TITLE

Winning Over CIOs to Desktop Virtualization

AUTHOR(S)
Davis, Jessica
PUB. DATE
February 2010
SOURCE
Channel Insider;2/23/2010, p1
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses the potential of the application of desktop virtualization despite concerns about its costs, network bandwidth impact, and security. Phil Grove, chief architect of collaborative solutions, states that chief information officers (CIOs) remain interested in the technology despite its possible risk and security threats. Some CIOs are operating proof-of-concept deployments of a small number of users to measure the benefits and downsides of desktop virtualization.
ACCESSION #
48442048

 

Related Articles

  • Security Assessment Techniques for Software Assurance -- a "Virtual Team" Approach. Isaacs, Derek // Proceedings of the International Conference on Information Warfa;2010, p500 

    Software Assurance / Software "Security" often imposes a requirement that applications be tested in a "live" (or as close to as is practicable) system - this often includes the surrounding implementation environment - as greater fidelity is needed for critical application testing and...

  • Black Hat Handed CIOs Plenty to Think About. Lundquist, Eric // eWeek;8/5/2013, p2 

    Information about several topics discussed at the Black Hat hacker conference in the U.S. in 2013 is presented. Topics include cyberterrorism, computer network security and technological risk assessment. It also discusses the responsibilities of the chief information officers (CIOs) on...

  • Bye Bye Baby. Macleod, Calum // Database & Network Journal;Oct2009, Vol. 39 Issue 5, p14 

    The author suggests a best practice approach for testing and reviewing firewall configuration. He says that computer security managers need to provide their staff with tools for automating repetitive components of the security lifecycle. He also advises companies to employ process automation and...

  • The dotted lines of health care. Cline, Bryan // SC Magazine: For IT Security Professionals (15476693);Jan2011, Vol. 22 Issue 1, p18 

    The article reports on the issues that a chief information security officer (CISO) needs to address in order to comply with the electronic health records requirements in the U.S. In addition to risk assessment, the CISO keeps updated on the measures prescribed by the Health Insurance Portability...

  • Security and virtualization. Antonopoulos, Andreas // Network World;3/26/2007, Vol. 24 Issue 12, p23 

    The author reflects on security virtualization, a network security that has the physical layer abstracted. According to the author, the reason why security and virtualization are discussed a lot is that server virtualization has moved beyond the development environment and production. In...

  • Risk analysis needs a reality check. Snyder, Joel // Network World;4/14/2003, Vol. 20 Issue 15, p33 

    Comments on various aspects of computer network security risk analysis. Factors that hamper the quality of risk analysis; Awareness of the problem; Defects of computer software released by their vendors; Problems with the product patches offered by software vendors.

  • Asian virtualization priorities. Rust, Len // NetworkWorld Asia;Apr2008, Vol. 4 Issue 3, p11 

    The article highlights a recent study on virtualization management for CA, an enterprise information technology (IT) management software giant, conducted by Hydrasight. The study showed that 48% of chief information officers (CIO) and top (IT) in the Asia-Pacific region rated management of their...

  • Union of Two Hot Technologies in the Offing. Dholakia, Sameer // Siliconindia;Feb2009, Vol. 12 Issue 2, p22 

    The article reports on the union of enterprise server virtualization and utility style cloud computing. It notes that the union will result in cloud-centric enterprise virtualization, a transformative and disruptive force for transformation that will enable information technology (IT) resources,...

  • Race to virtualisation leaves critical business environments vulnerable. Ashford, Warwick // Computer Weekly;7/10/2012, p6 

    The article focuses on the lack of security in virtual computing environments. It states 85 percent of organizations are planning to or have adopted x86 server virtualization but at the same time many chief information officers do not know about virtualization security risks or lack the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics