Last week we talked about the advantages of desktop virtualization to face work from home challenges for IT departments, such as software licenses management. In this post we deal with one of the areas of greatest concern for most companies: security
When an employee works from home using a personal device, it is really difficult to guarantee that his computer adheres to the company’s security policies. IT administrators must check whether a device is 100% secure and if it has, for example, an outdated OS or if it is infested with malware.
Over last years, more and more companies are embracing remote working and allow employees to work from home at least part time. This new trend presents new challenges, but all of them can be solved thanks to desktop virtualization, which helps IT to control work environments both inside or outside the office.
For many companies considering work from home as an option, one of the firsts issues they face is how to manage software licenses. If an employee needs a licenced application for work, it must be installed both in the computer he uses at the office and at home, therefore licensing costs double.
Open Source tools provide significant flexibility and cost savings to companies and users, since they can be easiliy customized according to each project and cut the costs of privative software’s licenses.
Mainly for these reasons, experts recommed using this type of software, moreover when the main goal is to evaluate a technology.
Any remote desktop service can be managed using a single tool: UDS Enterprise.
Our multiplatform connection broker for Windows and Linux systems enables the administration of users access to services such as virtual desktops, physical desktops, applications, e-Learning platforms like Moodle, IP phone, cloud services, IP cameras and shared resources.
Thin clients are one useful option for VDI access. Some of these devices don’t require antimalware software, as they are secure enough by their own.
But some others require extra protection in order to assure data and users security. One example are repurposed PCs as thin clients, since although they are not usually configured to run software locally, they are tecnically vulnerable to different types of malware.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.