Virtualization components that serve desktops to end users via an image or images stored on a centralized server
Delivered over the network
Requires good bandwidth, traditional PCs, mobile devices or thin clients
Persistent vs Non-persistent VDE
Persistent Virtual Desktop Environment
A stateful VDE solution
Every time the user logs into the VDI the VDE retains configuration settings
User profile information is retained
Desktop configuration state is retain
Application state data is retained
Requires a larger amount of storage for every user
Larger backups
Management is really not much different that a phyiscal desktop infratstruct
Image maintenance is more complex
Non-persistent Virtual Desktop Environment
A stateless VDE solution
Every time the user logs into the VDE they are served a fresh instance if the desktop
User profile and user data is removed
Application state information and data is erased after every logoff
Requires Folder direction to a central file share
Requires a user state environment management solution to maintain a familiar environment for the end user
Storage capacities requirements are smaller
Cloud access security broker
Also known by its name CASB
Acts as the gateway or gatekeeper between the on-premise and cloud-based solutions
Can secure access across multiple technologies such as mobile devices
VM sprawl avoidance
Virtual Machines can be easily created.
Virtual machine have license requirements just like physical machines.
Too many virtuals machines creates/deployed on a single. (resource exhaustion)
An abundance of VMs can make the administration very challenging.
Some VMs maybe created then fail to be properly utilized. (Wasted resources)
Increased amounts of VM fragmentation
Large amounts of storage accrual
Are machines part of the test environment? or production environment?
Which machines can be decommissioned and which machines are essential to the vitality of the company?
VM escape protection
Virutalization allows for an isolated computing environment between the guest operating system (the VM) and the host operating system
VM escaping is when the VMs communications break the boundaries of the isolation allowing communication with the host, other VMs on the host and the host's network.