Solved

Using thin client migration to improve security policies

Posted on 2011-09-21
3
344 Views
Last Modified: 2012-05-12
I wanted to brain storm some ideas on how a major migration exercise in a company “from traditional 1:1, workstation/desk:employee to hotdesking a thin client infrastructure could be used as a vehicle to also improve:

o      Data security
o      Data governance (where it can get to, where it can be access, where it can be saved)
o      Group policy
o      user rights
o      user permissions
o      user security

Any ideas on some suggestions where this area may/could be strengthened during such a migration?
0
Comment
Question by:pma111
3 Comments
 
LVL 9

Accepted Solution

by:
Lester_Clayton earned 500 total points
ID: 36574493
Here's some thoughts:

Data Security - no Windows workstations means less risk of viruses and destruction to data.  It also means no trojans, which can prevent unauthorised access to data.

Data Governance - If you use something like Wyse terminals, you can completely prohibit saving of documents to local devices, USB sticks etc.  This means that documents can't be stored on laptops or memory sticks, causing a potential security risk by losing the said device.

Group Policy - The Thin Client environment can be completely locked down by policies (although, they can be in a desktop environment too)

user rights, permissions and security are now centrally managed, and you don't have to worry about users installing illegal software on their laptops or desktops, because now they don't have anything to install them on :D
0
 
LVL 3

Author Comment

by:pma111
ID: 36578851
So by default migrating to thinl cient naturally improves security is what your saying?

There is no real need to change much at all as its all done as part of the exercise?
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question