Book Image

VMware Horizon 6 Desktop Virtualization Solutions

Book Image

VMware Horizon 6 Desktop Virtualization Solutions

Overview of this book

Table of Contents (21 chapters)
VMware Horizon 6 Desktop Virtualization Solutions
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


While a VDI solution is inherently secure in nature because the end user's data typically resides in a secure data center, it is still important to understand an organization's security posture, policies, and attack vectors and take appropriate measures where necessary. With end users connecting from any location, such as an unsecured Wi-Fi connection at a coffee shop, an Apple iPad over a 4G network, a corporate LAN, or a home cable ISP, it is important to protect corporate data and intellectual property. The use of smart card authentication—a solution rapidly gaining in popularity—is one strong approach for protecting the authentication entry point. Sound networking policies limiting traffic to defined ports, protocols, sources, and destinations is another key component of a secure VDI.

Finally, understanding basic fundamentals of data forensics to ensure compliance, if necessary, is an important skill to have within the VDI solution team. While, potentially, the majority of VDI...