DZone
Cloud Zone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
  • Refcardz
  • Trend Reports
  • Webinars
  • Zones
  • |
    • Agile
    • AI
    • Big Data
    • Cloud
    • Database
    • DevOps
    • Integration
    • IoT
    • Java
    • Microservices
    • Open Source
    • Performance
    • Security
    • Web Dev
DZone > Cloud Zone > Securing Virtual Desktops

Securing Virtual Desktops

Brian Gracely user avatar by
Brian Gracely
·
Feb. 11, 12 · Cloud Zone · Interview
Like (0)
Save
Tweet
2.91K Views

Join the DZone community and get the full member experience.

Join For Free
The Cloudcast - Eps.31 - “Securing Virtual Desktops”
Date: Feb.9, 2012
Guest: Mike Foley (@mikefoley, http://www.yelof.com/) Product Architect @ RSA

Mike Foley was previously on the podcast talking about security in a vCloud Director environment at VMworld 2011. This week we decided to add something new to the podcast, so Mike and Brian did a whiteboard video of their discuss (see below).

Date: February 9, 2012

By: Aaron Delp and Brian Gracely

Description: Brian talks with Mike Foley (@mikefoley) from RSA about securing virtual desktops and BYOD environments.


Topic 1 - Let’s start with a basic concept. One of the selling points of virtual desktops was the idea that data would be centralized (not on a device), hence it would intrinsically be safer. Debunk that myth for us.

Topic 2 - Let’s talk bigger picture - where are the security “concerns” that virtual desktops introduce and where are the most critical places to be focused on security / risk-mitigations?
http://www.yelof.com/?p=225

Topic 3 - To deploy virtual desktops, it requires many silos of technology to be interconnected (servers, storage, network, etc.). This is much more complex that desktops have been in the past. Where do you find the security ownership usually resides across a virtual desktop project?

Topic 4 - With more people bringing in non-Windows devices into their businesses, how does that change the landscape for security in delivering an “end user computing” experience?

The Cloudcast (.net) #31 - Securing Virtual Desktops (26:58)

Download the MP3


Source: http://www.thecloudcast.net/2012/02/cloudcast-eps31-securing-virtual.html



Desktop (word processor)

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Introduction to JWT (Also JWS, JWE, JWA, JWK)
  • SQL CTE: How to Master It in One Sitting With Easy Examples
  • Top 20 Git Commands With Examples
  • Secure Your WSO2 Micro Integrator Deployment

Comments

Cloud Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • MVB Program
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends:

DZone.com is powered by 

AnswerHub logo