Issue link: https://insights.oneneck.com/i/1422692
8 End-User Computing For Dummies, Nutanix Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. These are common components in end-user computing environ- ments. As you consider different end-user computing solutions, the components that you need to deploy may change dramatically. For example, as you deploy VDI, you need to add all of the components necessary to support that environment, including brokers, gate- ways, and much more. Chapter 2 goes into greater depth about these components. The decisions you make about the type of end-user computing environment you'll operate dictate the components that you need. Decisions can get complicated quickly, and you need to look at options that can reduce the complexity. Comparing Desktop Architectural Options None of the options at your disposal when you choose a desk- top architecture for your organization are mutually exclusive. You can deploy multiple architectures if you have a variety of needs, Component Description Security services Your environment needs to be inoculated against viruses and other malware. Endpoints are generally imbued with antivirus software, firewalls, and other tools to make sure that they stay safe. For laptops and other portable devices, a virtual private network (VPN) service may be installed to protect network communication. Identity management and access authorization Interconnected desktops need to maintain connectivity to centralized authentication services, such as Active Directory, to track who has access to the desktop and what they're allowed to do in the rest of the environment. Network connectivity A long time ago, disconnected desktop computers ran local applications. That hasn't been the case for a long time and network connectivity of some kind today is essential. Availability services People often think of traditional end-user computing environments based on desktops and laptops as something less than critical in the event of a disaster. Nothing could be further from the truth. TABLE 1-1 (continued)