O'Reilly logo

Microsoft Virtualization Secrets by John Savill

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

CROSSREF When possible, use encryption tools such as BitLocker and BitLocker To Go on drives and USB devices that contain corporate or sensitive data. These tools are discussed in Chapter 5.

This chapter covered the major Microsoft technologies, such as web-based services, traditional VPN-type solutions, DirectAccess, and session-virtualization connections using RD Gateway, to enable access to corporate resources. There are obviously many other third-party solutions to enable different types of connectivity. In addition to connectivity, an organization must decide how to enable access to its applications, a challenge that is predominantly solved with session virtualization and VDI for noncorporate devices. Using session virtualization not only enables access to Windows applications on non-Windows devices, but it also helps keep corporate data on corporate servers, rather than allowing potentially sensitive data to be scattered across user laptops, slates, and home machines.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required