In December of 2014, a new study, “Corporate Data: A Protected Asset or a Ticking Time Bomb?” from the Ponemon Institute found that employees have excessive access to company data, presenting a growing risk to these organizations.
Their findings led to the revelation that there is a significant lack of oversight and control over which employees have access to confidential, sensitive data and how that data is shared. They also found confusion among staff as to what their responsibilities are in protecting company data. Companies that do not make data protection a priority typically have a difficult time staying within compliance standards.
From small cafes to large hotel chains, cloud services can benefit the entire hospitality industry. Service industries can gain the ability to monitor, test, and implement better quality solutions that improve the guest experience, streamline operations, and provide greater data security—a vital feature for payment processing, as more leaks are reported from POS systems every week.
Both the hotel and restaurant industries handle income and expense sheets, employee records, time records, merchant invoices, receipts, and sales reports. All of this data must be stored in a highly secure and redundant location, where it will be protected from theft, loss, or damage. Any company dealing with credit card information must also be PCI-DSS compliant, a standard that many cloud providers can help you achieve.
The answer depends on each individual deployment, but no matter the use case, admins will have to work with legacy hardware and consider new devices to support a virtual desktop initiative. From laptops to mobile to thin-client, there are plenty of end user platforms supported by VMware Horizon View.
Desktop as a Service (DaaS), which delivers virtual desktop infrastructure from a cloud provider, allows devices other than PCs to access fully featured desktops that are hosted in the data center. Because servers do all the heavy lifting, these client devices don’t need to be particularly powerful, enabling a new wave of BYOD confusion and excitement, as well as the opportunity for capital expense reduction through less expensive client devices.
There are several options for virtual desktop pools in Horizon View that will change how administrators manage desktops and how users interact with them. There are three main pool types and two assignment types to choose from.
Desktop Pool Types
Unless you’re working with Microsoft Terminal Services machines (in which case you’ll choose Terminal Services pools to allow terminal servers to be treated as Horizon desktops), either migrating or using them alongside Horizon desktops, you’ll select from automatic or manual desktop pools.
Businesses large and small are looking for the most effective way to develop a safe and secure BYOD policy for their workers. This trend is sweeping not only tech workplaces, but across industries. BYOD stands for “Bring Your Own Device.” The general gist of it is that employees will bring personal devices, such as laptops, tablets, and smart phones, and use them for work. While BYOD is still very controversial, companies have found that there are some serious pros (and cons) when it comes to allowing employees to use their own devices.