Top Ten Desktop Virtualization Myths - Slide 6

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12
Next Next

Just because your data is in the data center doesn’t mean that it’s more secure. Most security breaches occur from Internet connected computers and since your VDI sessions will be connected to the Internet or external networks, they are vulnerable. IDV offers strong physical security including AES-256 full disk encryption, a true Type-1 client hypervisor for full virtual machine isolation, USB filtering, time-based lockout and remote kill capabilities. Moreover with IDV, you can deploy a read-only operating system that only contains the OS and its applications on the desktop.

Topics : Nortel, Citrix Systems, Storage Virtualization, Server Virtualization, Hardware Virtualization

Desktop virtualization has continued to make headlines in IT, but despite the focus on the topic, there are a number of myths that remain. The root cause is that there are actually many flavors of desktop virtualization and what’s true for one type is not always true for another. Virtual Desktop Infrastructure (VDI), which hosts virtual desktops in a data center, is one of many ways to virtualize desktops, and the one that has sparked a lot of these myths, but VDI is not the only way to virtualize the desktop.

Intelligent Desktop Virtualization (IDV), a phrase coined by Intel®, describes a different approach to desktop virtualization. Where VDI centralizes both management and execution of virtual desktops, IDV maintains the benefits of centralized management while securely leveraging the computing power of end-point devices to deliver better performance, mobility and lower cost of ownership. This slideshow features the top ten myths of desktop virtualization, as identified by Sham Sao, SVP, Virtual Computer.

 

More Slideshows

cloud14-290x195 Data Center Applications and the Cloud: What You Need to Know

Virtualizing a physical data center and moving it to a private or hybrid cloud requires careful analysis of both security and connectivity needs. ...  More >>

infra8-290x195 Up-and-Coming Open Source Projects for the Enterprise

Open source technology plays a key role in the modern world, powering a wide range of innovations from handheld devices to the world's most powerful supercomputers and the cloud. ...  More >>

infra7-190x128 Eight Critical Forces Shaping Data Center Strategy

The importance, role and functionality of data centers will change over the next five years, leaving many organizations unclear on how to plan their future data center architectures. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.