![]() ![]() ![]() ![]() For example, we don't want to allow any copy/paste of data to an outside environment, and we are able to restrict the VDI to not allow any data transfer from the VDI to the local laptop's hard drives. And because that relies on utilizing your existing hardware resources, and making those available as a part of your Citrix farm - with a second level of authentication and security pieces around it - we added some 4,000 workstations without an additional overhead or cost." "It provides all of the features required for the protection of data. "We've been able to scale the environment quite nicely by using the Citrix Remote PC.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |