Blog Header Banner

Archive for the ‘encryption protocol’ tag

Secure Virtual Desktops!   no comments

Posted at Jan 30, 2014 @ 2:08pm Web hosting

I was recently asked by a potential client in the financial services field if we had the ability to provide them with a safe and secure virtual desktop platform for some work-from-home staffing they were about to setup. My response of course was that we could provide a secure platform that will have multiple layers of security and further explained how you could go about this.

Anytime you have remote staff logging into a corporate environment with devices other than those supplied and locked down by that particular company’s IT department, you need to be sure the connections will be secure. In this case it would be remote users logging in from their home computers,   so you have to be sure the Virtual Desktop deployment would be setup utilizing multiple layers of security in the following manner.

The first layer of security entails locking down the virtual desktop itself to restrict the ability of the users by properly setting the permission levels to avoid downloads to the desktop that might cause it to be compromised. Secondly to ensure you have a secure connection, a VPN tunnel should be setup between the Home PC, Mac, Thin Client, iPad or Tablet and the URL assigned as the login to the Virtual Desktop. This will provide you with a secure encrypted connection between the two.

Virtual Desktop Security

As you can see in the schematic by setting up an SSL Certificate on the login page, an additional layer of encryption would then added. Once you are have secured the login page each user should login with credentials complete with a minimum of 12 character alpha numeric passwords. Once the username and password are accepted the connection protocol begins utilizing another layer of encryption to connect to the Virtual Desktop. Now finally you have entered the virtual desktop environment that should be hosted in an SSAE 16 Certified data center which ensures the facility is compliant to host secure infrastructure. From this vantage point the computing as well as the connection protocol is completely secure with three layers of encryption and ready to transfer any type of protected data staff would then have access to.

Virtual Desktops are becoming the standard for many types of industry verticals and organizations. The key reasoning is security, accessibility and mobility. You can setup connection protocols from just about any device capable of accessing the internet. Your information and data always stays in the data center and is not available on your local device unless you are connected. Therefor if your laptop, tablet or smartphone is ever lost or stolen your data would never be compromised.

For more information on Virtual Desktops and Hosted VDI please visit TurnKeyDesk.com

Follow Us : Facebooktwitterlinkedinyoutubeinstagram
Share : Facebooktwitterredditlinkedinmail

Written by Tim Kirsch on January 30th, 2014

Tagged with , ,