Welcome!

Related Topics: Containers Expo Blog, Mobile IoT, Microsoft Cloud, Agile Computing, @CloudExpo, Cloud Security

Containers Expo Blog: Article

Can Virtual Desktop Infrastructure Improve BYOD Security Issues?

VDIs Can Solve Several Common BYOD Concerns

Bring Your Own Device policies have fascinated both the corporate world and the tech world for some time now. Part of the allure is the added productivity and the added ease of use for workers. But, that doesn't explain why there are thousands of tech pieces on BYOD policies, failings and warnings. The truth is, we're all fascinated by how it flawlessly bridges the gap between home and work life.

BYOD first sprung up as Millennials demanded more flexibility, more control. They wanted less of a barrier between work and home life, and working from their iPads while watching Netflix at home struck the perfect balance.

Then, there were the problems that inevitably followed. Companies realized that employees' devices are almost never as secure as corporate machines. When devices got stolen, there weren't many options to deal with the situation, and sensitive company information fell into strangers' hands.

Businesses tightened security on the devices that participated in the program, and employees began to realize what that means. Some BYOD policies began to include total remote wipe abilities and geo-locating capabilities. Employees pushed back, some sued and policies changed. Now, most offices have given up remote wipes and using the phone's GPS for any in-house apps.

The top thinkers in the tech space haven't quite found the magic bullet to alleviate all security and consistency concerns for the consumerization of IT yet, but there are signs they're getting closer. Stemming from these conflicting needs of security and privacy, more solutions were searched out. The best and the brightest came up with using Virtual Desktop Infrastructures. VDIs run virtual desktops right from the company servers, which the company is free to lock-down as much as they feel like they need to.

Traditional BYOD policies had two main concerns: Companies worried about security; employees worried about privacy. VDIs are almost perfectly suited to solve these BYOD issues.

Security Issues
Company data doesn't live on the employee device so remote wipes aren't necessary. If an employee loses their device, their account can simply be denied access. Firewalls are put in place on the company server side; not on the employee device. There are still some limited security concerns, but the practice has been deemed good enough to house medical records.

Privacy Issues
Employees are working on a virtual machine that doesn't require the permissions that an app might. There's no geo-locating need, since the company data is secure on the company servers. The company has no need to look at phone data, because nothing on the virtual server will be affected by it. In terms of employee privacy, it's as near a perfect solution as can be found with our current technology.

Incompatibility Issues
Kindle Fires, Nooks, Nexuses and iPads don't all run the same software. Sometimes programs aren't available for each device at all, other times employees just haven't invested in them. Instead of forcing the entire office to purchase mobile versions of Microsoft Office, access virtual machines on them so they can all have access to the same software they use at their desks. Of course, this means that they can still use the same firewall and security programs as well.

In a world where the only thing valued more than company security is individual privacy, tech experts are trying to find the perfect solution to the BYOD dilemma. Virtual Desktop Infrastructures have burst back onto the scene just in time to offer some glimmer of hope that everyone's priorities can be met.

More Stories By Amy Bishop

Amy Bishop works in marketing and digital strategy for a technology startup. Her previous experience has included five years in enterprise and agency environments. She specializes in helping businesses learn about ways rapidly changing enterprise solutions, business strategies and technologies can refine organizational communication, improve customer experience and maximize co-created value with converged marketing strategies.

Connect with Amy on Twitter, LinkedIn, Google+ or Pinterest.

Latest Stories
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 21st Int\ernational Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their ...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
"Tintri focuses on the Ops side of the DevOps, which basically is pushing more and more of the accessibility of the infrastructure to the developers and trying to get behind the scenes," explained Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
Automation is enabling enterprises to design, deploy, and manage more complex, hybrid cloud environments. Yet the people who manage these environments must be trained in and understanding these environments better than ever before. A new era of analytics and cognitive computing is adding intelligence, but also more complexity, to these cloud environments. How smart is your cloud? How smart should it be? In this power panel at 20th Cloud Expo, moderated by Conference Chair Roger Strukhoff, paneli...
In his session at @ThingsExpo, Eric Lachapelle, CEO of the Professional Evaluation and Certification Board (PECB), provided an overview of various initiatives to certify the security of connected devices and future trends in ensuring public trust of IoT. Eric Lachapelle is the Chief Executive Officer of the Professional Evaluation and Certification Board (PECB), an international certification body. His role is to help companies and individuals to achieve professional, accredited and worldwide re...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...