Connecting Technology and Business.

Desktop Virtualization and Security

As desktop virtualization technology has matured and gained widespread implementation, organizations around the world increasingly recognize the broad spectrum of benefits it delivers and view it as a strategic investment that forms a fundamental part of their IT infrastructure.

Beyond the impact on business flexibility, productivity and efficiency, desktop virtualization can also play an important role in risk management by transforming the way organizations approach information security and compliance.

Familiar advantages of desktop virtualization include
  • the ability to enable a more flexible workplace
  • support for mobile workers and associated work styles
  • providing IT with an effective way to manage the growing variety of computing devices in use across an organization.
  • contributes significant savings
  • more-efficient desktop management
  • reduction of office space and real estate costs
Security has now joined these benefits as a key factor in the decision to implement desktop virtualization. In fact, 92 percent of the organizations that will have desktop virtualization in place by the end of 2013 are adopting it in part to improve information security.
The security benefits of desktop virtualization are inherent in its architecture, which revolves around the centralization of desktops, applications and data for delivery to endpoint devices. This consolidation supports highly effective central management and granular, policy-based access control, and supports compliance requirements through the monitoring, logging and reporting of information access and usage.
Flexible options for the delivery of desktops, applications and data to authorized workers, including the ability of these workers to use any type of endpoint device—PC, laptop, thin client, tablet or smartphone—enables the organization to protect its information while optimizing worker flexibility. Indeed, 95 percent of the senior IT decision makers implementing desktop virtualization consider it very effective for protecting information while enabling workers with fast and effective access to the information they require.
An effective information security strategy must ensure the security of an organization’s data and application resources while allowing workers to access the resources they need, when and where they need them—a balance made possible only through desktop virtualization.
Organizations in every part of the world increasingly share this view, and are making desktop virtualization a central part of their security strategy.