The Endpoint Isolation Blog

Showing results for BYOD

  • How to Spin Up a Robust BYOD Security Strategy for your Growing Remote Workforce

    By Marc Gaffan. October 21, 2020

    Before the pandemic, the trend of remote work had been slowly increasing. Most companies assumed employees would be working from the office most of the time. Similarly, some companies allowed employees limited remote access to the corporate systems from their personal devices (BYODs). Following the COVID-19 outbreak though – offices around the globe were forced […]

  • Is VDI Cost Effective vs Win10 Laptops?

    By Yan Aksenfeld. January 30, 2020

    Let’s stipulate up front that there are certain situations where Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) are viable and even a wise choice. That said, if you make the move to VDI with an expectation that the technology will save you money, it’s not going to end well. VDI costs can be significant and […]

  • VDI Challenges: The Problem with VDI

    By Tal Zamir. December 15, 2019

    Anyone who’s been in enterprise IT long enough has already heard of, tested or deployed virtual desktop infrastructure (VDI) solutions (like VMware and Citrix). And why not? The promises made by VDI vendors have been compelling, if not always accurate: cost savings, enabling bring your own device (BYOD), improving the user experience and business continuity,  […]

  • VDI Security Best Practices: Breaking the Myth

    By Tal Zamir. December 14, 2019

    CISOs and security professionals often refer to Virtual Desktop Infrastructure (VDI) (made popular by VMWare & Citrix) and other “remote application” solutions as security barriers that hackers have a hard time bypassing. That’s a myth, and here’s why. 1. Thin client scenarios are precarious.  These virtualization efforts pose only a minor hurdle to determined cyber-criminals. […]

  • Does VDI protect against data leaks? 

    By Tal Zamir. November 9, 2019

    The short answer is simply no. Read more to find out why and to get some tips on how to fix things and get real security while keeping VDI in place (if you have to). In this post, when we use the term VDI, we refer to many different variants of remote desktops/apps, of any […]