Manufacturing company in GAMO Cloud. About 60 users including designers working in 3D, approximately 20 workstations managing production, around 10 mobile users at the sales offices in the Slovak Republic.
The cloud-based solution for K-system Company is built on the concept of maximum availability not only in terms of the operating environment but also Internet connectivity. The built solution combines a public cloud along with a private cloud enabling use of VDI technology – Virtual Desktops.
Virtual desktops provide lots of advantages not only to IT administrators but also to engineers in production, merchants in sales studios and other employees. VDI technology offers users full desktop functionality. They are able to access their desktop from anywhere, from the office as well as outside the company. They have systems available that aren’t natively designed for remote access. Connection is possible from a laptop, mobile phone or a tablet with Internet connectivity. Corporate data is secure as it never leaves the data centre. Due to acceleration, adding additional performance in the cloud-based architecture, engineers and designers can also use the graphical interface on desktops that don’t have the performance of expensive workstations.
The flexibility of a cloud-based environment also brings benefits for IT staff. It is characterised by the shorter time needed for migration to a new version of the operating system, upgrade or installation of software. A new employee can access the work environment in a few minutes and almost instantaneous changes in applications are possible for all users.
The transition of IT systems and business applications to GAMO Cloud and the use of VDI desktops have significantly reduced the number of service tickets solved by IT administrators, without change or impact on end users – the workers have not recorded any discomfort in providing services.
The GAMO Cloud solution built at K-system uses the innovative SDDC technologies concept by VMware (HCI, VSAN, NSX and Horizon).
Security rules optimization according to client’s requirements, monitoring and evaluation of security incidents including taking the measures to eliminate them. Encrypting data communication within the WAN network.