DarkReading thinks its security, methinks its still figuring out whether to go full ahead with its expansion plans OR do another acquisition and position itself as "acquirable", again!
Check it out.
Citrix isn't ready to divulge its plans for XenSource, but it's still fun to conjure up a few of the possibilities that could change traditional approaches to enterprise security:
- Virtual data centers could be used to protect the data. Citrix can lessen its dependency on VMware with a XenSource-based virtual data center. Organizations can keep the data in the data center, where it belongs, allowing the customer to dynamically choose among accelerated SSL, virtualized presentation services, or streaming applications. This approach could clear the way for customers to place more applications, and sensitive data, in secure data centers.
- Endpoint security won't matter. Using Intel hardware capabilities for isolation, businesses could shield sensitive data and user information from malware, while cleaning up residual data upon VM application termination. A business application does not have to care about the endpoint security profile if the application delivery system uses XenSource to isolate itself from the rest of the desktop.
- Application delivery could drive security. If sensitive data is protected in the data center and at the endpoint, then businesses will focus on application delivery systems for the proper blend of performance and end-user capability. The ability to dynamically coordinate protocols and distribute processing between the centralized data center and the endpoint can become a real business enabler.
- NAC could finally find its niche. Trying to manage endpoint profiles of unmanaged devices in a connected world is a fool’s errand. Application delivery systems need only to check at connect time for the appropriate XenSource application agent VM, and then dynamically choose the application delivery method for optimal performance. If this approach can reduce the risk of unmanaged devices, then handling managed devices becomes easy.
Check it out.
Comments
Post a Comment