Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Top 10 reasons to strengthen security with desktop virtualization

Victor Tsao | Aug. 16, 2013
New ways of working call for new ways of managing risk.

8. Minimize the impact of information security breaches
No strategy can guarantee perfect information security in perpetuity. An essential part of risk management is being able to limit the damage when things go wrong. Centralized management enables IT to react quickly to a security breach or misconfiguration. The first line of defense is using virtualization to isolate sensitive applications and data and run them on user privilege accounts (instead of user controlled machines), minimizing the impact of the breach of a single component. Even if the machine becomes compromised, the second line of defense resets the image through virtualization upon machine reboot. If the integrity of a user is compromised, such as in a zero-day attack, IT can quickly take down the user's profile and restore it to an uncompromised state by reverting to a golden image. With security measures installed and enforced on every virtual system, damaging attacks are prevented from spreading to other systems -- and IT can immediately update access policies across the environment.

9. Support rapid business growth
When organizations open new branch offices, expand existing locations or acquire other organizations, complex distributed security models can delay the migration process as IT works to secure each new endpoint.

Desktop virtualization allows the organization's existing security model to be extended to new locations, people and groups quickly, easily and cost-efficiently. It simplifies remote office and branch management in several ways, including local lockdown, rapid setup and high availability -- enabling IT to provide instant access to virtual desktops, with no need for network integration. Adding new users to existing groups according to their security profile means that the right policies are applied immediately. As rapidly-growing organizations need flexibility to scale their operations, they can provide secure access to any type of worker in any location on any device.

10. Get security out of the way of users
Traditionally, security has been enforced at the expense of users. They've been allowed to work in limited places, access minimal resources, rely on standard corporate equipment, sacrifice mobility and spend more and more time managing an array of security credentials.

In response, even loyal employees can come to view security as an obstacle to productivity and look for ways to get around it.

Desktop virtualization turns this model on its head. Instead of having to deal with endless details of endpoint security, people simply sign on once to a virtual desktop, with their virtual applications delivered on-demand anywhere they need to work, on the device of their choice. This unaccustomed freedom improves productivity and satisfaction -- all while minimising the risk of a security breach. Policies are set and automatically enforced -- regardless of user or access method.


Previous Page  1  2  3  4  Next Page 

Sign up for CIO Asia eNewsletters.