Welcome to the virtual desktop

How it works

We will conduct an audit of your IT environment to understand application mix, device compatibility, staff needs and the size of your data. This information will frame a target end-state reflecting the mix of Virtual Desktop or traditional Device Management services needed to enable your business’ modern working arrangement. We will then pilot and migrate your applications and data to the new architecture during agreed maintenance windows. For any non-standard applications – that is, applications that are specific to your business – we will test the application with you in the environment before you make any decisions.

Cost Benefits

As the computer desktop is delivered from the cloud, the user device can be a low-cost computer of simple terminal that is more reliable. This is particularly useful in factory environments or customer service situations where multiple staff share a terminal across different production shifts. These shared computer situations can also benefit from shared licensing for Office 365, multiple staff can share one license instead of purchasing one per staff memeber, and so saving on licensing costs.

In addition, initial set-up fees may apply to bring the currency of your existing IT up to the level necessary for the technology being deployed, this will be discussed before implementation. Standard inclusions:

  • Microsoft software licensing for the Microsoft 365 Suite and email system.
  • Hardware refresh.
  • Routine maintenance and  monitoring.
  • Option to backup user data.

Device Management

Where device connectivity cannot be assured or the rich desktop and application experience is needed on-device, our Device Management service will enable a safe and productive device experience. Our Device Management service uses Microsoft’s Endpoint Manager technology combined with our Service Desk capabilities to provide a complete device support outcome for your
business.

Our Device Management service provides:

  • Control of user access to applications and files based on the device and user attributes. For example, on company devices an ‘as in-office’ experience is allowed, for a personal tablet at home some files may be restricted from use or some applications may allow the reading of data but not writing.
  • Detect and automatically fix application vulnerabilities & act on suspicious activity.
  • Support for staff to bring your own devices (BYOD).

Reporting & management of device lifecycle and compliance to organisational standards.

  1. Home
  2. CYBER SECURITY AND MODERN WORK
  3. Modern Working