O'Reilly logo

VMware View 5 Desktop Virtualization Solutions by Andre Leibovici, Jason Langone

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

While a VDI solution is inherently secure in nature, as the end user’s data typically resides in a secure data center, it is still important to understand an organization’s security posture, policies, and attack vectors and take appropriate measures where necessary. With end users connecting from any location, such as an unsecured Wi-Fi connection at a coffee shop, an Apple iPad over the AT&T 3G network, a corporate LAN, or a home cable ISP, it is important to protect corporate data and intellectual property. The use of smart card authentication—a solution rapidly gaining in popularity—is one strong approach for protecting the authentication entry point. Sound networking policies limiting traffic to defined ports, protocols, sources, and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required