If end users are also using these devices for personal activity, such as browsing risky websites, attackers could gain access to the devices and subsequently the virtual desktops, making it possible to steal or destroy sensitive corporate data. At the same time, many VDI deployments support work-from-home and BYOD programs, enabling connectivity across connections and devices that IT can't monitor or control like on-premises systems.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |