Revitalizing endpoint security with VDI desktops

Revitalizing endpoint security with VDI desktops

Date: Nov 07, 2011

Virtual desktop infrastructure (VDI) is an emerging technology that provides the opportunity to re-architect endpoint security and management. Implementing VDI desktops allows your organization to centrally control desktop images and configurations to lessen the risk of non-compliance with security policies. It also reduces licensing costs and other costs associated with malware and the loss of regulated data. Security must be dynamic, and able to shift in an agile manner between virtual images and locations. In this supercast, you’ll learn about VDI security options available to you, how to evaluate what products best fit your environment and what the ideal configuration and policy looks like.

About the speaker:
Eric Ogren is founder and principal analyst of the Ogren Group, which provides industry analyst services for vendors focusing on virtualization and security. Prior to founding the Ogren Group, Eric served as a security industry analyst for the Yankee Group and ESG. Ogren has also served as vice president of marketing at security startups Okena, Sequation and Tizor. 

More on Client security

  • canderson

    Rise in mobile device platforms increases need for mobile data security

    VIDEO - Video: Karen Scarfone of Scarfone Cybersecurity explains why mobility may be the biggest challenge facing enterprise endpoint security.
  • canderson

    Malware detection and prevention fundamentals

    VIDEO - Learn about the state of the malware landscape as it pertains to small and medium sized businesses and get a rundown on the most common types of malware.
  • canderson

    Inside the NSA trusted computing strategy

    VIDEO - The NSA’s Tony Sager discusses the NSA trusted computing strategy and the importance of finding cost-effective ways to disrupt potential attackers.
  • Identity of Things (IDoT)

    Definition - The Identity of Things (IDoT) involves assigning unique identifiers with associated metadata to devices and objects (things), enabling them to connect and communicate effectively with other entities over the Internet.
  • shadow app

    Definition - Shadow apps are software-as-a-service (SaaS) applications that are used on business networks but are not supplied by the IT department or even visible to them. Shadow apps are often collaborative software, such as unified communication and collaboration (UCC) applications that enable greater productivity in the office.
  • TailsOS

    Definition - TailsOS is a LiveDistro-based operating system that is configured to run from removable storage and to leave no information stored on the computer after the user’s session. A LiveDistro is a distribution of an operating system on some bootable storage medium. The operating system and associated applications run from the storage device.
  • SmartScreen

    Definition - SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts. Introduced in Windows 7's Internet Explorer 8, SmartScreen uses a whitelist of trusted sites collected from the surfing data of other IE SmartScreen users.
  • Mobile security market moves away from FUD

    News - Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.

    ( Jul 02, 2014 )

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: