Solved

Using thin client migration to improve security policies

Posted on 2011-09-21
3
351 Views
Last Modified: 2012-05-12
I wanted to brain storm some ideas on how a major migration exercise in a company “from traditional 1:1, workstation/desk:employee to hotdesking a thin client infrastructure could be used as a vehicle to also improve:

o      Data security
o      Data governance (where it can get to, where it can be access, where it can be saved)
o      Group policy
o      user rights
o      user permissions
o      user security

Any ideas on some suggestions where this area may/could be strengthened during such a migration?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 9

Accepted Solution

by:
Lester_Clayton earned 500 total points
ID: 36574493
Here's some thoughts:

Data Security - no Windows workstations means less risk of viruses and destruction to data.  It also means no trojans, which can prevent unauthorised access to data.

Data Governance - If you use something like Wyse terminals, you can completely prohibit saving of documents to local devices, USB sticks etc.  This means that documents can't be stored on laptops or memory sticks, causing a potential security risk by losing the said device.

Group Policy - The Thin Client environment can be completely locked down by policies (although, they can be in a desktop environment too)

user rights, permissions and security are now centrally managed, and you don't have to worry about users installing illegal software on their laptops or desktops, because now they don't have anything to install them on :D
0
 
LVL 3

Author Comment

by:pma111
ID: 36578851
So by default migrating to thinl cient naturally improves security is what your saying?

There is no real need to change much at all as its all done as part of the exercise?
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question