Virtual Desktops Protect Precious Data

Virtual Desktops Protect Precious Data

By Jacqueline Lee

Data protection is one of the biggest selling points of virtual desktops. Instead of storing proprietary data on multiple computers, or endpoints, data is stored and accessed from the data center.

Companies create a centralized virtual machine and then modify the desktop for individual users. Employees can’t access what they don’t need to have.

At the same time, virtual desktops provide employees with a great deal of freedom. Since the virtual desktop can be accessed from multiple devices, employees have anywhere access to the data that they need.

One example of how desktop virtualization works comes from Leostream’s latest version of its cloud desktops solution. Cloud Controller, which is Windows-based, can manage virtual desktops built on open-source Apache CloudStack software.

CloudStack is usually used to deploy and manage large networks. The software includes complete Infrastructure-as-a-Service (IaaS) components including user and account management, Network-as-a-Service and a full and open native API.

Cloud Controller creates master images that can be used for provisioning desktops. Then, IT can create desktops and assign them to individual users. Single-use encrypted authentication ensures that unauthorized users are barred from the desktop.

IT can centrally monitor who is using their desktop at any time. When employees leave the organization, virtual desktops can be instantly deleted.

Users can use the built-in HTML5 viewer to access their desktops from locked-down PCs, laptops, Android, iOS, BlackBerry, Chromebooks, thin clients and other endpoint devices.

Leostream pro-rates monthly charges based on desktop use. Currently, no up-front contract is required.

For even more security, consider a hosted solution. Transitioning to a hosted virtual desktop benefits organizations that handle sensitive data, such as medical facilities that must comply with HIPAA regulations. With a hosted solution, IT can set restrictions to keep employees from copying data to any remote location.

Businesses can also configure policy controls to either limit employees to office-only access or to enable unlimited access for telecommuting or remote work.




Edited by Brooke Neuman
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing Writer

SHARE THIS ARTICLE
Related Articles

Shining a Light on the Dark Web: Searchlight Cyber Debuts Comprehensive Hub

By: Greg Tavarez    3/28/2024

The Dark Web Hub is a one-stop shop for crucial context and continuously updated information on dark web marketplaces, ransomware actors, hacking foru…

Read More

Stellar Cyber and Trellix Bridge the Gap in Security Operations

By: Greg Tavarez    3/28/2024

Stellar Cyber announced the integration with Trellix Endpoint Security HX to allow customers to deploy more robust security solutions and improve thei…

Read More

CyberSaint Raises $21M in Series A Funding to Continue Securing its CyberStrong Customers

By: Alex Passett    3/27/2024

CyberSaint announced that it succeeded in a huge $21 million Series A funding round. This was led by Riverside Acceleration Capital (RAC) with other i…

Read More

US Education Receives Security Upgrade with Free Browser Protection Offered by Conceal, Carahsoft

By: Greg Tavarez    3/27/2024

Conceal and Carahsoft recently unveiled an initiative to fortify the cybersecurity infrastructure of U.S. educational institutions.

Read More

Cato's AI Takes Control of Security and Incident Response

By: Greg Tavarez    3/27/2024

With Cato's recently announced Network Stories for Cato XDR, advanced AI algorithms instantly identify outages in customer networks and conduct root c…

Read More