Introduction: As the epidemic becomes normal, how can enterprises cope with the challenges brought by “remote”?

In the context of the pandemic, many enterprises are choosing telecommuting to ensure normal business operation. What technical capabilities do telecommuting solutions need to meet the challenges posed by “remoting”?

First, flexible scalability. In case of an outbreak, enterprises need to quickly deploy new office machines for employees to adapt to telecommuting from home; In daily use, new employees and branches need to be equipped with flexible office platforms.

2. Cross-network capability. When employees work at home, they need to access office resources from the external network to the internal network, and office devices are required to support cross-network access to office resources. Mobile office is also required on weekdays to adapt to business trips and branch offices.

Three, across the terminal capacity, in the case of an emergency isolation, employees may need to telecommute from personal computers, access to the corporate network resources, some cases even need through the resources of the mobile terminal access office PC, such as: drawing code sharing, debug, etc., and the employee personal computer security is weak, needs to have a cross platform support terminal capacity.

Fourth, operability. Originally, IT personnel only need to operate and maintain office computers on the Intranet of the company, while telecommuting undoubtedly puts forward new requirements for operation and maintenance. IT is also a great challenge for enterprises to effectively operate and maintain IT resources without contact.

Five, data security, the biggest challenge for enterprises is to ensure their own data security, to ensure that the company’s core assets do not leak, especially research and development code, financial data, design drawings, etc.. The enterprise needs to take various precautions to ensure data security on the Intranet, especially when working remotely.

Vi. Cost: The epidemic has a serious impact on the operation of most enterprises, and many enterprises have reduced their expenditures. Enterprises also need to pay attention to how to build telecommuting capability under the condition of controlling the overall cost input, or even reducing the investment.

With these considerations in mind, we have combed through several telecommuting options on the market and compared them as follows:

It can be seen that cloud Desktop DAAS (Desktop As A Service) mode perfectly meets the needs of remote office from all aspects, especially in emergency situations, only cloud Desktop can meet the contactless minute delivery, which also leads to our protagonist today: Ali Cloud shadowless cloud computer.

Wuying Cloud computer is a DAAS solution launched by Ali Cloud in 2021 after several years of research and development by combining various technologies and resource advantages.

Shadowless cloud computer can deliver a complete office ecosystem for customers, which can not only optimize the office cost of enterprises, meet the needs of remote office, but also make operation and maintenance more convenient; The operation and maintenance of infrastructure is set up by Ali Cloud, and enterprises open it on demand. They only need to pay attention to the enterprise security policy and ensure data security. Data is stored in the cloud without landing, reducing the risk of data leakage. In addition, shadowless cloud computer system application ecosystem provides an open environment, supporting cross-terminal, cross-system, cross-application and multi-protocol access.

The following is a detailed interpretation of the shadowless cloud computer telecommuting solution. The following is the shadowless cloud computer telecommuting solution:

Program Introduction:

The middle part is Aliyun Shadowless desktop resources, which is mainly used to open cloud desktop services for enterprises and users, including storage, desktop/desktop pool construction, and related capabilities of applications and general servers.

Among them, in the aspect of storage, wuying Cloud disk and Ali Cloud NAS products have carried out the construction of the overall scheme to ensure data storage sharing and security; In terms of server, for different general servers (compiler server, mail server, etc.), Shadowless can be connected and connected to ensure the security of the server on the cloud.

In order to ensure data security, Shadowless cloud computer ensures network security control, data leakage prevention, desktop security management and behavior audit. It integrates wuying’s own policy management capability, network security capability built by Ali Cloud security team, and security system of general server and third-party ecosystem.

After opening the cloud desktop, users can connect to their own cloud desktop according to their own requirements. Ali Cloud also provides different connection modes for different office modes:

Scenario 1: Employees directly log in to the cloud desktop instance (with public network access permission) to work remotely. The cloud desktop client has encryption and secure transmission capabilities.

Scenario 2: Employees securely access the VPC network of the cloud desktop using SSL VPN or SAG, and then log in to the cloud desktop instance (without public network access permission) to work remotely. The cost of this scenario is higher than scenario 1, but the security is better.

Scenario 3: The CLOUD desktop VPC communicates with the customer’s offline IDCs through IPSec VPN tunnels or physical dedicated lines, and employees can use internal applications and resources on the cloud desktop.

Employees can access the cloud desktop using their own computers, company-configured PCS or shadowless hardware terminals, or even mobile phones.

The shadowless telecommuting solution has the following advantages:

One, elastic expansion

The shadow desktop built based on aliyun’s resource pool can provide massive computing resources, covering the service range of the whole country. Users can purchase the smallest one and upgrade specifications at any time. It also provides a variety of specifications for different application scenarios, such as: Graphics, rendering, etc., can be used by GPU resources, as well as desktop resources for common office and R&D scenarios. Contactless minute-level delivery can be supported in case of emergency isolation, and enterprise services can be quickly supported with security.

Two, any network connection

Employees working at home, on business trips, and in branches can access the cloud desktop as long as the network is accessible.

Three, any terminal connection

Employees who work at home or on business trips can use portable devices, computers, pads, and mobile phones to access the secure network. In addition, MoVIDEO also provides a variety of professional thin terminals for users to choose from.

Four, easy operation and maintenance

Enterprise IT personnel do not need to pay attention to the operation and maintenance of physical devices such as background servers, storage, and networks, but only the operation and maintenance of business applications, which greatly simplifies IT operation and maintenance, releases IT manpower, and puts them into more effective work: 1) The cloud desktop achieves desktop maintenance and management efficiently and conveniently through centralized control on the console, and supports centralized o&M management of applications. 2) Maintenance operations such as cloud desktop creation, allocation, and reclamation can be performed in a centralized manner on the console, which is convenient and efficient. 3) Greatly shorten the IT facility preparation time, achieve minute level delivery desktop, greatly improve IT efficiency.

Fifth, data security

Comprehensive data security system can ensure the convenience and smooth operation of enterprise business, but also ensure the safety and reliability of enterprise assets:

1) Data is not landing. The shadowless cloud computer stores all data in the cloud and supports PDS cloud disk. Enterprises share NAS for data storage, so that sensitive and confidential data of all departments can be guaranteed.

2) Peripheral control. Enterprises can customize security policies for shadowless cloud computers to strengthen data security control, such as restricting access to peripherals, blacklist and whitelist, and sticky boards.

3) Ensure access security. Data transmission using stream technology, protocol encryption, only image transmission, not business data transmission. Interconnecting with the ENTERPRISE management platform (AD), multi-factor authentication, and SINGLE sign-on (SSO) are supported.

4) Resource resilience. In the face of business flexibility, business expansion or adjustment, Wuying can easily cope with, through instant opening, flexible online, elastic shrinkage of computing power, payment by volume, help enterprises to adjust the use of equipment at any time in the face of business expansion.

5) Unified management of software. For desktop installation software, Wuying provides wuying Application Center, which has a rich library of legitimate software. In addition, the enterprise can manage its own software or licenses, manage all applications, and allocate them on demand.

Six, asset light operation

Enterprises can purchase and open the desktop cloud platform on demand and expand the capacity on demand. In case of emergencies or temporary use, enterprises can open the desktop cloud platform on demand and release it immediately after use. They do not need to purchase a large number of servers and storage to build a private desktop cloud platform, nor need to purchase a large number of PCS and notebooks, which greatly reduces the TCO of enterprises.

At present, Muying has assisted enterprise cloud office in multiple office scenarios, and built cloud remote secure office solutions for multiple customers.

In the future, we look forward to the ecological integration of Wuying and the power of more industries, providing customers with a more efficient, safe and easy-to-use office environment, and leveraging thousands of industries to accelerate the realization of digital transformation.

The original link

This article is the original content of Aliyun and shall not be reproduced without permission.