Feeds

Desktop virt used to cope with Starbucks workforce security

CIOs fear users roaming in public with backdoors exposed

Internet Security Threat Report 2014

The trend for mobile working has fuelled demand for desktop virtualisation, says a survey by Citrix as employers want to know that their out-of-office workforce are on secure machines.

As employees increasingly work from home, or Starbucks, companies want ways to keep their devices and data secure. Desktop virtualisation is seen as one answer: 86 percent of the international companies surveyed by Citrix, a cloud provider, cited security as their primary motivation for getting into the area. Device, app and data security were top advantages of the technology, as well as the ability to remotely wipe computers.

55% of the companies surveyed expect to roll out desktop virtualisation deployments for the first time by 2013.

Desktop virtualisation is seen as a tool that will help keep the sys admin in control even when the computers are out of his reach. The advantages cited by the IT professionals included:

- 74 percent envisage using desktop virtualization to instantly update an entire enterprise’s network of PC and computing devices
- 66 percent cite the secure delivery of applications and data as a critical security capability that led to their decision to implement desktop virtualization
- 61 percent said Compliance requirements are also a key driver to adoption
- 53 percent citing activity monitoring, logging and reporting as important capabilities delivered by desktop virtualization.

The survey questioned 1100 IT professionals in 11 countries including Europe, the US, Brazil, China and India and was carried out on behalf of Citrix by Vanson Bourne in October 2011. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.