Strong Authentication for VDI Environments

Organizations are embracing the Bring Your Own Device (BYOD) trend, and the use of virtual desktop infrastructure (VDI) software is helping to mitigate BYOD’s traditional risks. With VDI, the virtual desktop loaded with sensitive company data and applications remains within the security of the company’s data center. The device used to connect to the virtual desktop then operates simply as a remote monitor/keyboard: a thin client that stores little to no data. The real risk with this delivery method? Verifying the identity of the user for authorized access to the VDI environment.