Industry News Desk
Using Virtualization to Secure Your Users' Desktops
Secure Command's President & CEO, Anup K. Ghosh, to Present at SYS-CON's Virtualization Conference & Epo
Jul. 17, 2008 03:00 PM
Currently most desktop productivity software including browsers, mail clients, Office suites, IM, and media players make direct connections to the Internet and/or run untrusted content. As a result, these applications, which are core to office productivity, are also the primary vector of infections from Internet-borne malicious software.
This session will describe how desktop virtualization can be deployed within an organization to secure users' desktop applications against Internet-based threats and untrusted content.
Current solutions, which are largely signature-based, are largely ineffective at detecting current sophisticated threats that will create botnets from office machines as well as leak proprietary data. Virtualization technology is now "prime time" because of recent advances in chipset technology that makes it feasible and economical to run several concurrent virtual machines on the desktop. This session not only will present methods and tools for using virtualization to secure common desktop applications, but also portend the future of desktop virtualization where virtualization disappears from the user experience through seamless integration with the host operating system.
Speaker Bio: Dr. Anup K. Ghosh is President & CEO of Secure Command, LLC. He has served as a Senior Scientist and Program Manager in the Advanced Technology Office of the Defense Advanced Research Projects Agency (DARPA), where he created and managed programs in information assurance and information operations.
In 2005 Dr. Ghosh was honored with the Frank Byron Rowlett Award for Individual Excellence for his breakthrough research into cyber-defense to include technology to automatically quarantine computer-based worms.
Reader Feedback: Page 1 of 1
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week