Virtual desktop security software guarantees remote client Security

Source: Internet
Author: User

While most it people know about virtual desktops and know they can be used in data centers, a useful use of this technique is often overlooked. Desktop virtualization is now very lightweight, and employees can connect remotely to the applications they need, while at the same time better secure their devices.

I recently talked to an Atlanta financial company who used the security technology of Ringcube Technologies company Virtual desktops and the Safeboot disk encryption feature of McAfee's products to ensure the security of remote clients.

Security, especially the need to enforce standard configuration and device usage policies for remote users, is the primary motivation for supporting the enterprise's virtual desktop use. The business requirement is to have a secure environment while reducing costs when remote users access the corporate network via VPN. What a remote user needs is a VPN client, a basic e-mail agent, ie browser, Microsoft Office desktop application, and a few third-party applications.

Instead of trying to micromanage each remote laptop, the company's IT department simply manages the core components that allow access remotely, including cleaning up executable and effective device control policies. It has a strong application that can run on the terminal independently of other executables on virtual desktops and business processes to reduce the risk of malware infection. The end user clicks on the icon to start the virtual desktop, which is run independently in the local environment.

Virtual desktops can assist IT departments in implementing an acceptable use strategy for devices, especially for USB interfaces. Remote users cannot arbitrarily put data on a removable device, so that the IT department's reading of device data will be out of control, which could affect the virtual desktop's sessions (session). Because policies are centrally managed, IT departments can also relax their control strategies for user devices when necessary.

In order to prevent the loss of data after the notebook computer leaks, those sensitive data needs to be centralized for full disk transparent encryption. If an employee's laptop is lost or stolen, this encryption can compensate for the loss of data leaks.

In my discussions with the finance company, the IT department said that the number of remote users calling Helpdesk has decreased a lot because it has configured virtual desktops, including VPN software, to reduce end-user errors in VPN profiles and installations.

It has also found that a single refresh of the virtual desktop takes less than an hour, which saves a lot of time, totaling about 3 hours per refresh. The IT department says there is less demand for IT resources when repairing software for remote users. These remote users often experience hardware failures and loss of equipment to purchase new laptops.

Although not yet implemented, the company also wants longer-term returns from end-investment and closely monitors the deployment of software to obtain more favorable software approvals.

The company's experience is worth affirming, both in the IT community and in the user community. The company is expected to launch a virtual desktop by the end of the year. Virtual computer and MOKA5 are two other vendors specializing in desktop software, which also provide a platform for the security requirements and business controls of remote clients. There are other forms of virtual desktops that are also focused on security, including the products of Citrix Systems and VMware, which are run by large financial institutions on their thin clients.

Security is a key determinant that enables IT organizations to focus on using virtual desktops to control terminals. In this case, the company is not only able to mitigate the threat posed by the increase in the number of remote users, but also to save costs by reducing expensive helpdesk requests, and to prolong the life of the employee's notebook computer.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.