Revitalizing endpoint security with VDI desktops

Revitalizing endpoint security with VDI desktops

Date: Nov 07, 2011

Virtual desktop infrastructure (VDI) is an emerging technology that provides the opportunity to re-architect endpoint security and management. Implementing VDI desktops allows your organization to centrally control desktop images and configurations to lessen the risk of non-compliance with security policies. It also reduces licensing costs and other costs associated with malware and the loss of regulated data. Security must be dynamic, and able to shift in an agile manner between virtual images and locations. In this supercast, you’ll learn about VDI security options available to you, how to evaluate what products best fit your environment and what the ideal configuration and policy looks like.

About the speaker:
Eric Ogren is founder and principal analyst of the Ogren Group, which provides industry analyst services for vendors focusing on virtualization and security. Prior to founding the Ogren Group, Eric served as a security industry analyst for the Yankee Group and ESG. Ogren has also served as vice president of marketing at security startups Okena, Sequation and Tizor. 

More on Client security

  • canderson

    Rise in mobile device platforms increases need for mobile data security

    VIDEO - Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security.
  • canderson

    Malware detection and prevention fundamentals

    VIDEO - Learn about the state of the malware landscape as it pertains to small and medium sized businesses and get a rundown on the most common types of malware.
  • canderson

    Inside the NSA trusted computing strategy

    VIDEO - The NSA’s Tony Sager discusses the NSA trusted computing strategy and the importance of finding cost-effective ways to disrupt potential attackers.
  • social engineering

    Definition - Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.
  • Security Readers' Choice Awards 2014: Endpoint security products

    Feature - Readers vote on the best endpoint security products of 2014.
  • Identity of Things (IDoT)

    Definition - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
  • shadow app

    Definition - A shadow app is a software program that is not supported by an employee's information technology (IT) department.
  • TailsOS

    Definition - TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable storage medium. The operating system and associated applications run from the storage device.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: