Five Ways VDI Can Tighten Business Security
Isolating data and applications in the data center is one of many ways that companies can prevent security incidents using virtualization technology.
February 17, 2016
Companies of all sizes and industries are looking at VDI anew, drawn by virtual desktop technology’s ability to increase business agility, cut costs and improve end user satisfaction. VDI is not new, but the ubiquity of the cloud has added flexibility, performance and resource efficiencies that make it more relevant and accessible to many organizations.
Of course, as with any “new” platform, organizations need to carefully consider the security risks. Fortunately, VDI often tightens security of files, data and applications, as follows:
1. VDI keeps data inside the facility.
With a virtual desktop, the user can’t take the information outside of the organization. “Any changes to the data stay within the organization,” says Brian Miller, systems architect at professional services and integration company Adapture Technology Group. “If a user’s permissions change, the data is secure.
2. Centralization eases threat management.
With all data residing centrally, it’s much easier to detect and isolate threats since IT departments have less to monitor with VDI’s smaller overall footprint, Miller says. In addition, anti-malware, data loss prevention, authentication and other security systems installed at the server level will help protect all connected virtual desktops.
3. Consistent images save time and headaches.
When VDI is deployed as a non-persistent desktop, none of the user settings or data are saved once the user logs out. Users receive a fresh image every time they log on, and at the end of a session, the desktop reverts back to its original state.
“If non-persistent images are used, virus threats are all but eliminated,” says Miller. “Users who download a virus only have to log off the desktop and log back in. This will give them a brand new desktop that is provisioned with the base gold image.”
4. No great loss with lost devices.
Of course, it’s never good to have to replace an end user’s smartphone or tablet because of loss or theft. There’s the expense and inconvenience, and the all-too-real possibility that data on the device will make its way into the wrong hands. With VDI, the user is logging into a virtual desktop from their device and if the device is stolen or lost, there’s nothing lost of business value, says Miller.
5. Fewer hands to manage.
When configured properly, VDI runs with a minimal IT staff. “If it’s a secure facility, you would need less people with clearance working on the environment,” Miller remarks.
Underwritten by HPE, NVIDIA, and VMware
About the Author
You May Also Like