• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Microsoft Teams backup: Are you doing enough to protect your Office 365 environment?

      In this webinar we explore the value of using a third-party backup and recovery solution for Microsoft Teams and the services that underpin it – securing your settings, members, team structure, channels and tabs.

      • Date: 24 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      event logo
      Deskflix IT Leader's Summit

      Six months on from our inaugural IT Leaders’ Festival, Deskflix IT Leaders’ Summit is a chance to take stock and reflect on the first quarter of 2021. How did you overcome the obstacles of 2020? Was progression as expected? What were your biggest threats and biggest growth opportunities?

      • Date: 24 Mar 2021
      event logo
      AI & Machine Learning Awards 2021

      The Computing AI & Machine Learning Awards recognise the best companies, individuals, and projects in the AI space today. The awards cover every corner of the industry: security, ethics, data analysis, innovation and more, as well as showcasing the movers and shakers: the technology heroes and projects that deserve industry-wide praise. The winners will be announced in London on 1 July 2020. Entries are now open!

      • Date: 09 Jun 2021
      • TBC, London
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
 

Sponsor content:

What's this?

This content has been provided by our sponsors and is a paid advertisement.

  • Operating Systems

How browser-based containerisation is redefining legacy application delivery

 The true heir to the “any app, any device” mantra?
The true heir to the “any app, any device” mantra?
  • Sponsored by Droplet Computing
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

Microsoft is driving its Windows customers to an ‘evergreen' operating environment, where the OS is kept perennially updated and market segmentation and security threats are reduced. The end goal is a Desktop-as-a-Service model called Windows Virtual Desktop. However, given many organisations' dependency on legacy applications, this ideal is beyond the reach of some, and Windows's chequered past when it comes to update reliability and compatibility leaves IT decision makers unwilling to leave critical applications at the mercy of OS updates.

The traditional alternative has been to either retain operating systems beyond their deprecation. It's often the largest and most specialised organisations, with heavy dependencies on proprietary software, such as the NHS, that find themselves reliant on legacy systems. The staggering cost of modernising this infrastructure, on an already strained budget, makes it an unrealistic option.

However, remaining on any Windows OS pre-Windows 10 isn't a viable long-term solution. Many companies have been caught out by having to pay eye-watering sums for bespoke Microsoft support to ensure the security and stability of Windows XP after official support has ended.

The sensitive data held by the likes of the NHS, as well as the critical work they do, also raises the vulnerability of legacy IT dependency. 2017's WannaCry ransomware attack exploited Windows systems that were past their end-of-life, affecting some 70,000 devices in the NHS alone - bringing critical services to their knees.

Securing your legacy

So, if updating Windows is impractical or impossible for your organisation, and the status quo is unsustainable, what's the alternative?

We previously reported on how semi-connected containerisation is helping to overcome the limitations of virtual desktop infrastructure (VDI). The same technology can enable organisations to continue to use those applications on which they depend, regardless of their OS requirements, ensuring their security in the process.

It's probably more useful in this context to refer to such applications as ‘production applications' rather than ‘legacy'. This better conveys the key role that these programs play in the enterprise today. It most cases significant time and money has been invested in their development, support, and related staff training. Often, the only motive for re-platforming is lack of OS support.

Given the power of the modern browser, using it as a virtual machine in the same way that traditional virtualisation has utilised hardware makes a lot of sense. It can be used across devices and OSes. By running production applications on a barebones version of the required OS, in a container (hosted on the end device) security fears can be nullified.

Compatible by design

Droplet Computing takes this approach, with their sandboxed browser-based containerisation (which can run offline as well as online). It is underpinned by WebAssembly and is able to enforce the same-origin and permissions security policies of the browser too.

This method maintains the version-less, feature-tested, and backwards-compatible nature of the web. These compatibility benefits outstrip those offered by VDI too, given the wider OS support and driver compatibility.

The absence of virtualisation also means there's no need to package apps. They're simply installed within the container, via a standard executable file. This means you can use the same SETUP.EXE and MSI files that you do today.

Once installed, apps behave and appear identically to how they did previously, ensuring a consistent user experience across devices. This familiarity extends to the deployment of the containers, too. Existing methods, such as SCCM, can be used to manage the process, which involves just a single installer, plus the container image.

Together, the strengths of the native container approach allow businesses to focus their resources and strategy on business objectives, rather than wrestling with their legacy computing requirements - greatly extending the life of critical production applications beyond the operating systems on which they depend.

It's a refreshing counterpoint to the constant demands on IT leaders to re-platform and restructure. It is innovation without losing what you've grown - repotting in place of reseeding - more ‘continuity' than ‘disruption', but no less a game changer for that.

  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Operating Systems
  • industry voice
  • containerisation
  • desktop-as-a-service
  • Droplet Computing

More from sponsor

Semi-connected containerisation: Overcoming VDI's connectivity conundrum
Semi-connected containerisation: Overcoming VDI's connectivity conundrum

Could desktop-based containers tackle the enterprise’s VDI shortcomings?

  • Cloud Computing
  • 22 May 2019
Interview with Droplet Computing, winner of the UK Innovation and Entrepreneurship Award
Interview with Droplet Computing, winner of the UK Innovation and Entrepreneurship Award

Droplet Computing discusses winning the UK Innovation and Entrepreneurship Award at the fabulous UK IT Industry Awards 2018

  • Leadership
  • 10 December 2018
blog comments powered by Disqus
Back to Top
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading