VMware Workstation 7 Bedienungsanleitung Seite 458

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 512
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 457
Workstation User’s Manual
458 VMware, Inc.
Use Cases for Pocket ACE
UsethefollowingscenariostodeterminewhentousePocketACEandwhichkindsof
policiestosetforvarioussituations:
ProvidingaccesstoemployeesworkingremotelyEmployeesoftenusetheir
ownhomecomputerforaccessingenterpriseresourcesremotely.Unmanaged
clientscanbeinfectedbymalwareorspyware.Inaddition,thereisariskoflost
dataifaremoteuserdownloadssensitivedatatoapersonalcomputer.Thereis
alsotheaddedburdenofdepl
oyingandmanagi
ngthesoftwareneededbyremote
users.
UsingPocketACE,ITadministratorscandeployatrusted,managed,andmore
securevirtualdesktopinstancetoremoteusers.ThevirtualdiskofthePocketACE
canbeencryptedtominimizetheriskoflostdata.Bysettingspec
ificnetwork
quarantinepolicies,administratorscanstrictlycontroltrafficbetweenthe
untrustedclientandPocketACEinstance,protectingtheenterprisefromcreating
acompromisedhost.
IncreasingthesecurityandmobilityofmobileusersMobileusersoftenaccess
orcarrysensitivedataoutsidetheenterpriseusinglaptopsorothermobiledevices.
ThequestionforITorganizationsisnotif,butwhen,amobileuserslaptopwillbe
lostorstolen,leadingtothelossofsensitiveorco
nfidentialdata.
UsingPocketACEtodeployadesktopenvironmenttomobileusers,IT
administratorscanreducetheriskoflostdatawhilealsoincreasingusers’mobility
becausePocketACEinstancecanbeusedwithanysupportedx86system.A
desktopinstancewithanencrypteddiskcanbedeployedtom
obileusers.Using
ACEManagementServer,alostorstolenPocketACEcanbedisabledremotely.
Providingtemporaryaccesstocontractworkersusinguntrustedhosts
Contractorsandbusinesspartnersoftenconnecttotheenterprisenetworkfrom
unknownoruntrustedclients.PocketACEcanbeusedtoprovideastandardized,
trusted,andmanagedenvironmenttotheseuserswhileenablingsafeconnectivity
toenterpriseresources.
Forcontractors,thePo
cketACEinstanc
ecanbeconfiguredtobeavailableonly
duringthelengthofthecontract.Whentheexpirationdateisreached,the
contractorcannolongerusethePocketACEinstance.
Seitenansicht 457
1 2 ... 453 454 455 456 457 458 459 460 461 462 463 ... 511 512

Kommentare zu diesen Handbüchern

Keine Kommentare