Descripción
Explore the various components to protecting intellectual property using virtual desktop infrastructure. Learn about tiered security zones and today's technology tools that enhance the capability of securing proprietary CAD/computer-aided manufacturing (CAM) data in a virtual desktop infrastructure environment.
Aprendizajes clave
- Gain an understanding of perimeter security capabilities available for virtual desktop Infrastructure
- Gain an understanding of how native tools in the Windows operating system can be used to enhance the security position
- Gain an understanding of available virtual-desktop security policies and controls
- Learn which third-party tools that can enhance the overall security posture
Orador
- FDFred DevoirFred Devoir is a manager of It infrastructure, senior architect, and technology specialist with 20 years of experience designing and developing complex systems. He has a wide level of exposure to a variety of specialized technologies and business systems. He is particularly interested in integration, virtual desktop infrastructure, and virtualization projects that take computing and user experience to the next level. He has deployed Citrix environments for National Aeronautics and Space Administration (NASA) to provide the International Space Station with desktop computing for astronauts in space; he deployed a Citrix environment for PTC ProEngineer design engineering at NASA JSC; and he designed and is in the processes of deploying a 375-seat Dassault Catia/ANSYS CAD/CAM environment for a helicopter company in the Midwest. Currently, Fred is designing a 150-seat Dassault Catia/Solidworks CAD/CAM environment for an aircraft company in the Midwest.