Using thin client migration to improve security policies

Posted on 2011-09-21
Medium Priority
Last Modified: 2012-05-12
I wanted to brain storm some ideas on how a major migration exercise in a company “from traditional 1:1, workstation/desk:employee to hotdesking a thin client infrastructure could be used as a vehicle to also improve:

o      Data security
o      Data governance (where it can get to, where it can be access, where it can be saved)
o      Group policy
o      user rights
o      user permissions
o      user security

Any ideas on some suggestions where this area may/could be strengthened during such a migration?
Question by:pma111

Accepted Solution

Lester_Clayton earned 2000 total points
ID: 36574493
Here's some thoughts:

Data Security - no Windows workstations means less risk of viruses and destruction to data.  It also means no trojans, which can prevent unauthorised access to data.

Data Governance - If you use something like Wyse terminals, you can completely prohibit saving of documents to local devices, USB sticks etc.  This means that documents can't be stored on laptops or memory sticks, causing a potential security risk by losing the said device.

Group Policy - The Thin Client environment can be completely locked down by policies (although, they can be in a desktop environment too)

user rights, permissions and security are now centrally managed, and you don't have to worry about users installing illegal software on their laptops or desktops, because now they don't have anything to install them on :D

Author Comment

ID: 36578851
So by default migrating to thinl cient naturally improves security is what your saying?

There is no real need to change much at all as its all done as part of the exercise?

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of the…
An Incident response plan is an organized approach to addressing and managing an incident. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question