Client
Coforge, formerly known as NIIT Technologies, is a leading global IT solutions organization, providing a wide range of services that enable businesses to strategize, build and leverage emerging technologies to create market-ready solutions with radical benefits.
The Coforge team provides cybersecurity solutions, business process solutions, AI and data insight services and more. They cater to various sectors including travel, banking, healthcare, manufacturing, media, public and retail. The client reached out to Axiom to migrate their virtual desktop infrastructure (VDI) to cloud.
The client was nearing the end of life of Windows 7 desktop and had to immediately migrate VDI to Azure Cloud before the decommission of Windows 7.
Axiom is an end-to-end digital transformation services provider. We believe in “Harnessing the real power of the cloud”. We are an advanced consulting partner with AWS and one among the 30 certified EUC competency partners across the globe. We have been delivering services around DevOps and infrastructure automation to our customers across the globe for more than 5 years. To date, we have delivered over 20+ end to end DevOps projects and have been managing some of them on a 24/5 model. We have a custom automation framework for large scale DevOps deployments.
Axiom suggested adopting Azure cloud for deployment and upgrading the Windows 7 operating system to Windows 10.
This process involved:
• Moving the data from the then existing datacenter to Azure
• Building the Citrix set-up for the customer
• Building the NetScaler gateway for external access
• Configuring two-factor authentication for secure access
The Windows upgrade and data migration was completed in less than 10 weeks with over 5000 VDIs moved from datacenter to Azure.
• Azure as the hosting platform
• Citrix for DaaS (Desktop as a Service)
• Citrix ADC for external gateway
• Okta and Azure MFA for two-factor authentication
Moving to Azure, the client has the option to scale whenever required. Their environment build is now stable and reliable, having minimal downtime, enabling the customer to carry out their operations efficiently.
With two-factor authentication, the client has strengthened their environment’s security
posture.