A committee comprised by experts from more than 20 Spanish universities have chosen UDS Enterprise as best On Premise VDI solution and second VDI Cloud solution after evaluating solutions from 15 VDI vendors.
Its “ease of use, implementation, management and deployment, its response to incidents, its stability and the integration with other applications, as Moodle” are some of the features that led it above solutions such as VMware Horizon, Red Hat Enterprise Virtualization or Citrix XenDesktop.
In previous posts we explained what’s new in UDS Enterprise 1.7 , but it is worth mentioning another series of features that have been improved or updated in this new version of the software.
Important security improvements have been introduced, thanks to the API REST redesign, incremental removal of the use of internal IDs in favour of non predictable UUIDS and new actor implementation.
With the wide variety of endpoints that exist today in the corporate environments, security is more important that ever, since, in addition, users are becoming increasingly more independent and it is harder to manage passwords, application configurations and network access.
Virtual desktop platforms favor security, since data is stored in VDI servers within the data center and it is safer that store them locally. And not only that. Desktop virtualization allows administrators to have more control over the distribution of desktops and applications.
This new program assures that the solutions included have been validated and are supported on Red Hat’s platform. Thus, the VDI connection broker for Windows and Linux UDS Enterprise has become part os this ecosysten certified by the multinational.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.