![]() ![]() In addition, users can be subjected to various posture assessments prior to providing them access to the resources thanks to the Netscaler, which acts as a secure reverse proxy for all Citrix traffic. When it came to accessing enterprise applications using Citrix Receiver, again there were some limitations in terms of capabilities as compared to Windows/Mac/Linux.Ĭhromebooks have certainly come a long way since then, In addition to having addressed display and other hardware limitations and being extremely secure as discussed above, they are also enterprise ready by enabling end users to be productive, thanks to Citrix Receiver for Chrome.Ĭitrix Receiver allows users to securely access all their enterprise applications running in the datacenter. The display options were not that great compared to a regular ultra-book. I didn’t like the fact that offline capabilities were very limited. I purchased my first chromebook about 18 months ago and remember feeling so underwhelmed back then with the device. ![]() Every OS feature and every Chrome browser function can completely controlled and locked down. they still have built in TPM chips which ensure that any data that is cached on the device (browser cookies, temp files etc) are fully encrypted and protected Device ManagementĪnother benefit of using Chromebooks is that they can be fully managed via the Chrome Management platform. While you don’t typically store data on Chromebooks. If it detects either of the two, it will try to self heal and if that fails, the system wont boot. When a chromebook boots, it does a check to make sure the system has not been tampered and that there is no corruption of any sort. Since each application on a chromebook runs in a restricted sandboxed environment, if that application is compromised for whatever reason, it cannot affect other applications that are running or the base OS in any way. Chromebooks are secure by designįirst off, Chromebooks are inherently secure due to the following reasons: ![]() There have been a number of incidents in foreign countries where laptops have been stolen and data breached.Ī Chromebook running Citrix Receiver is a great option to solve this problem. In a scenario that the laptop is compromised, not only could there be IP theft, but with the VPN access, a malicious user could connect back to the corporate network and cause havoc. Typically IT departments provide travelling users encrypted laptops that are fairly locked down, and users leverage VPN to access enterprise applications.The data still resides on these laptops. Up until recently, the options were pretty limited. IP theft is a major concern with executives and top engineers travelling around the world with highly sensitive data. Security is the top concern of most enterprises that I deal with, some being constantly attacked/hacked on a daily basis. The IT landscape has changed a lot the past 5 years. ![]()
0 Comments
Leave a Reply. |