O'Reilly logo

VMware View 5 Desktop Virtualization Solutions by Andre Leibovici, Jason Langone

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Security

Whether deployed at a hospital, college, corporation, federal agency, or non-profit organization, security of the end device has become a critical component of any organization’s data loss prevention and information assurance policies. With data loss events, for example, such as WikiLeaks or stolen laptops with social security numbers from organizations such as the U.S. Census Bureau, Ireland Department of Social and Family Affairs, or Anheuser-Busch, ensuring that sensitive data stays within the confines of the corporate infrastructure has gained much visibility.

In a traditional physical desktop model end users are issued desktops or laptops that contain writeable media (hard drives). These end devices store data such as the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required