Virtual Desktops in the Cloud: Changing the Face of Desktop Security. A Desktone Whitepaper

Size: px
Start display at page:

Download "Virtual Desktops in the Cloud: Changing the Face of Desktop Security. A Desktone Whitepaper"

Transcription

1 Virtual Desktops in the Cloud: Changing the Face of Desktop Security A Desktone Whitepaper

2 Contents Executive Overview.2 Desktops... 3 Desktop Management... 4 Desktop Protection and Data Loss... 6 Desktop Communication... 8 User Monitoring... 9 Conclusion About Desktone... 10

3 Executive Overview With an increasingly competitive and hostile business operating environment, it is important to identify and minimize risks, while embracing changes that allow us to thrive and grow in the marketplace. This paper will briefly examine the evolution of the personal computing environment and how organizations can reduce security risk while providing benefits for both the business and the employee.

4 Desktops Value of the desktop There is no question that the personal computer (PC) has brought tremendous value to both the business and the individual. While early forms of the PC and desktop operating environment were limited in ability, performance and value, the tremendous growth in computing power and the proliferation of both commercial and non-commercial software have enabled users to quickly perform essential personal and business tasks. With the explosive growth and increasing interconnectivity of the desktop, there are three core values exposed: business efficiency, information availability and entertainment delivery. Experts predict that more than one trillion devices will be connected to the Internet by Individuals do not use PCs because the tangible hardware or operating system is valuable, but because of the real and perceived value of the desktop, applications and information. Emergence of the virtual desktop Just as the PC has continued to evolve, a parallel technology has been driving innovation and efficiencies in the datacenter: virtualization. Virtualization is nothing new. In fact, it has been around for decades. Virtualization is the disconnection of the tangible asset (hardware) from the computing environment which runs on top of it. This has delivered tremendous benefit to the enterprise by allowing for increased utilization of limited computing resources and scaling with enterprise demand. However, a more recent application of this technology has been applied to desktops. Separating the hardware from the desktop running on top of it has significant benefits for the user and the business. For example, it allows the business a much faster on-boarding process when employee resource demand is elastic or when an acquisition takes place. For the employee or home user, it provides the flexibility and mobility to access their desktop from any computing device including home computers, laptops or the latest mobile device. Cloud hosted virtual desktops The term cloud is a metaphor that represents the flexible and elastic nature of Internet based computing resources. Based on the shared usage model of computing infrastructure, platforms and applications, many businesses have recognized the value of consuming essential services such as user management, hosting, and shared file storage from a cloud based service model. This dramatically reduces the internal expertise needed to stand up these complex infrastructures and allows the business to focus more aggressively on their value model. It is a natural and logical evolution for virtual desktops that they also should be provided as a service from a cloud based provider. This eliminates the need for IT experts with the very scarce knowledge of complex virtual desktop infrastructure deployments, while adding the value of enterprise scale data centers and high performance networks. Cloud based virtual desktops also eliminate the need for 1

5 expensive upfront capital expenditure, and moves the desktop cost into a more business-friendly operational expenditure model with rapid desktop provisioning. Importance of securing the desktop With an increased dependence on desktops as a critical part of the new business and personal utility model, careful consideration of desktop security is essential. Not only is valuable intellectual property, financial data and personal information regularly accessed, viewed and managed within this environment, but the user may also accidently or intentionally behave in a way that places the business at risk. All of these concerns can be categorized into a simplified list of four desktop security considerations: management, protection, communication, and user monitoring. Manage Ensure the desktop OS is effectively secured Monitor Assess user compliance with corporate guidelines Protect Defend the desktop from unauthorized access Communicate Ensure the desktop has secure communications Desktop Management The desktop environment has come under persistent and increasing attack from individuals and networks with malicious intentions. Recent reports have demonstrated that malicious software such as viruses, worms, trojans, backdoors and other forms of malware distribution continue to evolve and propagate. 2 While there are currently no studies that distinguish between traditional and virtual desktops, infection rates among client desktops range as high as 3.7% for some regions, while infected desktops located in the United States averaged around 1.3%. 3 In the first half of 2010 alone, more than 20 million computers were cleaned of malware. Clearly there is a real and persistent challenge for the IT staff to effectively minimize this risk

6 The technologies that have evolved around desktop management are plentiful. Anti-virus, antimalware, rootkit detection, and personal firewalls are only a few of the tools in the IT security toolbox which are often deployed to all desktops at a significant expense to the business. Beyond the individual desktop, enterprise wide desktop management tools are also deployed in the form of agents or monitoring software to facilitate such capabilities as configuration management, patch management, end point controls and application lockdown. Industry studies have shown the patch and configuration management segments alone to be millions of dollars worldwide and growing. As employees continue to ask for corporate access from newer and more exciting computing devices, this desktop management problem promises more challenges for the future. Traditional desktops The continued growth of malware infection rates only proves that the security management of traditional desktops is failing. With a one to one ratio of hardware to desktop demanding a model of geographically dispersed systems, this decentralization makes for an almost impossible management quagmire. Compounding the management challenges are mobile or travelling workers who are intermittently connected to a corporate network and the potential lack of local IT resources or support staff to address a problem when it arises. The current environment and outlook for the security management of traditional desktops is bleak. Virtual and cloud hosted desktops While the lack of centralization has led to a grim outlook for traditional desktops, the centralized nature of virtual or server based desktops holds both current advantages and even more promise for the future. Most of the current technologies that address the security of the desktop can be run in a virtualized environment. Essential components such as anti-virus are as easy to install on virtual desktops as they

7 are on traditional desktops. This is not to say there are no considerations to be made. For example, having 100 users all initiate resource intensive virus scanning at the same time on a single physical server, could cripple user experience and cause performance issues. However, with proper foresight and planning, these challenges can be eliminated entirely. A significant advantage of the virtual desktop is that the individual desktop never escapes central visibility, and tasks such as policy controls and patch management can be consistently applied. Further, some management capabilities such as end-point control are inherent to the protocols used in the virtual desktop and are easily deployed with no additional cost, while others such as personal firewalls can be extracted from the desktop into the underlying hypervisor requiring less desktop resource consumption and reduced licensing costs. The view for desktop management in the future is even better. While the current status for some technologies requires a similar approach to traditional desktops, i.e. installing the software or agent on the individual desktop, exposed interfaces in the hypervisor promise that tasks such as anti-virus may potentially be eliminated entirely from inside the individual desktop. This same evolution of centralized control is also evolving in the layering of operating systems, applications and profiles to allow for single step patch and configuration management. The capabilities will only serve to reduce complexity and requirements for desktop synchronization. While some of this management can seem daunting for the small and mid-size business, the benefits of this centralization can easily be realized through the cloud hosted virtual desktop model where the experience and maturity of previous clients can be applied immediately. Desktop Protection and Data Loss Not only is there tremendous business expense around desktop management, but the protection of desktops has also presented an equally significant challenge. In 2010 alone, more than 1.6 million data records were known to be lost on stolen laptops and computers. 4 This does not include the numerous incidents when the actual quantity of records was unknown or when the stolen computer was not reported. It also excludes the incidents when old hardware is sold or disposed of incorrectly. Protecting the data and intellectual property on the desktop has proven to be difficult. Not only are desktops physical assets that need to be protected, but there are also other means of unauthorized access: physical proximity or exposed remote desktop connections. The username and password are often the last, yet weakest, line of defense. Research has shown that one in nine users select one of the top 500 most common passwords, and that one in fifty select one of the top 20 most common passwords. 5 Desktops users are often predictable and make poor security decisions Mark Burnett, Perfect Passwords (Syngress Publishing, 2006), p. 108.

8 Traditional desktops The decentralized and mobile nature of traditional desktops has led to poor desktop protection by means of theft, loss, or hardware disposal. As the workforce becomes more mobile and offices are either closed or the business is more geographically dispersed, there is little prospect of better desktop protection. More sophisticated businesses are using technologies that employ hard drive encryption for the actual physical assets. However, as employees are increasingly asking to use new and varying mobile devices, these kinds of policies are difficult to implement consistently. As IT teams struggle to improve desktop security, password policies are being reviewed to require better and stronger passwords. Even security savvy users are often frustrated with the number of passwords they are required to remember and counter this by reusing passwords or incrementing numbers through password changes. Virtual and cloud hosted desktops Virtualized desktops can offer considerable benefits around the protection of the desktop, yet they face some unique challenges of their own. The centralized nature of the desktop means that a lost device is simply a lost piece of hardware. The millions of records exposed through theft, loss, and poor disposal means do not apply as the desktop is not physically located on the device. However, the centralized nature of the virtualized desktop means that a new group of people can potentially gain unauthorized access to the desktop namely the IT or operations team. What is to prevent an unauthorized individual from zipping up and downloading a virtual desktop from the datacenter and using it for malicious intent? This is a special challenge for the small and medium business market. Large enterprises offering on-premise models and cloud hosted virtual desktop

9 models offer the needed protections and policies for this type of access. Least privilege access controls, employee screening, regular confidentiality agreements, and training all address this concern. It is also valuable to ask for desktop protection assurance with appropriate multi-tenancy and segregation controls. Cloud based desktop service offerings will explicitly include the needed separation of duties between the service provider, the enterprise IT team and individual groups of desktop users. However, it is a mistake to ignore this for the on-premise virtual desktop deployments. It is not always appropriate or legal for all corporate groups to be running within the same tenant. For example, in a securities firm, investment banking activities are legally required to be separated from the research and brokerage activities to avoid conflicts of interest. In the small and medium business, there might not be such stringent controls for the desktop, but multi-tenancy and segregation can be highly desirable for liability or business policy reasons. Desktop Communication Not only is the data and information on the desktop to be protected, but the communication between the desktop and connected devices must also be secured. An obvious example of this requirement is the communication between the payroll administrator and the bank. If this communication was to be captured, intercepted or altered, there could be significant repercussions for the business. Transport layer security has become a required and critical part of our desktop environment. The implications of this for traditional and virtual desktops need to be considered. Traditional desktops At first blush, it may seem that traditional desktops are secure. That is, the desktop is already on a segmented, internal network that is not exposed to the Internet. For the mobile employee, a virtual private network (VPN) is often used to ensure the protection of the communication between the desktop and organization. However, statistics again show that the insider threat is real. As much as 8% of data loss incidents have originated from a malicious insider, while a staggering 45% of data records reported lost have involved a trusted third party. 6 These statistics point to an undisputable fact that the perimeter does not protect the traditional desktop when communicating with organizational peers, third parties or applications available on the Internet. Does the user know that communication with an SSL encrypted application may potentially be compromised when they see the warning message about an invalid certificate? Ironically, the employee is often conditioned to ignore this due to self signed certificates within the organization. Virtual and cloud hosted desktops Virtual desktops have an undeniable advantage when it comes to desktop communication. In fact, the front end communication between the user and the network is nothing more than a protocol which renders the visual, audio, media and component related aspects of the desktop. The more common 6

10 protocols used for virtual desktop delivery all use encryption including Remote Desktop Protocol (RDP), Independent Computing Architecture (ICA), Remote Graphics Software (RGS) and PC over IP (PCoIP). While some deployment guides for virtual desktops have recommended disabling this encryption for performance reasons 7, security would dictate that this is not a best practice in most situations. It would be a mistake to believe that front end encryption is sufficient security for the desktop communication. It is also important to secure the backend communication between the virtual desktop and network resources such as Active Directory, shared storage and enterprise databases. While this might be an obvious component of cloud based Desktops as a Service providers or large enterprises, ensuring that the appropriate VPN connections or multiprotocol label switching (MPLS) are configured correctly and comprehensively is often missed by small and medium businesses. User Monitoring A last and often overlooked category of desktop security is users themselves, and whether or not they are acting in accordance with corporate policy. Their cause of a security incident may range from accidental, to unintentional, to deliberate and malicious. Regardless of intent, the outcome of user activity can be costly. An employee may not believe that posting comments on a social network site could lead to a security incident, but an insignificant status update could lead to the ruin of a marketing or sales plan. An employee may not have explicit guidance about downloading images from the internet, but this could lead to corporate liability and fines. At the other end of the spectrum, incidents have been reported where user activity has been directly malicious and the security implications are tremendous. A recent incident involving a Private First Class leaking thousands of sensitive war documents has led to a White House condemnation. 8 The security conscious company will not only want to secure the desktop, but the activities of desktop users to prevent data loss, corporate liability or errant employee behavior. Traditional desktops While many technologies exist for data loss prevention (DLP), intrusion prevention systems (IPS), and user behavior monitoring, these are very much dependent upon the user actually connecting from a network or location where the technologies are deployed. Furthermore, the cost and complexity of managing these devices is non-trivial. The decentralized model of traditional desktops does not lend itself well to providing effective user monitoring on the network. Virtual and cloud hosted desktops

11 Virtual desktops not only offer the benefit of a centralized management point for user monitoring capabilities, but also provide efficiencies of scale. A virtual security center can be deployed to allow for high speed DLP and IPS appliances to monitor user behavior and protect them from decisions that could cause security concerns. Conclusion Desktops, virtualization and security: To many, these three terms may seem mutually exclusive as they are by historical perspective and traditional consideration, in opposition to one another. Desktops offer individuality, personalization and are based on distributed users. Virtualization is associated with flexibility, mobility and cost effectiveness. Security is perceived as being inflexible, rigid and controlled. One has only to think of new and more effective business models, and they will quickly realize that virtual desktops offer immense benefits, can be deployed quickly, are cost effective, and in the case of a Desktop as a Service offering, require no upfront capital expenditure. The added benefit of the virtual desktops is an ability to manage, protect, communicate and monitor with far greater security than the traditional desktop counterpart. About Desktone Desktone is changing the way people buy and manage desktops. Desktone pioneered the concept of Desktops as a Service (DaaS), the easiest and most affordable way to deploy cloud-hosted virtual desktops. The Desktone Cloud, Desktone s DaaS offering, provides all of the benefits of virtualized desktops without any of the hassles. By delivering virtual desktops in the cloud, Desktone enables businesses to rapidly provision desktops to users on any device, anywhere, without the upfront costs and complexity of traditional desktop virtualization transforming desktops from a CAPEX to OPEX item. For more information about the Desktone Cloud, visit

Debunking the Top 10 CloudHosted Virtual Desktop Myths

Debunking the Top 10 CloudHosted Virtual Desktop Myths Debunking the Top 10 CloudHosted Virtual Desktop Myths Page 1 Summary Desktops as a Service (DaaS) is the delivery of a virtual desktop offered as a hosted service offered by a service provider. DaaS has

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

The Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service

The Technical Differential: Why Service Providers Choose VMware for Cloud-Hosted Desktops as a Service The Technical Differential: Technical WHITE PAPER Table of Contents Executive Summary...3 Partnering With VMware Makes Business Sense...3 The VMware DaaS Blueprint...3 The VMware Technology Advantage...4

More information

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and

More information

Debunking the Top 11 Cloud Desktop Myths

Debunking the Top 11 Cloud Desktop Myths Debunking the Top 11 Cloud Desktop Myths IP THE CLOUD SERVICES COMPANY TM Mythbusting DaaS Page 1 Summary Desktop as a Service (DaaS) is the delivery of a virtual desktop(vdi) offered as a hosted service

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Debunking the Top 10 Cloud-Hosted Desktop Myths

Debunking the Top 10 Cloud-Hosted Desktop Myths Debunking the Top 10 Cloud-Hosted Desktop Myths Page 1 Summary Desktops as a Service (DaaS) is the delivery of a virtual desktop offered as a hosted service by a service provider. DaaS has the potential

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

VDI Security for Better Protection and Performance

VDI Security for Better Protection and Performance VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments

More information

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops

Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops January 2015 Comparing the Cost of Ownership of Physical PCs, VDI, and TetherView Desktops Executive Summary Physical desktop and notebook computer infrastructures no longer make sense for the corporate

More information

The Advantages of Security as a Service versus On-Premise Security

The Advantages of Security as a Service versus On-Premise Security The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

Building a Business Case:

Building a Business Case: Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security

More information

The Key to Secure Online Financial Transactions

The Key to Secure Online Financial Transactions Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on

More information

How To Save Money On A Desktop Computer

How To Save Money On A Desktop Computer Comparing the TCO of Physical PCs, VDI, and Cloud-hosted Desktops as a Service (Daas) A Desktone Whitepaper Contents Executive Summary.1 Desktops: Ripe for Change.1 Solutions for Comparison.2 Key Findings..3

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops

Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops Reducing Total Cost of Ownership through Outsourced Hosted Virtual Desktops July 2009 Table of Contents Introduction... 3 What are Outsourced Hosted Virtual Desktops?... 3 How Outsourced Hosted Virtual

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Moving Virtual Desktops to the Cloud

Moving Virtual Desktops to the Cloud Cloud Brief Moving Virtual Desktops to the Cloud EXECUTIVE SUMMARY Physical desktop computer infrastructures no longer make sense for the corporate world. Not only are they expensive, insecure and maintenance-heavy,

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

INTRODUCING isheriff CLOUD SECURITY

INTRODUCING isheriff CLOUD SECURITY INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.

More information

Does your Citrix or Terminal Server environment have an Achilles heel?

Does your Citrix or Terminal Server environment have an Achilles heel? CRYPTZONE WHITE PAPER Does your Citrix or Terminal Server environment have an Achilles heel? Moving away from IP-centric to role-based access controls to secure Citrix and Terminal Server user access cryptzone.com

More information

Innovative Defense Strategies for Securing SCADA & Control Systems

Innovative Defense Strategies for Securing SCADA & Control Systems 1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: info@plantdata.com Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet

More information

Bring Your Own Device:

Bring Your Own Device: Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some

More information

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2 Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations

More information

Avoiding the Top 5 Vulnerability Management Mistakes

Avoiding the Top 5 Vulnerability Management Mistakes WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information

WHITE PAPER RUN VDI IN THE CLOUD WITH PANZURA SKYBRIDGE

WHITE PAPER RUN VDI IN THE CLOUD WITH PANZURA SKYBRIDGE WHITE PAPER RUN VDI IN THE CLOUD WITH PANZURA What if you could provision VDI in the cloud as a utility, colocating ondemand VDI instances and data next to each other and close to your users, anywhere

More information

Module 1: Facilitated e-learning

Module 1: Facilitated e-learning Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Managing Security Risks in Modern IT Networks

Managing Security Risks in Modern IT Networks Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Penetration Testing Service. By Comsec Information Security Consulting

Penetration Testing Service. By Comsec Information Security Consulting Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your

More information

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

THE SECURITY OF HOSTED EXCHANGE FOR SMBs THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

More information

Endpoint Security More secure. Less complex. Less costs... More control.

Endpoint Security More secure. Less complex. Less costs... More control. Endpoint Security More secure. Less complex. Less costs... More control. Symantec Endpoint Security Today s complex threat landscape constantly shifts and changes to accomplish its ultimate goal to reap

More information

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious

More information

How To Secure A Remote Worker Network

How To Secure A Remote Worker Network Key Steps to a Secure Remote Workforce Telecommuting benefits the employee and the company, the community and the environment. With the right security measures in place, there s no need to delay in creating

More information

Network/Cyber Security

Network/Cyber Security Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

How To Secure Your Store Data With Fortinet

How To Secure Your Store Data With Fortinet Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the

More information

The Four-Step Guide to Understanding Cyber Risk

The Four-Step Guide to Understanding Cyber Risk Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated

More information

RSS Cloud Solution COMMON QUESTIONS

RSS Cloud Solution COMMON QUESTIONS RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included

More information

Clean VPN Approach to Secure Remote Access for the SMB

Clean VPN Approach to Secure Remote Access for the SMB Clean VPN Approach to Secure Remote Access for the SMB A clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. CONTENTS Extending Business Beyond

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

Endpoint Security: Moving Beyond AV

Endpoint Security: Moving Beyond AV Endpoint Security: Moving Beyond AV An Ogren Group Special Report July 2009 Introduction Application whitelisting is emerging as the security technology that gives IT a true defense-in-depth capability,

More information

Content Security: Protect Your Network with Five Must-Haves

Content Security: Protect Your Network with Five Must-Haves White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as

More information

2012 Endpoint Security Best Practices Survey

2012 Endpoint Security Best Practices Survey WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single

More information

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization

More information

White Paper. Five Steps to Firewall Planning and Design

White Paper. Five Steps to Firewall Planning and Design Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

Securing mobile devices in the business environment

Securing mobile devices in the business environment IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile

More information

MOVING EMAIL SECURITY TO THE CLOUD. pandasecurity.com

MOVING EMAIL SECURITY TO THE CLOUD. pandasecurity.com MOVING EMAIL SECURITY TO THE CLOUD pandasecurity.com 2 Secure email and Web gateways are great candidates for delivery through a cloudbased delivery mechanism also known as SaaS (security as a service).

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Endpoint data protection solutions for Healthcare

Endpoint data protection solutions for Healthcare Endpoint data protection solutions for Healthcare Your patient data might be at risk Do your doctors use their smart phones, tablets, or personal computing devices for work in addition to their PC at the

More information

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored

More information

End User Computing - Cloud Client Computing

End User Computing - Cloud Client Computing End User Computing - Cloud Client Computing Eduoard Lorrain, VMware David Angwin, Dell The Growing Complexity of Today Diverse Apps Data Everywhere Diverse Platform Diverse Devices Mobile Corporate Devices

More information

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents

More information

Readiness Assessments: Vital to Secure Mobility

Readiness Assessments: Vital to Secure Mobility White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

USING THE INTERNET TO MANAGE AND DISTRIBUTE GEOSPATIAL SUBMARINE CABLE DATA

USING THE INTERNET TO MANAGE AND DISTRIBUTE GEOSPATIAL SUBMARINE CABLE DATA USING THE INTERNET TO MANAGE AND DISTRIBUTE GEOSPATIAL SUBMARINE CABLE DATA GIS Database World Wide Web Internet Data Management Cable Marine RPL Protection David Caswell, Bill Gilmour, David Millar Racal

More information

PCI Data Security Standards (DSS)

PCI Data Security Standards (DSS) ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants

More information

Dell Bring Your Own Device

Dell Bring Your Own Device Dell Bring Your Own Device 2 easy steps to secure BYOD/PC Jason Moody Jason_Moody@Software.Dell.com The trend: Of BYOD very large businesses said securing corporate data on mobile devices was their most

More information

Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.

More information

Bucharest, July 31, 2012 Copyright @ Bitdefender 2012. Cloud Security for Endpoints Customer Presentation

Bucharest, July 31, 2012 Copyright @ Bitdefender 2012. Cloud Security for Endpoints Customer Presentation Bucharest, July 31, 2012 Cloud Security for Endpoints Customer Presentation Pag. 4 Traditional security pitfalls On-premise management server complexities Too cumbersome for organizations that lack servers

More information

Network Intrusion Prevention Systems Justification and ROI

Network Intrusion Prevention Systems Justification and ROI White Paper October 2004 McAfee Protection-in-Depth Strategy Network Intrusion Prevention Systems 2 Table of Contents Are My Critical Data Safe? 3 The Effects and Results of an Intrusion 3 Why the Demand

More information

Virtual Desktop Infrastructure Planning Overview

Virtual Desktop Infrastructure Planning Overview WHITEPAPER Virtual Desktop Infrastructure Planning Overview Contents What is Virtual Desktop Infrastructure?...2 Physical Corporate PCs. Where s the Beef?...3 The Benefits of VDI...4 Planning for VDI...5

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public

More information

Protecting personally identifiable information: What data is at risk and what you can do about it

Protecting personally identifiable information: What data is at risk and what you can do about it Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most

More information

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT TECHNICAL DOCUMENT SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT 2 OVERVIEW When it comes to deploying Microsoft

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

How to Prevent a Data Breach and Protect Your Business

How to Prevent a Data Breach and Protect Your Business Enforcing Security Policies Key Differentiator NetVanta Microsoft Desktop Auditing Providing Insight Into Your Network With an increasingly mobile workforce, technology portability, and the increase in

More information

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse

More information