In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Virtual Desktop Technology-an effective guarantee of Security flexibility
1. Virtual desktops and virtual workspaces are created dynamically with reference to standard copies of operating systems, applications, and user profiles. Because the virtual table bread is created by the IT software library, it can ensure that the software used by end-users when doing business on the network is up-to-date and guaranteed. In the data center, the audit team can easily verify the activity status of end users and evaluate whether security controls comply with regulations; protective measures can control the configuration drift of the terminal, even a refresh of the virtual desktop can be detected, and determine whether it is a sign of malice. Transferring responsibility for software configuration from the end user to IT will help the terminals of financial institutions meet regulatory compliance requirements. For example, virtual desktop infrastructure removes sensitive authentication and cardholder data, protects internal networks, secures payment card applications, and detects and controls access to the system.
two。 Virtualized desktops help reduce costs for disaster recovery and maintaining business continuity. Financial institutions cannot afford disruptions in important business for a variety of reasons, whether due to the unavailability of office infrastructure, the decline in employee productivity caused by security incidents, or even the additional security support requirements caused by the H1N1 flu epidemic that forced employees to work from home. However, virtual desktops can meet all the needs of users in the face of "disaster", and they can dynamically support office and remote users according to the corresponding performance and availability in any hosted data center.
3. Sensitive data is stored in the data center, which is easy to prevent the occurrence of leaks. Centralized desktop execution in the data center reduces the number of data channels that security inspections must verify, while simplifying audit reporting requirements for the use of personally identifiable information and other regulatory data. Because the data is not saved in the terminal except on the terminal screen, this greatly reduces the pressure of terminal data protection.
4. The virtual workspace protects remote users' access to the network by isolating × × clients and general terminal browsers. Some financial institutions are switching to virtual workspaces to ensure that their remote users can use fully configured secure browsers and clients when doing business on their home computers. The virtual workspace is built on top of the local operating system, using sandboxie technology to guard against threats such as keystroke recording, memory mapping, applications and operating systems, and end customers' reset of security settings. IT typically allocates virtual workspaces to qualified employees through a commonly used USB device, which has built-in remote access authentication credentials.
The deployment of virtual desktop infrastructure is a long-term strategic and complex task that affects end users, networks, data centers, and applications. The initial project of the virtual desktop infrastructure architecture should focus on the performance improvements and lower operating costs brought about by the new data center architecture. Although it may be more difficult than expected at the beginning of its deployment, the increased level of security and data protection capabilities it brings is definitely good value for money.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.