> Research Library > Citrix Systems > Empowering Information Security with Desktop Virtualization

Empowering Information Security with Desktop Virtualization

White Paper Published By: Citrix Systems
Citrix Systems
Published:  Sep 06, 2013
Type:  White Paper
Length:  6 pages

Since the dawn of personal computers and distributed computing, IT has faced an uphill battle to manage, control and protect enterprise applications and associated data. Recent computing disruptors—including the consumerization of IT and bring your-own device (BYOD), flexwork where people shift work to optimal locations and times, broad mobility expectations and the advent of cloud computing—have further complicated the challenges of protecting sensitive enterprise information.

To control risk across the increasingly diverse computing landscape, organizations must centralize control of sensitive enterprise Windows applications, ensuring that only authorized and authenticated users have access. This paper describes how desktop virtualization offers IT a powerful solution for today’s information security needs.


Tags : 
citrix, security, desktop virtualization, strengthen information, reduce risk, byod, it management, enterprise applications

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee