VDI security guide

VDI security guide

With the wide variety of endpoints that exist today in the corporate environments, security is more important that ever, since, in addition, users are becoming increasingly more independent and it is harder to manage passwords, application configurations and network access.

Virtual desktop platforms favor security, since data is stored in VDI servers within the data center and it is safer that store them locally. And not only that. Desktop virtualization allows administrators to have more control over the distribution of desktops and applications.

Red Hat includes UDS Enterprise in new partner portal

Red Hat includes UDS Enterprise in new partner portal

Red Hat has recognized VirtualCable as technology partner and has included the company in the new website Red Hat Connect for Technology Partners

This new program assures that the solutions included have been validated and are supported on Red Hat’s platform. Thus, the VDI connection broker for Windows and Linux UDS Enterprise has become part os this ecosysten certified by the multinational.

What’s new in UDS Enterprise 1.7 II

What’s new in UDS Enterprise 1.7 II

At the begining of this week we explained some of the improvements introduced in the new version of our VDI connection broker for Windows and Linux. Today we continue listing the improvements introduced by UDS Enterprise 1.7.

The development team has added a custom CoRD built inside UDS Enterprise, making simpler to download it, the OS Managers now include “max idle allowed” configuration and authentication fixes regarding Ldap have been performed, including possible security related issues.

It´s time to deploy non-persistent desktops

It´s time to deploy non-persistent desktops

One of the arguments of the companies so far for not to deploy non-persistent desktops has been that the workers unwelcomed them, since they wanted to use on their computers the programs and applications that they considered appropriate.

Now that all employees have mobile devices and use in that private devices the applications they want, they don’t care so much what can be installed or not on their corporate computers.

Skip to content