ZTE’s Virtualization Solution Enables Access to Cloud Desktop using Laptops, Tablets and PCs

by March 9, 2015 0 comments

ZTE’s cloud desktop solution enables users to access the cloud desktop with the terminal laptop, pad, thin terminal, netbook/cloudbook, or PC at any time anywhere, by innovatively combining high-performance computing and 3D design scenarios supported by the PC-based virtualized desktop and the mobile office, flexible computing, and highly-centralized management scenarios supported by the server-based virtualized desktop.

The solution supports network access at any time anywhere, multi-screen interaction, and account and application data sharing on different screens, completely changing the way PC (desktop) operation and achieving perfect integration of data, application, and management.

This integrated solution takes the technical advantages of both the cloud desktop and PC desktop, and overcomes the bottleneck in the actual deployment of the cloud desktop. Users can access the same data disk from any of the desktops as the data can be shared.

ZTE’s innovative application management method provides enterprises with a new way of application procurement, deployment, and management. Enterprises can centrally manage applications, deploy applications by one-click, and release or destroy applications as required.

The solution supports managing applications centrally among different desktop systems, which can greatly reduce the number of key licenses that enterprises need to purchase and realize the purchase on demand. The cloud desktop also supports centrally managing virtualized software, cloud desktops, desktop users, desktop pools, server-based virtualized desktops, and PC-based virtualized desktops on the same management portal.

The separation of data disks from system disks ensures manageable and controllable data security. Specifically, user data can be stored and uniformly controlled at the server side to prevent illegal data downloading and copying and ensure the security of the user data. As for the safe system access, the cloud desktop solution supports multiple authentication methods, including the USB Key and dynamic password.

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.