Secure VDI – what it does and why you need it

Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server. VDI is a variation on the client/server computing model, sometimes referred to as server-based computing.

This process allows for secure remote computing with the accessibility and ease of use, as if your personal laptop was tucked away safely in a data center. Secure VDI significantly mitigates security risks by being 100% contained within your protected network. By placing virtual desktop machines within your protected network, this allows for a controlled and managed workforce, whether they reside under the same roof, or they are spread out remotely around the world.

Secure access is accomplished by a clientless encrypted connection (a tunnel). This encryption allows a remote user to be on public Wi-Fi and still maintain a secure, encrypted end-to-end connection.

Secure access can also be created for enterprise applications, ERP systems, and basically any traditional client/server application. This is accomplished by creating the virtual machines within the same secure environment where the supporting application servers reside. This not only provides a 100% secure access environment, it also speaks to performance and much improved access speeds. Essentially the desktop instance being used is on the same LAN segment, like the server, treating this connection more like a LAN environment versus a WAN environment.

Secure VDI works with all form factors, Mac, PC, Android and IOS devices, allowing for diversity in a remote workforce. This architecture also secures all communication between the end device and the Virtual Desktop Instance.

Bring your own device (BYOD) can be any personal device such as a phone, tablet, laptop, etc. This can be a device provided by the company or a user-owned device. The benefit of Secure VDI working on any device is that it greatly increases the ease of deployment and management of security.

By design there is no data or files that are stored or transferred onto the end user device, meaning if using a laptop or tablet, there is no concern of sensitive data or files being transferred to a the user’s personal device. This is a great strength of the product, since it relates directly to regulatory stances such as HIPAA, PCI, and PHI. This service is simple and effective.  It aligns directly with regulated or sensitive data industries such as healthcare, and financial organizations, by adhering to managed access compliance standards.

We drill down into how Secure VDI can truly manage access to meet the compliance standards for those industries in this next blog post. Visit for more information and to try out a free demo. Fill out this form, or contact the cyber security specialists at [email protected] or 866-780-4678 to get Secure VDI set up at your organization.

2016-08-08T09:37:17+00:00 August 8th, 2016|

Leave A Comment