Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Desktop Virtualization Drives Security, Not Just Dollar Savings: Page 4 of 7

CPU enhancements, though, are where Intel and AMD earn their keep, by providing a trusted processing platform that can accommodate all virtualization software. Call it universal extensibility--just like we want the ability to swap out hardware without impacting the software, so, too, do we want to future-proof our virtualization software investments. This movement is centered on the CPU now, but peripherals are in play for future capability.

Impact Assessment: Desktop Virtualization


(click image for larger view)

SECURITY VIA SOFTWARE
VMware is securing its flagship VDI product's traffic with SSL, and with its ACE desktop virtualization management offering, VMware uses Virtual Rights Management to manage security policies and access controls of offline VMs. And yes, you can encrypt a virtual disk.

VDI products from VMware and Citrix control access and secure traffic in roughly the same manner. Both deliver desktop access via a centralized authentication mechanism that syncs with Active Directory and imposes provisioning rules so only people who are permitted to use given virtual desktops have access.

Provisioning and reclamation of user rights happens via a central console. Companies such as Sun Microsystems and Ericom, which offers an array of VDI and emulation products, are back-end-vendor agnostic; Sun provides client hardware via its Sun Ray line. What's consistent is that all these options use software as the primary method of lockdown: Virtual machines are still stored in the data center and delivered elsewhere.

So how much added security does VDI really buy you right now, and is this type of implementation worth the cost when other enterprise security initiatives are also on the table?