Show Contents / Index / Search

Planning your Installation and Deployment

You can choose from several different approaches for installing and deploying Reflection for Secure IT. Deciding which approach to use is typically based on a variety of factors, including: your approved business processes, the scale of the deployment, your deployment tools, and whether you want to customize the installation.

For example, a small-scale deployment might consist of using the Attachmate Setup wizard to install Reflection for Secure IT on a few workstations, whereas an enterprise-wide deployment would probably involve extensive customization and testing.

Depending on your requirements, you would most likely use one of the following approaches.

Performing a Workstation Installation on each Workstation

With a workstation installation, you install all of the files for Reflection for Secure IT to a PC hard drive. You might choose this approach if you are installing Reflection for Secure IT on a small number of machines and you do not need to customize the installation.

Performing a Basic Deployment

With a basic deployment, you perform an administrative installation to copy Reflection for Secure IT files to an administrative installation point. This is also called creating an administrative installation image. You would then use deployment tools to access these files and create packages that are deployed to workstations. A basic deployment is a good choice when you need to deploy Reflection for Secure IT to a large number of workstations but you do not need to customize the installation.

Performing a Customized Deployment

With a customized deployment, you perform an administrative installation to copy Reflection for Secure IT files to an administrative installation point (just as you would for a basic deployment). You would then customize the installation to specify the way it installs, looks, and acts on the end users' computers. Customized deployments can be used to deploy to any number of workstations.

In this scenario, you can provide users with customized workspaces and session documents.