The positive impact that server virtualization has had on computing infrastructures has led IT staffs to look for ways to extend these benefits to other areas of their operating environments. One such opportunity involves the centralization of desktop computing via VDI (virtual desktop infrastructure) technology. While centrally executing and managing desktop images offers many benefits to both IT and end-users, the potential impact on the network and other underlying data center infrastructure should not be overlooked.
ESG surveyed 308 North American and Western European IT and information security professionals representing enterprise-class organizations (1,000 employees or more) that were responsible for or familiar with their organization’s current policies, procedures, and technologies used to protect and secure confidential information.
Identity management and security were once thought of as independent IT activities but this is rapidly changing. Why? New business processes, web-based applications, external collaboration, and user mobility are driving tight integration between traditional identity management activities like user provisioning and authentication with security requirements like malware detection, information assurance, and auditing. Many technology vendors offer products in one or both of these areas but Microsoft stands out for its tight integration between identity, security, and its existing broad base Windows infrastructure.
Facing a combination of regulatory compliance, malicious threats, and publicly-disclosed breaches, PC encryption has become a requirement for most businesses. Historically, that meant encryption software, but this model will likely become obsolete as more PCs integrate self-encrypting hard drives. Why? Hard drive-based encryption offers ease-of-use, performance, and security advantages that are too attractive to pass up. This conversion is gaining tremendous momentum thanks to the activities of leading technology companies like Seagate and Dell.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s information security service. With over 25 years of technology industry experience, Jon is widely recognized as an expert in all aspects of information security and is often called upon to help customers understand a CISO's perspective and strategies. Recently, Jon has been an active participant with cybersecurity issues, legislation, and technology within the U.S. federal government.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188
Enter your email address, and click subscribe