Access "Is virtual desktop infrastructure the answer?"
This article is part of the April 2012 Vol. 3, No. 2 issue of Network security in a world of mobile workers
As more companies S roll out bring your own device (BYOD) pilot programs, IT organizations are finding that virtual desktop infrastructure (VDI) is one way to provide secure access to corporate assets on mobile devices. Probably the most pressing BYOD challenge for businesses is to provide full application availability to remote devices in a way that is both familiar and secure. While VDI and application virtualization platforms weren’t necessarily designed specifically for mobile devices, they are built to enable user access to enterprise data in a consistent, secure manner on most computing platforms and operating systems. They also enable application portability, data backup and policy compliance for any device tapping in. How VDI works VMware and Array stress application security and support devices that range from Windows desktops to Android smartphones, BlackBerrys and iPads. VMware offers two methods of managing virtual desktops. The first is distributed VDI, which consists of remotely managed virtual desktops running on server hardware at remote ... Access >>>
Premium Content for Free.
Is virtual desktop infrastructure the answer?
by Nathan Eddy
IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.
Networking for BYOD: No single solution
by Rivka Gewirtz Little
An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.
- Is virtual desktop infrastructure the answer? by Nathan Eddy
NAC technology evolves in a BYOD policy world
by Amy Larsen DeCarlo
Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.
Mobile device security best practices for BYOD
by Lisa Sampson, Feature Writer
BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."
- NAC technology evolves in a BYOD policy world by Amy Larsen DeCarlo
Magic Quadrant: Next-generation firewalls are mainstream
by Shamus McGillicuddy
Next-generation firewalls have enjoyed a lot of hype in recent years, but now they are also dominating the market, according to Gartner’s latest firewall Magic Quadrant.
A mobile device security strategy that puts users first
by Christina Torode, Editorial Director
With the right strategy, mobile device security doesn't have to be a compromise between user demands and network risks.
- Magic Quadrant: Next-generation firewalls are mainstream by Shamus McGillicuddy
More Premium Content Accessible For Free
As users carry more devices, wireless network design must evolve
The average person carries three mobile devices, according to an informal poll conducted last year by Sophos Labs. While Kindles and Fitbits probably...
Mobile devices are gobbling up your WLAN bandwidth: Here’s how to cope
More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...
Finally! APM vendors design tools with networking pros in mind
Whenever users complain about an application being slow, the network is always first to be blamed. And yet network engineers often have limited ...