RESCUECOM Advises Businesses on Windows Vista Upgrades in Processor.com Article

Processor.com Quotes RESCUECOM in Article Regarding Windows Vista Issues

PROCESSOR.COM
December 7, 2007:


Vista Voyage

Embarking On A Vista Upgrade Requires Patience, Planning, Testing

Not only are wide-scale data center changes not accommodating for the faint of heart, but they're not exactly friendly even to managers of steel resolve. As such, in the year since Microsoft's Windows Vista ( www.microsoft.com) hit the market, uptake into enterprises has been merely a gradual process.

However, as more time passes, small and midsized enterprises are increasingly under the gun to get onboard with the new Windows operating system. Although many users might hesitate to leave the familiar grounds of Windows XP, Vista offers increased security, management, and other features that can benefit organizations. Those benefits will eventually push most enterprises into adoption, which in turn will spark the need for a solid upgrade plan.

Benefits Abound

According to Josh Kaplan, marketing director at RESCUECOM (rescuecom.com), Vista features that would appeal to the SME market fall into three areas: security, management, and user interface. "On the security side, there is a host of new security initiatives, some of which are built-in anti-malware tools, digital content protection, and network access protection," Kaplan says.

Whereas previous Windows operating systems gave most users access to sensitive administrative functions, in turn making those environments susceptible to malware, Vista employs the new User Account Control, or UAC, feature, which monitors potential administrative changes.

"When a user attempts a task that would require administrative access, like installing software, they are prompted to give consent--or, depending on how they have configured UAC, even to enter administrative credentials to perform the task," says Laural Gentry, product manager with CA (ca.com). "Then, access is elevated to complete only the task for which it was given consent."

Also new is BitLocker Drive Encryption, which Gentry explains will safeguard data even if a user's system is lost, stolen, inadequately decommissioned, or accessed by an unauthorized user. The entire Windows volume is encrypted by Vista, and that volume's integrity is checked when the system boots, helping to prevent unauthorized access.

Vista also brings a wide range of manageability enhancements, including several hundred new group policy settings that managers can use to configure desktop environments. "These policies can be used by administrators to further reduce the security threat surface area of the desktop operating system, compared to Windows XP," explains Gary Darbyshire, director of enterprise infrastructure at Avanade (www.avanade.com).

Plan For Action

Considering that Vista's first service pack won't be released until early next year, current Vista users are considered early adopters, even now. The transition to Vista will be easier once SP1 does arrive, but SMEs must still perform thorough evaluations before embarking on the upgrade. According to Darbyshire, this pre-Vista evaluation should entail a five-step process.

The first step is what he calls "application rationalization." Companies must analyze all of their business-critical applications in terms of Vista compatibility (including whether they can be installed and if they're stable) and in terms of compatibility with the Vista security configuration they choose, Darbyshire says. Another step is determining hardware compatibility, which verifies whether existing hardware meets Vista requirements.

"Once this is done, an organization can create a plan to, one, upgrade specific hardware elements or, two, replace the hardware," Darbyshire says. "Avanade suggests an organization look at existing hardware depreciation schedules and plan a hardware refresh and Vista upgrade that is aligned with it for improved desktop life cycle management."

The hardware evaluation phase can be a very time-consuming process, but it must be accomplished to avoid surprises when Vista arrives. "Unless the SME has an automated way to collect information about the existing memory, its configuration in the box, and whether there are slots available for the upgrade, this is a very labor-intensive process," says Chris Tamblyn, CEO of matrix42 (www.matrix42.com).

Also key to the pre-Vista upgrade process is an evaluation of the current support organization. Darbyshire says that Vista implementation is likely to spark an increase in support calls, so enterprises should examine their existing skills, processes, and SLAs (service-level agreements) so they can plan for appropriate Vista support.

The two remaining elements that managers should address, Darbyshire says, are training, in which evaluations are performed to determine how much training is necessary to get users up-to-speed with Vista, and the overall desktop life cycle, a process that aligns with the organization's hardware depreciation cycle and business objectives.

CA's Gentry notes that it's also important to determine well in advance which Vista edition will be used because this can impact a wide range of preparation details.

Deployment Day

When the Vista preparation is complete, the level of difficulty for the actual upgrade depends on whether a company is replacing existing machines or upgrading existing machines. In either case, Kaplan says, user data must be backed up to a network location and then restored to the upgraded machines.

According to Gentry, tools are available that can automate the tedious process of transferring user data and settings to upgraded machines. "If a number of different tools are used, the process decided upon should be integrated and automated as much as possible," Gentry says. "Automation decreases errors and the time it will take to accomplish a successful deployment."

In the case of a larger installation base, creating a proof of concept can help SMEs avoid potential pitfalls when performing the upgrade across the entire organization. Tamblyn says this proof of concept should determine how to distribute the operating system and applications--for instance, if imaging is used, images will need to be created for varied systems. Also included in the proof of concept is a pilot, in which Vista is rolled out to subset systems in a production test, and rollback planning, just in case.

After the actual upgrade, experts recommend communicating heavily with the user base to receive feedback and provide necessary assistance and training. For example, satisfaction surveys can be distributed and compiled to determine areas of weakness that support personnel can focus on to improve user satisfaction.

by Christian Perry

Google Reviews

Carli Wittkowski
Carli Wittkowski
in the last week
Amazing service! This is my first time with Rescuecom and I am extremely pleased. Great Customer se
...Amazing service! This is my first time with Rescuecom and I am extremely pleased. Great Customer service and so very helpful. I would most definitely recommend. less
Karen Beller
Karen Beller
a week ago
Rescuecom is excellent. I was scammed and Roy cleared my desktop. Excellent service and Roy was very
...Rescuecom is excellent. I was scammed and Roy cleared my desktop. Excellent service and Roy was very knowledgeable. Thank You. less
Robin Penick-Funderburk
Robin Penick-Funderburk
2 weeks ago
A hacker with the alias "DEATHRIDGE" entered a company Teams meeting via someone invited as a guest,
...A hacker with the alias "DEATHRIDGE" entered a company Teams meeting via someone invited as a guest, and started taking control of my computer and my life. They sent emails pretending to be me that really looked like they were coming from me. They tried to take control of our corporate bank accounts, added themselves as a user to my Microsoft account, and locked me out of my computer as my passwords no longer worked. My ability to run a telecom company ground to a halt, and all my company and personal information was at their fingertips. I felt so helpless, and I needed folks smarter than the hacker(s) to do battle for me. Our typical computer pros couldn't handle it, and neither could other "experts" I called. Lucky for me I called RESCUECOM, and they immediately got to work. They didn't complain though I was asking for help in the middle of the night, but immediately got to work and worked non-stop to restore everything and protect me going forward. The team at RESCUECOM are my knights in shining armor, and they're the absolute best! less
Krishna Kambhampati
Krishna Kambhampati
2 months ago
Roy was very helpful for fixing my booting issue. I called really late (10pm) and there was someone
...Roy was very helpful for fixing my booting issue. I called really late (10pm) and there was someone to answer my call. I would recommend them to anyone that needs tech support. less
View all Google reviews

Featured in:


Feature Inthe New York TimesFOX NEWSUSA TodayComputer WorldCNNForbes