Protecting endpoints, your users, and your data is becoming increasingly more difficult. And with a more mobile workforce that’s working outside the walls of the corporate office, protecting and detecting threats and criminal activity are real challenges for both the InfoSec and desktop engineering teams. 

The Desktop Belongs in the Data Centre

Since the late ‘90s, Citrix have been leading the charge in the Remote Desktop services space, and for reasons in addition to security, have been promoting the benefits of desktop virtualisation and use of remote protocols to desktops and applications running inside the data centre.

Today, Citrix, VMware, and AWS lead a market commonly referred to as Virtual Desktop Infrastructure (VDI) or Desktop-as-a-service (DaaS). 

Recently at Microsoft Ignite, Microsoft validated the VDI space by offering Windows Virtual Desktop (WVD) on Azure for no additional licencing cost. 

Historically, VDI has helped remote users on low-bandwidth connections gain faster access to apps, and for many has enabled “any-device access” to applications from anywhere. This cost-effective way of delivering applications is proven and scalable. By hosting desktops and applications in virtualised data centres, the applications and therefore the data never leave the data centre.

In today’s world of increased cyber threats and a more mobile workforce, it’s easier, cheaper, safer, and more manageable to bring the desktop back into the corporate castle—into the data centre—where it can be managed and secured.

Take a few minutes to learn more about centralized secure management of physical and virtual endpoints with the help of Ivanti solutions, including User Workspace Manager.

Simon Townsend, based in Reading, UK, is Ivanti’s Chief Technologist for EMEA. He’s a passionate and experienced technologist and evangelist with both field- and executive-level experience, and has held leadership positions in global systems engineering, pre-sales, and product management. His specialties include digital transformation, end-user computing and workspace management, and endpoint security.

National Cybersecurity Month: How to be Prepared