Department of Defense Solutions Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Actionable Advice for Optimal Results Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Table of Contents Make Planning a Priority .................................................................................................................. 2 Comply with Military Mobile Policy ................................................................................................... 3 Manage the Migration....................................................................................................................... 3 Address Legacy Applications and Vendors...................................................................................... 4 Prepare IT Staff ................................................................................................................................ 4 Choose Client Technology to Empower End Users ......................................................................... 5 Maximize Security ............................................................................................................................ 6 Consider COOP ............................................................................................................................... 6 Evaluate Software Solutions ............................................................................................................ 7 Determine Necessary Hardware ...................................................................................................... 8 Achieve Migration Success .............................................................................................................. 9 Next Steps ........................................................................................................................................ 9 Partner with VMware.................................................................................................................... 9 VMware Contact Information ....................................................................................................... 9 Glossary of Terms .......................................................................................................................... 10 Addendum A ................................................................................................................................... 11 WHITE PAPER /1 Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Best Practices for Implementing and Managing a Mobile, Multi-Device Environment As defense agencies adapt new and innovative technologies to support the warfighter, the way they operate must also quickly adapt to maintain efficiency and maximize agility. The demands from an ever growing, mobile workforce continue to increase, and keeping pace with the widening range of emerging technologies can be challenging. As a result, agencies are transforming traditional technology silos into centralized IT services that support users with multiple, mobile technologies. This innovation lets IT more effectively manage users rather than devices, while also empowering warfighters with mobility and freedom to choose the right device for each task and setting. Ultimately, the transformation to a modern, centralized IT infrastructure can significantly improve command agility, security, efficiency, and productivity. By implementing a number of best practices, you can help ensure success throughout the journey to a mobile, multi-device environment: • Make planning a priority • Comply with military mobile policy • Manage the migration • Address legacy applications and vendors • Prepare IT staff • Choose client technology to empower end users • Maximize security • Consider Continuity of Operations Planning (COOP) • Evaluate software solutions • Determine necessary hardware Make Planning a Priority A virtual desktop infrastructure is an effective solution from a cost and security perspective. While its benefits can be numerous, so can the related migration and management challenges. Before embarking on any migration, a variety of alternative models should be evaluated to ensure that the final solution meets the current and evolving mission needs of your agency, program, and joint operations. As Dwight D. Eisenhower stated, “In preparing for battle, I have always found that plans are useless, but planning is indispensable.” The same holds true for any system migration. Agencies are wise to engage in careful evaluation and planning for each aspect of a multi-device environment before any steps toward an actual migration are taken. This approach will help achieve optimal results from initial strategy development all the way through post-migration management. WHITE PAPER /2 Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Comply with Military Mobile Policy Department of Defense (DoD) policies continue to be examined and updated as mobile technologies and virtual desktop infrastructures rapidly evolve. It is imperative that agencies and programs adhere to the latest policies when implementing new technology. Current policies relating to mobile devices and the DoD enterprise architecture include the following from the DoD and the Office of the DoD Chief Information Officer: • • • • • DoD Mobile Device Strategy DoD Commercial Mobile Device Implementation Plan DoD Information Enterprise Architecture DoD Cloud Computing Strategy DoD CIO’s 10-Point Plan for IT Modernization Another key initiative, the Virtual End User Environment (VEUE) (Thin Client Initiative), was released by the Army Chief Information Officer/G-6 on December 19, 2011. This initiative discusses the importance of end user computing devices paired with supporting infrastructure like servers and data storage. Mobility Vision “A highly mobile workforce equipped with secure access to information and computing power anywhere at anytime for greater mission effectiveness.” — Department of Defense Mobile Device Strategy 1 Manage the Migration For optimum migration results, utilize the following components during the process: • • • • Migration stakeholder team Incremental plan Back-to-front building approach Pilot testing From the outset, it is advisable to create a team of migration stakeholders across your agency or program to help define and streamline the migration process from a variety of viewpoints. By doing this, you can best leverage their windows into timing and build alignment throughout the migration. Even in the short-term, you can achieve success by tying down one or two main timing elements. Ideally, your agency should take an incremental approach when transitioning to a mobile, multi-device environment to ensure long-term success. This approach better prepares your infrastructure and your team for change. A phased migration can be based on factors such as expiring service contracts, license renewals, or end-of-life hardware. Often, end-of-year or program technology refresh cycles can help define major acquisition timelines. While these and other factors like specific program funding lifecycles might play a significant role in migration timing, incorporate a phased approach if at all feasible. The back-end infrastructure serves as the foundation for the new environment and affects essentially every aspect of system performance. Therefore, properly building the back-end first goes a long way toward environment success. Also, consider incorporating pilot testing whenever possible so test beds are used to build project confidence as the implementation progresses. An optimal test choice is a classroom or training environment where performance is not crucial to mission success. This affords team members the opportunity to evaluate the technology and make adjustments in non-critical situations before rolling out a complete solution for use by warfighters in the battlefield. 1 Department of Defense Mobile Device Strategy, Version 2.0, May 2012, Office of the DoD Chief Information Officer, http://www.defense.gov/news/dodmobilitystrategy.pdf WHITE PAPER /3 Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Address Legacy Applications and Vendors With the new configuration, application software will physically reside and process on servers in a centralized IT environment rather than on desktop clients. Some legacy applications may be more difficult than others to move to a server, depending on how they were written. Both application functionality and licensing terms should be thoroughly addressed prior to implementation. • • • • Take inventory of existing applications Determine applications to be migrated Consider any new applications to be added Contact each individual software company Handling legacy applications up front will minimize their impact during migration. Eventually, licensing and software management will be centralized and less complex. Prepare IT Staff In a well-designed, multi-device environment, there are several key differences from traditional IT infrastructures. Instead of managing applications and data on legacy desktop systems, powerful servers host applications and data from a central location. This enables IT to manage users rather than devices, ultimately improving security, overall system manageability, and empowering the user to utilize the devices of their choice. This approach provides a very different landscape of less complex, more efficient operations. In turn, this enhances the user experience, and the workforce is more productive. • • • • • • IT can quickly add, delete, upgrade, and patch applications in the datacenter IT no longer loses time troubleshooting and fixing hardware and software problems on hundreds of decentralized PCs, although some PCs may continue to be used New users can be up and running much more quickly on a mobile client Client security and data protection are centralized and easier to maintain Backup operations occur in the datacenter Access to central resources can be easily extended to remote users as needed via mobile devices The IT staff needs to be fully trained and focused on all aspects of the centrally managed hardware and software resources to ensure the best transition possible. These back-end IT operations will be the cornerstone for collaboration of all processes and critical during implementation. All end users will rely on smooth and dependable IT operations. Ultimately, improved IT efficiency in the new environment makes it easier to roll out and update data and applications. Warfighters are armed with cutting-edge mobile technology to provide real-time data. In this way, IT efficiency directly translates to a more efficient and agile warfighter. WHITE PAPER /4 Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Choose Client Technology to Empower End Users Teri Takai, Chief Information Officer at the U.S. Department of Defense, states that “Information is our greatest strategic asset.” 2 And empowering warfighters with the right information at the right time is critical to mission success. A multi-device environment enables users to carry out their missions by providing them access to information, applications, and data—anytime, anywhere—on any device. Figure 1. Battlefield Mobile Network Configuration Prior to implementation, it is important to determine the types of client technology needed by all users at each step of the information pathway—from programmers to the tip of the spear. Carefully consider each role and the client device(s) that will be most useful. Regardless of the client hardware selected for the new environment, users will no longer lose time and productivity as IT staff works to troubleshoot and fix problems on legacy desktop devices laden with applications and data. Those IT services, along with applications and data, are migrated to datacenter servers that provide high availability through multiple redundant environments. Downtime is reduced, and users are freed from performing IT functions themselves, like software updates and patch installations on client devices. 2 Chief Information Officer website: http://dodcio.defense.gov/ WHITE PAPER /5 Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Even though the applications reside on centralized server(s) in a multi-device environment, users will experience the full application features, like graphics displays, as if the applications were still loaded on their local devices. And users are further empowered with a consistent interface experience across all client devices; this allows them to focus on the information rather than the underlying device that can change depending on mission objectives. Maximize Security Security is a top priority for the DoD and can be dramatically enhanced through virtualization technology. Virtualization is the foundation to implementing and managing a secure, mobile environment. Instead of handling hundreds or thousands of desktop devices requiring individual protection, IT manages security functions primarily on datacenter and network resources. Network protocols, such as NIPRNet and SIPRNet, can be configured as needed to preserve the necessary clearance levels. After end user assets are transformed into centralized services, they can be managed, secured, backed up, and kept current from a single location. Consolidated security management criteria should be evaluated and incorporated into the migration plan. Tracking user events like login, logout, entitlement, and user provisioning can alert IT to anomalous connections from potential attackers. And disallowing automatic logins, along with other software measures, will help protect mission-sensitive networks. Hardware security measures such as a smartcard reader for use with a Common Access Card (CAC) can still be used at each client access point, station, or computer that requires that level of authentication. In addition to centralized system security measures, virtualization software itself works to increase security. Policy-driven access and delivery will safeguard vital data and ensure compliance. Demilitarized zones (DMZs) can be incorporated to help minimize risks associated with components on the internal network interacting with the Internet. The security capabilities of any vendor require careful evaluation for functionality and ease of use. Virtualization software solutions provided by VMware, for example, shield virtualized applications and data with unified, easy-to-use security across all levels; its protection can make virtual assets even more secure than the most fortified physical environment. Consider COOP Like security, COOP 3 can be enhanced in a virtualized environment. For warfighters and other users who need constant access to critical applications and information, loss of connectivity could jeopardize the mission. Providing those users with non-stop access to applications and data should be a focal point of migrating to a new environment. By adding redundancy in the datacenter, in both infrastructure and networking resources, IT can ensure that the field teams have a single window of access to multiple redundant environments, providing them with non-stop access to applications and information, regardless of infrastructure outage issues. Also, since local desktop support is essentially eliminated with centralized applications and data, the deployment of application services to users requires only minutes for the installation of a mobile client. This prevents the loss of connectivity due to local hardware failures. In the event of an emergency or disaster, this almost-instant access to services contributes greatly to increased warfighter mobility and readiness. 3 Lawyer, Calvin D. Colonel, Continuity of Operations Planning (Coop): A Strategy For Implementation, http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA431738 WHITE PAPER /6 Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Evaluate Software Solutions The choice of hypervisor software is the single most important decision to be made before a DoD agency or program can proceed with the virtual desktop infrastructure (VDI) required for a multi-device environment. 4 Essentially the virtualization platform, the hypervisor partitions a physical server into multiple virtual machines that can run simultaneously, sharing the physical resources of the underlying server. VMware vSphere® is the most trusted and highly deployed virtualization platform, delivering industry-leading performance and scalability while setting a new bar for reliability, security, and hypervisor management efficiency. Thousands of software providers, including Oracle, SAP, Microsoft, and IBM, endorse and support deploying their applications on the vSphere platform. In addition to the virtualization platform, software referred to as mobile middleware is needed to streamline and simplify operations by turning disparate operating systems, applications, and data into centralized services deliverable on any device. The software essentially transforms end user assets into centralized services that are administered from a single location. It should provide policy-driven access and delivery to protect vital data and ensure compliance. The software needs to galvanize user productivity by delivering a consistent, intuitive and collaborative computing experience across all devices—anytime, anywhere. VMware® Horizon Suite is one such solution, delivering a personalized, high-fidelity experience for end users across sessions and devices. Your agency or program should carefully evaluate all software factors, including IT deployment processes and software interfaces, provisioning functionality, and end user experience, to determine the best solution for all personnel interacting within the environment. Ultimately, virtualization software solutions need to work with a wide variety of hardware and software, including storage, networking, and security products. An open, standards-based approach to licensing and interoperability is most advantageous, allowing you to use the solutions that best meet your needs without being locked in to specific vendors. 4 Strassmann, Paul A. Desktop Virtualization Offers Benefits Now, Signal Magazine, January 2011, http://www.afcea.org/content/?q=node/2498 WHITE PAPER /7 Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Figure 2. With VMware Horizon View, a component of the Horizon Suite, administrators can leverage an existing infrastructure to secure and manage data on mobile devices Determine Necessary Hardware All hardware elements for the new environment require thorough evaluation. Capacity and sizing requirements for each component—including existing hardware to be leveraged—must be determined to ensure optimal function in relation to overall system performance. Work closely with your virtualization software vendor to ensure that all elements of the architecture design are properly estimated. The vendor can provide a standard, scalable design that is adaptable to your environment and special requirements. Key details about requirements for memory, CPU, storage capacity, network components, and hardware will give IT architects and planners a practical understanding of what is involved in deploying a virtualized solution. The most common problem when configuring hardware is underestimating performance requirements when scaling. Proper consideration should be given to virtual machine overhead associated with the hypervisor and features specific to middleware. Remember that any existing challenges with infrastructure support, capacity plans, and network monitoring will surface as you approach the migration from the back-end infrastructure. A hybrid environment is likely to evolve with the infrastructure and on the client side. Existing desktop hardware, including PCs (also referred to as heavy or thick clients), may continue to be used alongside laptops, tablets, mobile phones, and other mobile (thin or zero) clients. While a PC is fully functional without a network connection, it is considered a client when connected to a server. In your virtualized environment, PC hardware could possibly be reconfigured for security reasons to more closely resemble a mobile client. For the most part, heavy applications and data will reside on centralized servers, and mobile clients will be used to access those applications and data. WHITE PAPER /8 Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Achieve Migration Success In summary, many factors affect the implementation and management of a multi-device environment. First, planning across the spectrum of system elements is imperative. It is important to provide the appropriate balance for performance, capacity, operation simplicity, and future requirements of the client devices and centralized IT services. Software selection is critical, and careful management of all migration aspects is crucial to success. All of these factors directly or indirectly influence the human element of end user acceptance and satisfaction, which is essential to the overall success of a multi-device environment. As the virtual desktop landscape continues to mature at an aggressive pace, all elements contributing to system success will become more clearly defined. Already, efforts associated with migration endeavors are being reduced as more vendors and partners converge on solutions. Together with your vendor of choice, your agency or program can implement a multi-device environment that best supports your organization’s unique mission requirements. Next Steps Partner with VMware The Department of Defense and its administrative agencies, all branched of the United States armed forces, and all joint commands rely on VMware technology to enhance and enable battlefield operations. Today, organizations are already benefiting from VMware’s end-user computing solutions, enabling IT to manage desktops as a cloud-based service—while realizing substantial cost savings. VMware end user computing solutions for defense organizations are specifically built to meet the needs of the warfighter by securely supporting end users across devices and locations. It combines VMware View™ and an ecosystem of products and services to meet requirements for security, rapid and automated provisioning, bring-your-own device (BYOD) initiatives, as well as mobile access across devices. With VMware as a partner, the DoD can confidently move forward into a new era of resource agility, enabling warfighters of today and tomorrow. VMware Contact Information For information or to purchase VMware products, call 1-877-VMWARE (outside North America, dial +1-650427-5000), visit http://www.vmware.com/products, or search online for an authorized reseller. For detailed product specifications and system requirements, visit http://www.vmware.com/products/view/overview.html. WHITE PAPER /9 Using VMware® Best Practices for Implementing and Managing a Mobile, Multi-Device Environment Glossary of Terms Client-Server Architecture – Environment in which server hardware houses the applications and data that are provided to a client system. Demilitarized Zone (DMZ) – A firewall network set up between an organization and an untrusted network such as the Internet. Hypervisor – Software that allows for a physical device, such as a server, to share its resources among multiple virtual machines running as guests on top of the physical hardware. Mobile Client (thin or lean client) – Low-cost, centrally managed computer or mobile device devoid of extraneous hardware and heavy software applications and data. Mobile Middleware – Software that uses a variety of transparencies to connect disparate mobile applications, programs, and systems, hiding the complexities of working in mobile environments. Provisioning – Granting application and data access to clients from a server. Thick Client (heavy client) – Full-featured computers that are connected to a network. Unlike thin clients, which lack hard drives and other features, thick clients are functional whether or not they are connected to a network. Thin Client – See mobile client. Virtualization – Virtualization allows several operating systems and applications to run on one physical server or “host.” Each self-contained “virtual machine” is isolated from the others and uses as much of the host’s computing resources as it requires. Click here to see a virtualization overview video. Zero client (ultrathin client) – a computer with no software and minimum hardware (display, audio and USB) to provide an ultra-low-cost solution for use in a client-server architecture. VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2010 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Document Title Addendum A Checklist for Migrating to a Mobile, Multi-Device Environment Numerous factors affect the implementation and management of a multi-device environment. Ample planning prior to deploying your mobile solution is the single most important step your defense organization can take to ensure a smooth and successful migration. VMware has created the following checklist to help guide you in your mobile migration strategy and implementation—offering best practices from initial strategy development through post-migration management. Migration Elements and Best Practices ☑ Comply with Military Mobile Policy • DoD Mobile Device Strategy • DoD Commercial Mobile Device Implementation Plan • DoD Cloud Computing Strategy For additional military mobile policies you should consider, see Comply with Military Mobile Policy in Best Practices for Implementing and Managing a Mobile, Multi-Device Environment. ☐ ☐ ☐ Manage the Migration • Create a team of migration stakeholders • Plan a phased implementation approach • Build the system from back to front • Conduct pilot testing ☐ ☐ ☐ ☐ The best pilot program choices are in Manage the Migration in Best Practices for Implementing and Managing a Mobile, Multi-Device Environment. Address Legacy Applications and Vendors • • • • Take inventory Determine applications to be migrated Consider new applications needed Contact software companies ☐ ☐ ☐ ☐ Software management and licensing are ultimately centralized and less complex in a multidevice environment. See Address Legacy Applications and Vendors in Best Practices for Implementing and Managing a Mobile, Multi-Device Environment. Prepare IT Staff • Plan for hardware and software training • Transition to centralized operations ☐ ☐ See Prepare IT Staff in Best Practices for Implementing and Managing a Mobile, MultiDevice Environment to discover the most critical IT role during implementation. Choose Client Technology to Empower End Users • Determine devices needed for all types of users • Empower users with consistent interfaces What does the DoD consider its greatest strategic asset? See Choose Client Technology to Empower End Users in Best Practices for Implementing and Managing a Mobile, MultiDevice Environment. ☐ ☐ Document Title Migration Elements and Best Practices ☑ Maximize Security • Determine a plan for centralized data security • Develop a device security mitigation plan • Align hardware and network security with authentication levels • Capitalize on security measures provided by virtualization software ☐ ☐ ☐ ☐ See Maximize Security in Best Practices for Implementing and Managing a Mobile, MultiDevice Environment for details. Consider Continuity of Operations Planning (COOP) • Evaluate virtualization in coordination with COOP • Plan for non-stop access with redundancy in datacenter infrastructure and networking resources ☐ ☐ For more critical planning details, see Consider COOP in Best Practices for Implementing and Managing a Mobile, Multi-Device Environment. Evaluate Software Solutions • Select hypervisor software for virtualization • Select mobile middleware solution ☐ ☐ Which software decision is the most important? See Evaluate Software Solutions in Best Practices for Implementing and Managing a Mobile, Multi-Device Environment. Determine Necessary Hardware • Evaluate all hardware elements for new environment • Determine capacity and storage requirements including legacy hardware to be leveraged • Estimate virtual machine overhead • Work closely with solutions vendor Avoid the most common problem when configuring hardware. See Determine Necessary Hardware in Best Practices for Implementing and Managing a Mobile, Multi-Device Environment. Find Out More By implementing a solution that supports multi-devices and end user mobility, your defense organization will realize the benefits of a more productive, dynamic, and untethered workforce—empowering warfighters for mission success. As a trusted partner to the federal government, VMware can help your defense organization implement solutions to meet the challenges of your missions. For information or to purchase VMware products, call 1-877-VMWARE (outside North America, dial +1-650-4275000), visit http://www.vmware.com/products, or search online for an authorized reseller. ☐ ☐ ☐ ☐
© Copyright 2026 Paperzz