Additionally, if an employee leaves an organization there is no need to remove applications and data from user devices any data on the user device is ephemeral by design and does not persist when a virtual desktop session ends. By removing OS and application concerns from user devices, desktop virtualization enables centralized security control, with hardware security needs limited to virtualization servers, and an emphasis on identity and access management with role-based permissions that limit users only to those applications and data they are authorized to access. ![]()
0 Comments
Leave a Reply. |