Contact Us

|

Careers

|

Change Locale
close

When Your Desktops Go Virtual, Don’t Forget About Security

From the experts | Posted on May 4, 2012 by Stephen Perciballi

The right VDI security achieves the costs and efficiencies your enterprise is looking for.

As server virtualization continues to go mainstream, achieving significant savings by optimizing resource utilization, many organizations are taking the lessons learned and benefits achieved and setting their sights on an even bigger challenge and opportunity: the desktop.

Desktop virtualization – or VDI for short – combines the robust virtualization technology from server virtualization with advanced session management and innovative network protocols to provide a user experience very similar to working on a dedicated desktop PC. But, with server hardware shared by multiple desktops (all completely isolated from each other), overall resource utilization is much more efficient – and that’s just the tip of the iceberg.

Additional benefits include:

  • Streamlined deployment helps users become productive sooner, as new virtualized desktop deployments are as easy as creating a copy or clone of that base image and spinning it up as a new instance on the VDI host system
  • Extended endpoint hardware refresh cycles since all operating systems and applications are run on powerful central servers and hardware performance on actual desktop PCs is minimized
  • Easier regulatory compliance because with VDI all systems are centralized in the data center
  • Easier desktop backups since they’re no longer dispersed on desktop computers everywhere
  • Easier maintenance with patches, new software deployment and even adding RAM or hard-disk capacity done at the central server level
  • Better data protection because confidential or sensitive data is no longer on dispersed endpoints but resides on a central server which never leaves the secure boundaries of the corporate data center.

Speaking of security, while all VDI desktops need some, requirements vary significantly depending on the use case. Why? On one side, you may have a knowledge-worker scenario with long-lasting sessions on dedicated, persistent desktops with access to critical corporate data and full access to the Internet.

And on the other side, you have desktops that need to be re-created on the fly as multiple users log in. This wide range means you need comprehensive protection and cleaning capabilities or an agent-less solution with basic anti-malware protection but not a lot of management overhead.

The dynamic nature of the desktop requires a combination of technologies to effectively protect virtualized deployments including:

  • Preventing exposure to threats with cloud-based security
  • Detecting malicious files at the endpoint in real-time while maintaining system performance and keeping a small footprint
  • Shielding vulnerabilities before patches can be deployed
  • Regular full-system scans to detect and remove malware that might not have been detected earlier

A variety of virtualization security solutions now exist to effectively secure your desktop virtualization deployment, regardless of your scenario. This is key to maintaining performance and productivity without compromising the privacy and security of either the system or user. The right VDI endpoint security also ensures the cost and efficiency advantages organizations are adopting desktop virtualization for in the first place.

To read more about today’s biggest virtualization challenges, download our whitepaper.

You might also enjoy a related Post on our Advisor blog: Virtual Desktops Get the Security Once-Over From Trend Micro & VMware.

Related Posts

Your Network is Talking to You – Are You Listening? Back in the golden age of IT ( about 8 years ago),  the only thing you had to worry about running on your network was data. It was easier then to troubleshoot problems and...
The color of your cloud  The term “cloud” in IT today evokes many responses, feelings and ideas on its purpose, makeup, and overall value to an organization. Some believe “cloud” is exclusive to IT s...
The Winchester Mystery House – Don’t Let It Happen To You! Recently Stephen Speirs from Cisco wrote a blog post about The Winchester House, as an analogy to explain how IT often evolves in unplanned ways. I’d like to extend Steph...

Related Articles

Culture | October 10, 2019 by Alex Macks

Softchoice’s co-op students are hired for their fresh ideas and wealth of knowledge they bring to our Softchoice teams. Ranjit Singh wrapped up his third consecutive co-op term with Softchoice in Summer 2019. He now works part-time as a .NET Developer while completing his last semester at Sheridan College in the Software Development and Network […]

Innovation Executive Forum | September 13, 2019 by Karen Bader

Enterprises today understand the requirement to combat slow and low end-user adoption, especially when the solutions are intended to transform the way people work, as with new communications and collaboration tools. For years, Softchoice has been offering end-to-end, turnkey adoption services, helping businesses across North America unlock more value, quickly, from their key collaboration investments. […]

Uncategorized | August 28, 2019 by Susana Byun

Here are your top 10 must-read Microsoft announcements from August 2019 curated by Softchoice: