Sponsored by SearchServerVirtualization
This chapter looks at how desktop virtualization technology can be applied to secure and manage multiple mobile devices governed under bring your own device policies.
Virtual Desktop Infrastructure (VDI) and bring your own device (BYOD) policies are complementary elements of a modern endpoint management strategy. VDI can be used for application management, and IT can set BYOD policies to deal with a range of user-owned consumer devices. But VDI isn't a panacea, so administrators still need to keep aware of evolving issues such as security and licensing.
IT professionals are always looking to get the most out of their existing infrastructure, but they may not have realized the connections between recent investments in desktop virtualization and BYOD. The ability to use VDI to help with BYOD and vice versa represents a growth area in related technologies and corporate best practices. IT admins and users must first navigate the technologies available and devise policies. Access >>>
Premium Content for Free.
Access Other Available Chapters
Though keeping up with quickly evolving desktop virtualization technologies can be a challenge, the primary reason most virtual desktop projects fail...
Consumerization and mobile computing have pushed IT to look for desktop solutions that can enable worker mobility and allow on-demand access to ...
This chapter takes a look at thin clients and zero clients, lightweight devices that could help organizations offset the expenses and management ...
More Premium Content Accessible For Free
Develop your criteria for selecting VDI software
Learn about the latest options for VDI platforms and get an overview of the vendors and products that IT has to choose from. Also, get more ...
What it takes to make zero clients add up
This chapter looks at the major considerations in making a final decision on whether to move an organization's desktops to zero clients. Cost, return...
Find the best route to deliver application virtualization
IT no longer needs to deliver full desktops to users; instead, most users require access to only certain applications. So, IT needs to determine the ...