The decoupling of a users physical machine from the desktop and software

Desktop Virtualization Journal

Subscribe to Desktop Virtualization Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Desktop Virtualization Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Desktop Virtualization Authors: Bruce Popky, Vinod Mohan, Peter Silva, Jayaram Krishnaswamy, Bob Gourley

Related Topics: Cloud Computing, Virtualization Magazine, Prolifics Technology Journal, Desktop Virtualization Journal

Cloud Computing: Article

Using Virtualization to Secure Your Users' Desktops

Secure Command's President & CEO, Anup K. Ghosh, to Present at SYS-CON's Virtualization Conference & Epo

Currently most desktop productivity software including browsers, mail clients, Office suites, IM, and media players make direct connections to the Internet and/or run untrusted content. As a result, these applications, which are core to office productivity, are also the primary vector of infections from Internet-borne malicious software.

This session will describe how desktop virtualization can be deployed within an organization to secure users' desktop applications against Internet-based threats and untrusted content.

Current solutions, which are largely signature-based, are largely ineffective at detecting current sophisticated threats that will create botnets from office machines as well as leak proprietary data. Virtualization technology is now "prime time" because of recent advances in chipset technology that makes it feasible and economical to run several concurrent virtual machines on the desktop. This session not only will present methods and tools for using virtualization to secure common desktop applications, but also portend the future of desktop virtualization where virtualization disappears from the user experience through seamless integration with the host operating system.

Sponsor Virtualization Conference & Expo
Register Now and Save!
Submit Your Speaking Proposal

Speaker Bio: Dr. Anup K. Ghosh is President & CEO of Secure Command, LLC. He has served as a Senior Scientist and Program Manager in the Advanced Technology Office of the Defense Advanced Research Projects Agency (DARPA), where he created and managed programs in information assurance and information operations.

In 2005 Dr. Ghosh was honored with the Frank Byron Rowlett Award for Individual Excellence for his breakthrough research into cyber-defense to include technology to automatically quarantine computer-based worms.

More Stories By Virtualization News

SYS-CON's Virtualization News Desk trawls the news sources of the world for the latest details of virtualization technologies, products, and market trends, and provides breaking news updates from the Virtualization Conference & Expo.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.