Posted by:
admin
14 years, 1 month ago
Users are increasingly connecting their own devices to the corporate network. despite policy that may forbid it. CIOs are "embracing and extending" this movement by providing Virtual Desktop Infrastructure (VDI). Essentially they are saying "You can have whatever device you pay for as long as it goes through our control system. This article has a nice overview of the security requirements for rolling out VDI, including, of course, two-factor authentication.
Share on Twitter Share on Facebook