SlideShare a Scribd company logo
©2009 Desktone, Inc. All rights reserved.   Virtual Desktops:How secure can they be? Danny Allan, Chief Solution Architect  April 26, 2011
Agenda ©2011 Desktone, Inc. All rights reserved.  Traditional Desktop Virtual Desktop Infrastructure (VDI) Cloud-based Desktops Desktop Security Desktone Overview Today’s Presenter Danny Allan Desktone Chief Solutions Architect danny.allan@desktone.com
©2009 Desktone, Inc. All rights reserved.  TraditionalDesktop Desktop Virtualization & Cloud Overview
Why the Switch to Cloud? For a variety of reasons, cloud technologies are too compelling to ignore. Dynamically scalable,  virtualized resources provided as a service AccessibilitySpeed Cost ,[object Object]
 Reduce cost
 Expedite time to market
 Focus resources
 Do more projects  “Utility” billing (pay as you use) “Unlimited” processing and storage Elasticity to scale up or down On demand, self-service Highly automated
©2009 Desktone, Inc. All rights reserved.  Desktop Virtualization & Cloud Overview
OS Data Apps Settings Preferences Desktop Management Today ©2011 Desktone, Inc. All rights reserved.   Tipping point for change is here... Expensive Support-heavy Insecure Migration to Windows 7 New mobile access Tighter IT budgets Security
The Promise of Virtual Desktops (VDI) Virtual desktops Centrally managed In IT data center ,[object Object]
IT consolidation
Easier to manage
Happy users©2011 Desktone, Inc. All rights reserved.   OS Data Apps Settings Preferences Virtual Desktops
… but major BARRIERS exist Traditional VDI Reality ©2011 Desktone, Inc. All rights reserved.   Start UpHuge up-front costs Many Moving PartsComplex to design & build  Operationally IntensiveDifficult to maintain Is It StrategicDo you want to be building and managing data centers
Cloud-Based Desktops (DaaS) ©2011 Desktone, Inc. All rights reserved.   Business Benefits Desktop Cloud ,[object Object]
Device independence
Lower TCO
Low cash out = low risk
Customer satisfactionFrom Any Device From Any Location FIXED TELEWORKERS PARTNERS & SUPPLIERS TEMPORARY OFFICES BRANCH OFFICES
Securing the Desktop
End-to-end Desktop Security Manage ©2011 Desktone, Inc. All rights reserved.  Ensure the desktop and OS have the needed AV, FW, patches and config Protect Assess Personal Desktop Assess user compliance with business conduct guidelines Defend the desktop from malicious and unauthorized access Deliver Verify that the delivery of the desktop is not monitored or altered
A desktop management problem ©2011 Desktone, Inc. All rights reserved.  20 M desktops infected with malware in 1H10 in USA * http://www.microsoft.com/security/sir/
Desktop Management Challenge Comprehensive and consistent OS patching and configuration User controls / application controls End point controls AV/FW synchronization Real world example LIHF – 8B security incidents every day Rimecud, Stuxnet Ability to Deliver DaaS – Ability to deliver sandboxed solutions across the internet VDI – Multi-tenancy is impossible to achieve internally Traditional – Unmitigated disaster  resulting in largest security spend segment ©2011 Desktone, Inc. All rights reserved.
A desktop protection problem ©2011 Desktone, Inc. All rights reserved.  1.7 M records known lost on stolen laptops in 2010 ,[object Object]
http://www.datalossdb.org/,[object Object]
Desktop Delivery Challenge Eliminating the threat of eavesdropping Ensuring the user can trust the communication from the server Ensuring the server can attest to client actions Real world example Critical vulnerabilities in RDP < 7.0 (eg. MS09-044, MS05-041) CSRF vulnerabilities are exploding Ability to Deliver DaaS – Consider stronger encryption capabilities across the internet VDI – Many respected guides recommend disabling RDP encryption Traditional – Due to the significant variations and types of communication initiated from the desktop, it is difficult to impossible to lock this down securely ©2011 Desktone, Inc. All rights reserved.
A User Monitoring Problem ©2011 Desktone, Inc. All rights reserved.  3M records known stolen by malicious insiders in 2010 ,[object Object]
http://www.kwtx.com/,[object Object]
©2009 Desktone, Inc. All rights reserved.  Desktone Overview
Who is Desktone ©2011 Desktone, Inc. All rights reserved.   = Cloud-based Virtual Desktops Built from the start for cloud-hosted desktops as a service (DaaS) Security, end-user performance and customer support is JOB #1 Frictionless try and buy experience Optimized, tested & deployed with the worlds largest companies and service providers
VDI vs. Cloud based Desktops DaaS VDI
1. IT Friendly Solution Easy to manage ,[object Object]

More Related Content

What's hot

Wyse webinar presentation Web2Present Managing mobility in a changing device ...
Wyse webinar presentation Web2Present Managing mobility in a changing device ...Wyse webinar presentation Web2Present Managing mobility in a changing device ...
Wyse webinar presentation Web2Present Managing mobility in a changing device ...Web2Present
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
Jonathan Wade
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
Uni Systems S.M.S.A.
 
Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!
Kenneth de Brucq
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsPete Valentine
 
Citrix Marketing Content -ebook
Citrix Marketing Content -ebookCitrix Marketing Content -ebook
Citrix Marketing Content -ebookKaleidico
 
Voyss Cloud
Voyss CloudVoyss Cloud
Voyss Cloudpswaim
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
Dell EMC World
 
MT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of viewMT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of view
Dell EMC World
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Dell EMC World
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
Dell EMC World
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure247 Invest
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giantseblake
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategy
solarisyougood
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
Dell World
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
Dell EMC World
 

What's hot (18)

Wyse webinar presentation Web2Present Managing mobility in a changing device ...
Wyse webinar presentation Web2Present Managing mobility in a changing device ...Wyse webinar presentation Web2Present Managing mobility in a changing device ...
Wyse webinar presentation Web2Present Managing mobility in a changing device ...
 
Citrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWadeCitrix Mforum 2014 m104 JonathanWade
Citrix Mforum 2014 m104 JonathanWade
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
 
Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!
 
Hosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed ApplicationsHosted Virtual Desktops and Streamed Applications
Hosted Virtual Desktops and Streamed Applications
 
Citrix Marketing Content -ebook
Citrix Marketing Content -ebookCitrix Marketing Content -ebook
Citrix Marketing Content -ebook
 
Voyss Cloud
Voyss CloudVoyss Cloud
Voyss Cloud
 
IT__forum_11
IT__forum_11IT__forum_11
IT__forum_11
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
MT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of viewMT03 Cloud trends and the Dell Technologies point of view
MT03 Cloud trends and the Dell Technologies point of view
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
 
Smart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop InfrastructureSmart Style Office for Virtual Desktop Infrastructure
Smart Style Office for Virtual Desktop Infrastructure
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
Presentation smart computing starts with a virtual desktop strategy
Presentation   smart computing starts with a virtual desktop strategyPresentation   smart computing starts with a virtual desktop strategy
Presentation smart computing starts with a virtual desktop strategy
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
 

Similar to Virtual Desktops: How Secure Can They Be?

The Mobile Enterprise Cloud Hosted Virtual Desktops
The Mobile Enterprise Cloud Hosted Virtual DesktopsThe Mobile Enterprise Cloud Hosted Virtual Desktops
The Mobile Enterprise Cloud Hosted Virtual DesktopsDesktone
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization
Dell World
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
Stephen Rose
 
Cloud Hosted Desktops - The Smart, Low Risk Way To Enter The Cloud
Cloud Hosted Desktops - The Smart, Low Risk Way To Enter The CloudCloud Hosted Desktops - The Smart, Low Risk Way To Enter The Cloud
Cloud Hosted Desktops - The Smart, Low Risk Way To Enter The CloudJeff Fisher
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of Desktops
Desktone
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
Md Yousup Faruqu
 
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Peter Ocasek
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Future
stevej7699
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business case
TripleValue
 
Enterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsEnterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsMolten Technologies
 
Virtual desktop-Citrix Part 1
Virtual desktop-Citrix Part 1 Virtual desktop-Citrix Part 1
Virtual desktop-Citrix Part 1
ncceconnect
 
Virtual desktop-Citrix Part 2
Virtual desktop-Citrix Part 2Virtual desktop-Citrix Part 2
Virtual desktop-Citrix Part 2
ncceconnect
 
VMware & Unidesk Customer Webinar: Wisconsin Department of Children and Families
VMware & Unidesk Customer Webinar: Wisconsin Department of Children and FamiliesVMware & Unidesk Customer Webinar: Wisconsin Department of Children and Families
VMware & Unidesk Customer Webinar: Wisconsin Department of Children and Families
Unidesk Corporation
 
Windows 7: Unleash the Power
Windows 7: Unleash the PowerWindows 7: Unleash the Power
Windows 7: Unleash the Power
Doug Dooley
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
ncceconnect
 
NOVA_Synergy_Citrix_TT
NOVA_Synergy_Citrix_TTNOVA_Synergy_Citrix_TT
NOVA_Synergy_Citrix_TTGeorgie Montes
 
VMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo CollegeVMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo College
Unidesk Corporation
 
A Citrix Masterclass
A Citrix MasterclassA Citrix Masterclass
A Citrix Masterclassbluechipper
 

Similar to Virtual Desktops: How Secure Can They Be? (20)

The Mobile Enterprise Cloud Hosted Virtual Desktops
The Mobile Enterprise Cloud Hosted Virtual DesktopsThe Mobile Enterprise Cloud Hosted Virtual Desktops
The Mobile Enterprise Cloud Hosted Virtual Desktops
 
Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization Innovations that simplify desktop virtualization
Innovations that simplify desktop virtualization
 
Get On The Bus Keynote
Get On The Bus KeynoteGet On The Bus Keynote
Get On The Bus Keynote
 
Cloud Hosted Desktops - The Smart, Low Risk Way To Enter The Cloud
Cloud Hosted Desktops - The Smart, Low Risk Way To Enter The CloudCloud Hosted Desktops - The Smart, Low Risk Way To Enter The Cloud
Cloud Hosted Desktops - The Smart, Low Risk Way To Enter The Cloud
 
Comparing the TCO of Desktops
Comparing the TCO of DesktopsComparing the TCO of Desktops
Comparing the TCO of Desktops
 
Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization Business Case Of Desktop Virtualization
Business Case Of Desktop Virtualization
 
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
Model mieszany, kiedy wirtualizować aplikacje a kiedy desktopy?
 
Designing End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the FutureDesigning End-User Experience for Workplace of the Future
Designing End-User Experience for Workplace of the Future
 
Vmware view vdi for americana's business case
Vmware view vdi for americana's business caseVmware view vdi for americana's business case
Vmware view vdi for americana's business case
 
Enterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktopsEnterprise Desktops Well Served - a technical perspective on virtual desktops
Enterprise Desktops Well Served - a technical perspective on virtual desktops
 
Virtual desktop-Citrix Part 1
Virtual desktop-Citrix Part 1 Virtual desktop-Citrix Part 1
Virtual desktop-Citrix Part 1
 
Virtual desktop-Citrix Part 2
Virtual desktop-Citrix Part 2Virtual desktop-Citrix Part 2
Virtual desktop-Citrix Part 2
 
Vdi
VdiVdi
Vdi
 
VMware & Unidesk Customer Webinar: Wisconsin Department of Children and Families
VMware & Unidesk Customer Webinar: Wisconsin Department of Children and FamiliesVMware & Unidesk Customer Webinar: Wisconsin Department of Children and Families
VMware & Unidesk Customer Webinar: Wisconsin Department of Children and Families
 
Windows 7: Unleash the Power
Windows 7: Unleash the PowerWindows 7: Unleash the Power
Windows 7: Unleash the Power
 
OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013OCSL - Migrating to a Virtualised Modern Desktop June 2013
OCSL - Migrating to a Virtualised Modern Desktop June 2013
 
Virtual desktops-VMWare
Virtual desktops-VMWareVirtual desktops-VMWare
Virtual desktops-VMWare
 
NOVA_Synergy_Citrix_TT
NOVA_Synergy_Citrix_TTNOVA_Synergy_Citrix_TT
NOVA_Synergy_Citrix_TT
 
VMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo CollegeVMware & Unidesk Customer Webinar: Menlo College
VMware & Unidesk Customer Webinar: Menlo College
 
A Citrix Masterclass
A Citrix MasterclassA Citrix Masterclass
A Citrix Masterclass
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Virtual Desktops: How Secure Can They Be?

  • 1. ©2009 Desktone, Inc. All rights reserved. Virtual Desktops:How secure can they be? Danny Allan, Chief Solution Architect April 26, 2011
  • 2. Agenda ©2011 Desktone, Inc. All rights reserved. Traditional Desktop Virtual Desktop Infrastructure (VDI) Cloud-based Desktops Desktop Security Desktone Overview Today’s Presenter Danny Allan Desktone Chief Solutions Architect danny.allan@desktone.com
  • 3. ©2009 Desktone, Inc. All rights reserved. TraditionalDesktop Desktop Virtualization & Cloud Overview
  • 4.
  • 6. Expedite time to market
  • 8. Do more projects “Utility” billing (pay as you use) “Unlimited” processing and storage Elasticity to scale up or down On demand, self-service Highly automated
  • 9. ©2009 Desktone, Inc. All rights reserved. Desktop Virtualization & Cloud Overview
  • 10. OS Data Apps Settings Preferences Desktop Management Today ©2011 Desktone, Inc. All rights reserved. Tipping point for change is here... Expensive Support-heavy Insecure Migration to Windows 7 New mobile access Tighter IT budgets Security
  • 11.
  • 14. Happy users©2011 Desktone, Inc. All rights reserved. OS Data Apps Settings Preferences Virtual Desktops
  • 15. … but major BARRIERS exist Traditional VDI Reality ©2011 Desktone, Inc. All rights reserved. Start UpHuge up-front costs Many Moving PartsComplex to design & build Operationally IntensiveDifficult to maintain Is It StrategicDo you want to be building and managing data centers
  • 16.
  • 19. Low cash out = low risk
  • 20. Customer satisfactionFrom Any Device From Any Location FIXED TELEWORKERS PARTNERS & SUPPLIERS TEMPORARY OFFICES BRANCH OFFICES
  • 22. End-to-end Desktop Security Manage ©2011 Desktone, Inc. All rights reserved. Ensure the desktop and OS have the needed AV, FW, patches and config Protect Assess Personal Desktop Assess user compliance with business conduct guidelines Defend the desktop from malicious and unauthorized access Deliver Verify that the delivery of the desktop is not monitored or altered
  • 23. A desktop management problem ©2011 Desktone, Inc. All rights reserved. 20 M desktops infected with malware in 1H10 in USA * http://www.microsoft.com/security/sir/
  • 24. Desktop Management Challenge Comprehensive and consistent OS patching and configuration User controls / application controls End point controls AV/FW synchronization Real world example LIHF – 8B security incidents every day Rimecud, Stuxnet Ability to Deliver DaaS – Ability to deliver sandboxed solutions across the internet VDI – Multi-tenancy is impossible to achieve internally Traditional – Unmitigated disaster  resulting in largest security spend segment ©2011 Desktone, Inc. All rights reserved.
  • 25.
  • 26.
  • 27. Desktop Delivery Challenge Eliminating the threat of eavesdropping Ensuring the user can trust the communication from the server Ensuring the server can attest to client actions Real world example Critical vulnerabilities in RDP < 7.0 (eg. MS09-044, MS05-041) CSRF vulnerabilities are exploding Ability to Deliver DaaS – Consider stronger encryption capabilities across the internet VDI – Many respected guides recommend disabling RDP encryption Traditional – Due to the significant variations and types of communication initiated from the desktop, it is difficult to impossible to lock this down securely ©2011 Desktone, Inc. All rights reserved.
  • 28.
  • 29.
  • 30. ©2009 Desktone, Inc. All rights reserved. Desktone Overview
  • 31. Who is Desktone ©2011 Desktone, Inc. All rights reserved. = Cloud-based Virtual Desktops Built from the start for cloud-hosted desktops as a service (DaaS) Security, end-user performance and customer support is JOB #1 Frictionless try and buy experience Optimized, tested & deployed with the worlds largest companies and service providers
  • 32. VDI vs. Cloud based Desktops DaaS VDI
  • 33.
  • 36.
  • 37. Pilot ease – no infrastructure required©2011 Desktone, Inc. All rights reserved.
  • 38.
  • 39. Work from anywhere: home, office, or StarbucksLeverages “Bring Your Own PC” (BYOPC) movement “Instant on” experience ©2011 Desktone, Inc. All rights reserved.
  • 40.
  • 42. No expensive management resources required
  • 43. No hidden costs©2011 Desktone, Inc. All rights reserved.
  • 44.
  • 45. Pay for only what you need
  • 46. OPEX budget consistency©2011 Desktone, Inc. All rights reserved.
  • 47.
  • 48. Support – dedicated virtualization experts
  • 49. Operational Excellence – 4 years of hosted desktop delivery
  • 50. Training – rich library of self-paced training modules and live knowledge transfer sessions©2011 Desktone, Inc. All rights reserved.
  • 51.
  • 52.
  • 53.
  • 55.
  • 56. Bring your own licensesAccess Anywhere ©2011 Desktone, Inc. All rights reserved.
  • 57. The Desktone Cloud Consists of two primary interfaces Desktone Enterprise Center Used by desktop admins to manage the Desktone Cloud Desktone Portal Used by end-users for access to resources on the Desktone Cloud
  • 58. End Point Devices Mobile DevicesiPad “DaaS Mobile Client” avail in the iTunes Store Thin clientsAll leading vendors supported Standard PCsAccess through their preferred web browser or DaaS Client. End-User Access
  • 59. What the Analysts Say “Enterprises want to take advantage of virtual desktops, but are stymied by cost and complexity. With its attractive price point and easy on-ramp, the Desktone Cloud lowers the barrier to entry. “ “This idea of desktops as a service is gaining a lot of interest in the market. IDC believes it is very valid model; the technologies are coming together and I expect it will gain in adoption." “If nobody had influenced you in any way and you were just asked to draw out a sense of a virtualization of services to end users, you would head in this direction.  I have no doubt about it.  It’s very appealing.”
  • 60.
  • 61. Centralized desktop management, control and visibilityVDI was supposed to solve the problems – but has introduced other issues for most especially cost and complexity ©2011 Desktone, Inc. All rights reserved.
  • 62. Resources Free Desktop Security White Paper http://bit.ly/slidesharedesktopsecuritywp Free Trial: www.desktone.com ©2011 Desktone, Inc. All rights reserved.
  • 63. Questions?? Questions / Feedback danny.allan@desktone.com Schedule a Live Demo 866-691-5660 or info@desktone.com Desktop in 90 Seconds! Check out our Free Trial of a Cloud Hosted Desktop – in less than 90 seconds you’ll be up and running! http://bit.ly/securedesktopfreetrial ©2011 Desktone, Inc. All rights reserved.

Editor's Notes

  1. So we’ve seen the hype, but what are they really talking about? In simple terms….what is the Cloud…..and what are the benefits to businesses?The key characteristics of Cloud Computing - it is based on a virtualized infrastructure, is designed to be highly scalable and is provisioned as a service. More specifically:-Most clouds are underpinned by “utility billing”…or pay as you go. Think of your electric bill at home where you pay for only what you use. Same with the Cloud.Generally speaking, Cloud resources are unlimited. Great when you are not sure how much compute power or storage you’ll need for a certain workload. It’s good to know its there if you need it!Another key attribute of the cloud is that you can rapidly scale it up or down….depending on your needs. Again paying for only what you need.Most cloud infrastructure is quick and easy to provision and set up to be easy to self-administerSupporting the “self service” nature of the Cloud, there tends to be a lot of automation to make this easy for the userBenefits to the business – what does this mean to the business that implement the Cloud as part of a comprehensive IT strategy Increased agility, lower cost and better use of resources
  2. Why are you looking at desktop virtualization?
  3. Cost reduction… equipment, support, software Consolidation into the data centerSecured desktop information at the data centerClaim green
  4. Move the stale desktop market to the cloud just as the server market has happenedDesktone’s cloud DaaS model eliminates cost and complexityDesktop clouds give enterprises the full benefits of VDI, without the costs or risksEnterprises outsource the deployment and operationsDaaS reduces the technical expertise required