Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

Virtualization Enables BYOD & Delivers IT

Virtualization Enables BYOD & Delivers IT


Services On-Demand to Any Device

With BYOD finding its way into the enterprise, the demand to deliver IT services to a plethora of devices while ensuring information security and keeping a centralized security policy are some of the real challenges which organization can no more ignore. Virtualization is an enabler which provides a viable solution to these and more challenges – simplifying IT infrastructure, cutting significant costs and allowing modern enterprise worker to use IT services on any device. The age of dedicated work stations with frequent software updates and its associated complexities are coming to an end.

Desktop virtualization adopts user centric approach in delivering IT services. It is a layer which sits between the device and native/virtualized applications running in any OS. The device becomes irrelevant; hence providing much greater coverage and support to the user. Previously, IT services needed to be individually installed on every workstation. The associated cost and complexity increased manifold when we brought maintenance and troubleshooting into account. Virtualization has been phenomenal in removing the need for dedicated hardware altogether. Now the user simply needs to have a thin-client on the device and start using applications right away as though they reside within the device.

At first, virtualization may seem like decentralization of IT infrastructure and services which may require a radical way to address security concerns. This is not entirely true because virtualization isolates the end-user device and treats it as an end-point to deliver services. IT services along with company data remain locked within the sandbox or thin-client running on the devices. This means a centralized IT policy now reaches enterprise user’s personal or company provided devices which may include laptop/PCs, smartphones or tablets.

So how does virtualization addresses some of the primary BYOD security concerns, for example, ensuring security and compliance of sensitive enterprise data residing on a personal device of a user? With a virtualized desktop for instance, the data does not reside on the device. The thin-client is actually a sandbox which streams the virtualized desktop over the network to any device which connects to it, hence making sure that any data which goes into the sandbox resides within the company’s own virtualized IT infrastructure and not the device. Now in case a device is lost, the sandbox which provides access to virtualized desktop can simply be disabled.

In addition to tremendously simplifying IT, virtualization also boosts productivity by diversifying device usage while addressing information security concerns, hence enabling true BYOD.

The upcoming Online VMware Forum 2013 will give you an opportunity to learn about Virtualization in action. Enroll for the event!

By Ben Harrison

Sponsored by VMware and Online VMware Forum 2013

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as technology related infographics and comics.


(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…

Exclusive: T-Mobile, Sprint close to agreeing deal terms – Sources

By CloudBuzz | September 22, 2017

(Reuters) – T-Mobile US Inc (TMUS.O) is close to agreeing tentative terms on a deal to merge with peer Sprint Corp (S.N), people familiar with the matter said, a major breakthrough in efforts to merge the third and fourth largest…

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…