VDI Endpoint

The Challenge with VDI Endpoint (Secure Remote Access)

VDI applications extend the secured endpoint of the enterprise in an effort to reduce operating costs, provide users with wide choices of devices including their own computer platforms (BYOD/BYOC) and operate seamlessly from their workplace of choice, whether it be from their home, at a WiFi hotspot, or a remote office location (BYON). Based on an application store executing in the corporate cloud, whether it be public or hybrid, VDI also promises to improve application performance and enhance corporate security against malware and loss of sensitive data. Where the challenges of VDI Endpoints dramatically occur is in the BYOD/BYOC/BYON space, where uncontrolled computer platforms with varying level of security, patch implementation, and operational environments communicate openly over public networks with varying degrees of authentication and security functions.

How SPYRUS Helps

SPYRUS Windows To Go (“SWTG”) drives make an ideal complement for remote access/VDI/Cloud, and Office 365, providing a true secure trusted endpoint. Your enterprise can enforce access to only your network and prevent local access or data storage. In addition, the SPYRUS Windows to Go devices provide an outstanding solution for the challenges involved with supporting VDI endpoints from computing platforms in remote offices or even VDI teleworkers operating from home based, strongly heterogeneous computing environments. The full spectrum of features provided by the SPYRUS family of Windows to Go devices assure a secure, managed endpoint that is an extension of the corporations IT infrastructure.

Security for Data at Rest

SPYRUS WorkSafe™ Pro and Secure Portable Workplace™ use an advanced XTS-AES 256 mode of encryption, totally transparent to the user while operating at SSD category speeds. It is the IEEE standard for full disk encryption and much stronger than using software based full disk encryption. For added protection without reducing performance, SPYRUS provides its Defense-in-Depth two-layer encryption protection by enabling optional BitLocker software encryption, with the BitLocker passwords securely protected in the hardware encrypted memory partition. (SPYRUS Windows To Go Live Drives)

Mitigate Data Leakage and Malware Propagation

For teleworkers performing their duties by accessing cloud based applications or via remote portals, the SWTG devices provisioned for Read-Only provide strong cryptographic security for VDI and thin-client applications by eliminating persistent data changes to the data stored on the drives and also mitigate the persistent threats of exfiltration and malware propagation. (SPYRUS Windows To Go Live Drives)

Device and Data Management

All SWTG products are complemented by the SPYRUS Enterprise Management System (SEMS).   SEMS offers risk management via global, national and organizational control over those important corporate and personal IT information assets which have previously been confined and protected within the physical IT infrastructure of a facility, but now require protection as they travel the world within USB endpoint devices. SEMS provides central management for SWTG drives with numerous policy driven functions including user access, device enablement/disablement, “kill” inoperability, group or user policy changes, audit recording, and password changes. The SEMS architecture allows an unlimited number of devices to be managed with facilities for multiple administrators based on organizational needs and policies. The persistent audit trail provided by SEMS permits the real time monitoring of an “Acceptable Usage Agreement” for BYOD support.

In-field updates and policy changes can be uniformly administered with SEMS and SCCM with common procedures rather than returning devices to a central “loan pool.”   SEMS ease of use is an important management and cost consideration in deploying scalable device management systems. Under SEMS, System Administrators primarily operate in a demand-based environment. SEMS allows them to take actions for control of devices based on user-driven operational help requests, threat circumstances, or organization-driven policy changes. (SPYRUS Enterprise Management System – SEMS)

We already work with:

Speak to an Expert

If you would like to speak with a SPYRUS expert regarding our products and services, please click on the button below to get all of our contact information. We look forward to assisting you and answering all of your questions.