units they want to use at the time.
They type in their PINs, or user ID and password, and within seconds, they are reconnected. When they’re ready to leave units, they pull out their smart cards or hit the disconnect button and their sessions close securely, ready to be reopened whenever and wherever employees wish.