• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Virtualization   »   Solving security through desktop virtualization

Solving security through desktop virtualization

  • Posted on:January 10, 2012
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
0

Desktop virtualization can be a uniquely effective strategy for securing business data, particularly as employees access company resources from a wider range of locations and devices. However, it remains to be seen whether these benefits will be enough to overcome the hurdles of cost and complexity and inspire a wave of new deployments.

By virtualizing an employee’s desktop interface on a remote server, users can access all necessary programs, applications and data from PC and mobile platforms – in or out of the office. According to ServerWatch, this approach often leads to increased workforce productivity while allowing network administrators to bolster data security through a convenient, centralized management model. Virtual desktop infrastructure can also serve as a reliable mobile device management platform and facilitate fast, cost-effective scalability.

As companies continue to search for the best way to embrace workforce mobility without ceding security and control, Citrix Systems expects many to turn to desktop virtualization in the coming years.

According to a recent survey of 1,100 global IT professionals conducted by the virtual computing solutions vendor, 55 percent of organizations plan to deploy virtual desktop infrastructure by 2013. Business agility and immediate provisioning capabilities were cited as expected advantages of desktop virtualization, but security was the main driver of adoption rates.

Regardless of whether they planned to implement the strategy in their own operations, 86 percent of all respondents in the Citrix study indicated that desktop virtualization represented a “strategic approach to improved information security.” Increased application and data security, instant isolation of compromised resources and remote data wipe capabilities were also viewed as compelling advantages.

“Desktop virtualization delivers centralized control and management of desktops, applications and data delivered to any endpoint device,” noted Citrix chief security strategist Kurt Roemer. “It also offers granular, policy-based access control and supports compliance requirements. It embeds an important infrastructure level of information governance that enhances risk management across information security and compliance.”

Despite Citrix’s optimism, there is evidence to suggest companies may remain hesitant to deploy virtual desktop infrastructure.

“Their uneasiness, according to virtualization experts, stems from higher than expected infrastructure costs, technical complexity and a return of investment that’s typically slower to materialize compared to server virtualization,” noted CRN contributing author Kevin McLaughlin.

A lack of full-deployment case studies and growing popularity of HTML5 as a mobile application delivery mechanism has also slowed adoption rates, according to McLaughlin.

Virtualization Security News from SimplySecurity.com by Trend Micro

Related posts:

  1. The Virtualization Treadmill: The More Things Change, the More They Stay the Same
  2. Citrix Synergy, VDI Security APIs, OMG!
  3. Desktop virtualization can enhance security performance
  4. Desktop virtualization growing, but still has roadblocks

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Cloud-based Email Threats Capitalized on Chaos of COVID-19
  • Detected Cyber Threats Rose 20% to Exceed 62.6 Billion in 2020
  • Trend Micro Recognized on CRN Security 100 List
  • Trend Micro Reports Solid Results for Q4 and Fiscal Year 2020
  • Connected Cars Technology Vulnerable to Cyber Attacks
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.