A company had a security breach which resulted in stolen data.
The CIO has mandated that the security team implement a data leak prevention mechanism and better control over how data is accessed and distributed.
Which technology will prevent users from copying data from their Horizon View virtual desktop to their local endpoint when they are connected outside the corporate LAN?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The technology that can prevent users from copying data from their Horizon View virtual desktop to their local endpoint when they are connected outside the corporate LAN is the Unified Access Gateway (UAG).
The Unified Access Gateway is a component of the VMware Horizon Suite that provides secure remote access to virtual desktops and applications. It acts as a gateway between external devices and virtual desktops, and it provides a number of security features to ensure that remote access is both secure and compliant with corporate policies.
One of the key features of the Unified Access Gateway is its ability to control data flow between virtual desktops and external devices. With the UAG, administrators can set policies that prevent users from copying data from their virtual desktops to their local endpoints when they are connected outside the corporate LAN. This feature is essential for preventing data leaks, especially in the case of a security breach.
To implement this feature, administrators can create policies that define which users are allowed to access which data, and under what conditions. For example, they can set policies that prevent users from copying data to external devices when they are outside the corporate LAN, or they can limit the types of data that can be copied to external devices.
In summary, the technology that can prevent users from copying data from their Horizon View virtual desktop to their local endpoint when they are connected outside the corporate LAN is the Unified Access Gateway. The UAG provides a number of security features, including data flow control, which can help prevent data leaks and ensure compliance with corporate policies.