Solved

Using thin client migration to improve security policies

Posted on 2011-09-21
3
346 Views
Last Modified: 2012-05-12
I wanted to brain storm some ideas on how a major migration exercise in a company “from traditional 1:1, workstation/desk:employee to hotdesking a thin client infrastructure could be used as a vehicle to also improve:

o      Data security
o      Data governance (where it can get to, where it can be access, where it can be saved)
o      Group policy
o      user rights
o      user permissions
o      user security

Any ideas on some suggestions where this area may/could be strengthened during such a migration?
0
Comment
Question by:pma111
3 Comments
 
LVL 9

Accepted Solution

by:
Lester_Clayton earned 500 total points
ID: 36574493
Here's some thoughts:

Data Security - no Windows workstations means less risk of viruses and destruction to data.  It also means no trojans, which can prevent unauthorised access to data.

Data Governance - If you use something like Wyse terminals, you can completely prohibit saving of documents to local devices, USB sticks etc.  This means that documents can't be stored on laptops or memory sticks, causing a potential security risk by losing the said device.

Group Policy - The Thin Client environment can be completely locked down by policies (although, they can be in a desktop environment too)

user rights, permissions and security are now centrally managed, and you don't have to worry about users installing illegal software on their laptops or desktops, because now they don't have anything to install them on :D
0
 
LVL 3

Author Comment

by:pma111
ID: 36578851
So by default migrating to thinl cient naturally improves security is what your saying?

There is no real need to change much at all as its all done as part of the exercise?
0

Featured Post

Is Your AD Toolbox Looking More Like a Toybox?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Distinguished username as email address 4 40
Activity directory migration 4 22
Windows 2012 R2 DFS Replication 12 34
Removing Exchange 2003 3 11
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question