Contact Us

Address: 1st Floor,Building 4, 1088th, Huyi highway, Shanghai
TEL:021-31080981
Email:soline@soline.com.cn
P.C.:201802

Citrix receiver cloud desktop solution

In the traditional IT mode of PC office, problems such as easy damage to PC hardware, multiple system failures, and cumbersome software updates will bring management workload and IT operation and maintenance costs. Using the cloud desktop diskless office system, a one-stop desktop cloud solution can effectively improve deployment efficiency, simplify desktop operation and maintenance workloads, and at the same time ensure information security and achieve smooth mobile office.

95f99c0cdd4fbb8902007d7d5443ec6e.png

1. Desktop virtualization solution goals: current office PC usage status, network viruses, no authority management, high PC maintenance costs, slow system and other issues. Therefore, the cloud desktop diskless office system must be used to solve the problem.

2b0084792a581b64052d8c99193ae691.png

2. Desktop virtualization function architecture: with control layer, access layer, and computing layer. Smoother, more stable, more efficient and safer.1e55919a22f4a74134027ba47aad0d9e.png

3. System principle-centralized storage/distributed computing: extensive and simplified terminal equipment support, you can use various equipment, computers, clients, etc. to log in.2bb8bad2d05dad234acf87fdc3ca9fea.png

4. System principle-disk network integration: unified configuration, the use of security administrators can uniformly configure and manage all desktops and applications in the back-end data center, avoiding traditional management difficulties and high costs caused by terminal distribution.ba54641091bd98251e0937a364620ce2.png

5. Product interface, the distribution is more concise and clear.9584b742409423ec814d33a67d62c6e1.png

6. Product functions: more complete functions.05734d9e47810517a7a0b59a32936e78.png

7. Desktop management: Since the operating system is all deployed on the server, it only takes about 20 seconds for the user to log in to their desktop from the terminal boot. Compared with the traditional PC, the login time of 1-2 minutes is greatly shortened, and it will not appear. The more software is installed, the slower the startup time.c1b8f94906f3befdf8f3ff4686ed8fe0.png

8. Data management: All data and calculations occur in the back-end data center. Confidential data and information do not need to be transmitted through the network, which increases security and ensures that user data will not be lost.b0b7ab9756b11ed3abfa0ff39aab78dd.png

9. Peripheral control supports voice recognition devices, functional keyboards, USB devices, multi-monitor plug and play, which expands the use of virtual desktops on peripherals, meets the needs of different users for the use of external devices, and also satisfies centralized management and control. Prevent data leakage and viruses.e0aade649b5dc9bfe5ee3e52390cbe52.png

10. Security management and control: It has multiple management and control methods, which is more secure. Enhance the possibility that user data will not be lost.a99388e52ead533b72195c5fe73f055f.png

11. Operation and maintenance management: It is an access office, with simpler operation, more efficient desktop management, and more flexible user access.4c9b2b92e778d69ee4105f50efbce7b9.png

12. More functions4461d4a6b0c790fb73cfdf9360130dc9.png

13. Smooth experience: Since all operating systems are deployed on the server and are local data, the operation will be very smooth.b804a9d83222e1cbf36b4dcb53fc37f7.png

14. Tree-shaped snapshot: The system uses tree-shaped snapshots for management and realizes one-click switching of applications. It is a more professional, high-quality, and efficient technology.fe534d3820f84966b31af01fb6da0a32.png

15. Fine-grained file permissions: unified configuration, you can remotely access the desktop system, and get the same experience as the PC; and the administrator can easily complete all management tasks only in the data center.3135e6f8761ca40246ee79fd66c58780.png

16. All-round protection of data security: There are functions such as multi-level recycle bins and data encryption, which increase security and ensure that user data will not be lost.71cc77f274847bdde56147d977ca56bb.png

17. Compatible with all: centralized storage/distributed computing, extensive and simplified terminal equipment support, compatible with all peripherals.13d30f0220e72edf1726b987550facdd.png

18. Seamless management: transparent application, more peace of mind6559724da7b5422950dc330bfc55b971.png

19. Large-scale high availability: Compared with traditional methods, virtual desktops use a large number of lightweight terminals and centralized background computing resources, which can reduce the overall system operating cost by about 80%, and with linear expansion, the benefits and advantages will increase. Outstanding, so it can be used on a large scale.f16cb82de4f69364a54c94be012320ec.png

20. Product value: It can meet the requirements of desktop operation and maintenance personnel to use any device to access software anytime and anywhere, and bring more effective unified management and configuration of application software for enterprises. At the same time, the important data of the enterprise are safe and core data can be prevented from leaking.64edd80b48bd1042660ba67bf4bd9d37.png

21. Comparative advantage3cf310bb294f1558b5cbdb1eb2778254.png