Day: September 6, 2013

How Centralization Makes Hosted Desktops More Secure

Hosted Desktops Secure OTNO Blog

Every aspect of our Hosted Desktop solutions is continuously or regularly protected, monitored, and backed up. One of the keys to the effectiveness of our security infrastructure is the centralization of our Desktop Hosting solutions (our Hosted Desktops are stored on a small number of interconnected servers, between two and four Hosted Desktops per server).

The security benefits of centralization include:

    • Complete protection.

Though IronOrbit Hosted Desktops can be accessed from anywhere and with any device, their files and applications remain on the servers in our datacenters. It might appear to the user that he or she is accessing a locally-installed Windows desktop operating system, but really the user is only sending keystrokes and mouse clicks to our servers, which handle all of the processing and storage of the Hosted Desktops. Since all of the files and applications of our Hosted Desktops remain on our servers at all times, this means that every bit of data on an IronOrbit Virtual Desktop Infrastructure (VDI) is equally fully-protected.

    • More efficient management.

We monitor all of our Hosted Desktops from a single, consolidated management console; this allows us to impose security measures efficiently and effectively and to respond quickly to any security incidents.

    • Increased uniformity.

Decentralized IT infrastructures are made up of end-user devices that function independently and that may not have access to any centrally-hosted applications or databases. In this kind of IT environment, files and applications usually end up being stored on hard drives and on servers that are difficult or impossible to access. In addition, in a decentralized IT infrastructure the users are largely responsible for maintaining the security of their own devices, but they often lack the ability, time, or motivation to do so. With IronOrbit Hosted Desktops, however, security measures and policies are uniformly strong throughout and don’t rely on users to do anything.

Of course, the centralization of our Hosted Desktops would be meaningless if the security measures and policies that it helped impose weren’t effective. IronOrbit’s security infrastructure, however, is advanced, comprehensive, and thorough. Its features include:

We protect our Hosted Desktops with a multidimensional security system, which provides physical, operational, logical, and system protections.

    • 24x7x365 monitoring.

Our technicians monitor businesses’ Desktop Hosting solutions around-the-clock for indications of hacking attempts or security breaches.

    • Dedicated hosting.

Though we host multiple Virtual Desktops on a single physical server, we never host the Virtual Desktops of two different clients on the same physical server. Dedicated hosting eliminates the possibility of co-tenants of a server inappropriately accessing each other’s files.

    • Compliant hosting.

Our Hosted Desktops are compliant with data security regulations such as PCI DSS, HIPAA, GLBA, SOX, and others.

For a Hosted Desktop solution that’s centralized and secure, sign up for Desktop Hosting, PCI Compliant Hosting, or HIPAA Compliant Hosting from IronOrbit today!