System Contractor News Names RemoteAccess-CPU as Product of the Year
Integrating virtual machines in KVM installations and operating them remotely – with this solution, G&D’s RemoteAccess-CPU impressed the jury of this year’s System Contractor News Innovation Awards. The U.S. magazine awarded the KVM system as Product of the Year 2020.
With their product launch, KVM experts Guntermann & Drunck GmbH (G&D) are hitting the nerve of the times by supporting cloud computing and virtualisation processes in companies in order to enable hybrid infrastructures. The new modules establish a connection between matrix systems and virtual machines, which can be accessed remotely via network protocols (RDP, VNC and SSH). This way, hybrid systems with real and virtual computer infrastructures can be optimally implemented.
The RemoteAccess-CPU gives users a convenient solution with high integrity. Users simply select the desired source from a standardised select menu (target list) on the on-screen display – regardless of whether the computer is available in the server room, via network protocol or in the cloud. With its integrated thin client functionality, the RemoteAccess-CPU offers users a highly integrative connection setup without having to use a separate thin client.
More secure and focussing on usability
But how exactly is a connection established? In hybrid systems, the RemoteAccess-CPU acts as a remote gateway to access virtual machines (remote targets). Users can choose between and operate all available virtual machines, but only one at a time. But what would happen if multiple users wanted to operate a number of virtual machines from multiple RemoteAccess-CPUs? And what if important connections to critical servers need to be kept free at all times? With their pooling function, G&D provide an innovative and rock-solid solution. Thanks to this function, specific remote targets can be combined with one or more RemoteAccess-CPUs to form a remote pool. This means that the selected remote gateways are always exclusively kept free for these targets. As a result, predefined virtual machines remain accessible at all times.