Access "VDI security supports active protection strategies "
This article is part of the November 2011 issue of Effectively navigating the security risk assessment process
Organizations are embracing virtual desktop infrastructure (VDI) with the expectation of persistent security enhancements and reduced desktop operating costs across the enterprise. This strong coupling between desktop security and IT operations backs up the thinking among early VDI adopters that centrally controlled desktop configurations are more resistant to malware and keeping regulated data off of distributed physical desktops reduces the business risk of a data loss incident. However, realizing these security benefits requires more than simply recreating traditional security in a virtual world; it requires a practical approach to inevitable breaches of desktop security. While defense-in-depth prevention is still critically important to the business, a VDI security-based approach favors active strategies for continuous malware resistance and compliance, data protection and incident response. These approaches are based on the following desktop security observations: It is inevitable that desktops will be breached in the coming year. The traditional ... Access >>>
Premium Content for Free.
PCI council developing point-to-point encryption certification program
by Robert Westervelt, News Director
PCI Security Standards Council plans to release a list of certified components in April.
VDI security supports active protection strategies
by Eric Ogren, Contributor
ISM November 2011 cover story: Eric Ogren on how virtual desktop infrastructure enhances compliance, data protection and malware protection.
- PCI council developing point-to-point encryption certification program by Robert Westervelt, News Director
Overcoming obstacles in the security risk assessment process
by Craig Shumard and Serge Beaulieu
An effective risk assessment process is essential, but many factors can skew the process and get in the way of security.
Cybersecurity threats target lack of SMB security
by Amy Rogers Nazarov
Cybercriminals are zeroing in on small and midsize businesses with fewer security resources.
- Overcoming obstacles in the security risk assessment process by Craig Shumard and Serge Beaulieu
Marcus Ranum chat: Information security monitoring
by Marcus J. Ranum, Contributor
Security expert and Information Security magazine columnist Marcus Ranum talks to Richard Bejtlich, CSO and vice president, Mandiant Computer Incident Response Team (MCIRT) at security firm Mandiant.
The lack of computer security: We’re all responsible
by Elizabeth Martin
We all have an explanation for weak security, but everyone needs to do their part to improve it.
Time for discourse on China computer hacking
by Michael S. Mimoso, Editorial Director
China is being accused of hacking corporate, government and military networks in the U.S. for economic gain. Policy makers need to be versed in cybersecurity and figure out how to respond.
- Marcus Ranum chat: Information security monitoring by Marcus J. Ranum, Contributor
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...